LDAP Password Rotation
Learn how to automatically rotate LDAP passwords.
Due to how LDAP passwords are rotated, retired credentials will not be able to authenticate with the LDAP provider during their inactive period.
This is a limitation of the LDAP provider and cannot be rectified by Infisical.
Prerequisites
- Create an LDAP Connection with the Secret Rotation requirements
Create an LDAP Password Rotation in Infisical
-
Navigate to your Secret Manager Project’s Dashboard and select Add Secret Rotation from the actions dropdown.
-
Select the LDAP Password option.
-
Select the LDAP Connection to use and configure the rotation behavior. Then click Next.
- LDAP Connection - the connection that will perform the rotation of the configured DN’s password.
LDAP Password Rotations require an LDAP Connection that uses ldaps:// protocol.
- Rotation Interval - the interval, in days, that once elapsed will trigger a rotation.
- Rotate At - the local time of day when rotation should occur once the interval has elapsed.
- Auto-Rotation Enabled - whether secrets should automatically be rotated once the rotation interval has elapsed. Disable this option to manually rotate secrets or pause secret rotation.
Due to LDAP Password Rotations rotating a single credential set, auto-rotation may result in service interruptions. If you need to ensure service continuity, we recommend disabling this option.
-
Specify the Distinguished Name (DN) of the principal whose password you want to rotate and configure the password requirements. Then click Next.
-
Specify the secret names that the client credentials should be mapped to. Then click Next.
- DN - the name of the secret that the principal’s Distinguished Name (DN) will be mapped to.
- Password - the name of the secret that the rotated password will be mapped to.
-
Give your rotation a name and description (optional). Then click Next.
- Name - the name of the secret rotation configuration. Must be slug-friendly.
- Description (optional) - a description of this rotation configuration.
-
Review your configuration, then click Create Secret Rotation.
-
Your LDAP Password credentials are now available for use via the mapped secrets.
-
Navigate to your Secret Manager Project’s Dashboard and select Add Secret Rotation from the actions dropdown.
-
Select the LDAP Password option.
-
Select the LDAP Connection to use and configure the rotation behavior. Then click Next.
- LDAP Connection - the connection that will perform the rotation of the configured DN’s password.
LDAP Password Rotations require an LDAP Connection that uses ldaps:// protocol.
- Rotation Interval - the interval, in days, that once elapsed will trigger a rotation.
- Rotate At - the local time of day when rotation should occur once the interval has elapsed.
- Auto-Rotation Enabled - whether secrets should automatically be rotated once the rotation interval has elapsed. Disable this option to manually rotate secrets or pause secret rotation.
Due to LDAP Password Rotations rotating a single credential set, auto-rotation may result in service interruptions. If you need to ensure service continuity, we recommend disabling this option.
-
Specify the Distinguished Name (DN) of the principal whose password you want to rotate and configure the password requirements. Then click Next.
-
Specify the secret names that the client credentials should be mapped to. Then click Next.
- DN - the name of the secret that the principal’s Distinguished Name (DN) will be mapped to.
- Password - the name of the secret that the rotated password will be mapped to.
-
Give your rotation a name and description (optional). Then click Next.
- Name - the name of the secret rotation configuration. Must be slug-friendly.
- Description (optional) - a description of this rotation configuration.
-
Review your configuration, then click Create Secret Rotation.
-
Your LDAP Password credentials are now available for use via the mapped secrets.
To create an LDAP Password Rotation, make an API request to the Create LDAP Password Rotation API endpoint.
Sample request
Due to LDAP Password Rotations rotating a single credential set, auto-rotation may result in service interruptions. If you need to ensure service continuity, we recommend disabling this option.