Tyk v2.2 Documentation Components

  1. Home
  2. Tyk v2.2 Documentation Components
  3. Integration Tutorials: OpenLDAP
  4. Log into the Developer Portal using LDAP

Log into the Developer Portal using LDAP

LDAP requires little configuration, we can use the same provider config that we used to log into the Dashboard to target the Portal instead – notice the change in the handler configuration and the return URL:

```
{
    "ActionType": "GenerateOrLoginDeveloperProfile",
    "ID": "5",
    "IdentityHandlerConfig": {
        "DashboardCredential": "822f2b1c75dc4a4a522944caa757976a"
    },
    "OrgID": "53ac07777cbb8c2d53000002",
    "ProviderConfig": {
        "FailureRedirect": "http://{PORTAL-DOMAIN}:{PORTAL-PORT}/portal/login/",
        "LDAPAttributes": [],
        "LDAPPort": "389",
        "LDAPServer": "localhost",
        "LDAPUserDN": "cn=*USERNAME*,cn=dashboard,ou=Group,dc=test-ldap,dc=tyk,dc=io"
    },
    "ProviderConstraints": {
        "Domain": "",
        "Group": ""
    },
    "ProviderName": "ADProvider",
    "ReturnURL": "http://{PORTAL-DOMAIN}:{PORTAL-PORT}/portal/sso/",
    "Type": "passthrough"
}
```

Once again, a simple POST request is all that is needed to validate a user via an LDAP provider.