Migrate to role-based LDAP

Describes how to migrate existing cluster-based LDAP deployments to role-based LDAP.

Redis Enterprise Software supports LDAP through a role-based mechanism, first introduced in v6.0.20.

Earlier versions of Redis Enterprise Software supported a cluster-based mechanism; however, that mechanism was removed in v6.2.12.

If you're using the cluster-based mechanism to enable LDAP authentication, you need to migrate to the role-based mechanism before upgrading to Redis Enterprise Software v6.2.12 or later.

Migration checklist

This checklist covers the basic process:

  1. Identify accounts per app on the customer end.

  2. Create or identify an LDAP user account on the server that is responsible for LDAP authentication and authorization.

  3. Create or identify an LDAP group that contains the app team members.

  4. Verify or configure the Redis Enterprise ACLs.

  5. Configure each database ACL.

  6. Remove the earlier "external" (LDAP) users from Redis Enterprise.

  7. (Recommended) Update cluster configuration to replace the cluster-based configuration file.

    You can use rladmin to update the cluster configuration:

    $ touch /tmp/saslauthd_empty.conf
    $ rladmin cluster config saslauthd_ldap_conf \

    Here, a blank file replaces the earlier configuration.

  8. Use Access Control > LDAP > Configuration to enable role-based LDAP.

  9. Map your LDAP groups to access control roles.

  10. Test application connectivity using the LDAP credentials of an app team member.

  11. (Recommended) Turn off default access for the database to avoid anonymous client connections.

Because deployments and requirements vary, you’ll likely need to adjust these guidelines.

Test LDAP access

To test your LDAP integration, you can:

  • Connect with redis-cli and use the AUTH command to test LDAP username/password credentials.

  • Sign in to the Cluster Manager UI using LDAP credentials authorized for admin access.

  • Use Redis Insight to access a database using authorized LDAP credentials.

  • Use the REST API to connect using authorized LDAP credentials.

More info

Back to top ↑