Authentication settings
The authentication settings page allows administrators to configure directory (LDAP) and external OpenID Connect (OIDC) authentication directly from the fDeploy Server web interface.
Accessing authentication settings
Navigate to Configuration → Authentication to manage authentication providers.
Directory / LDAP authentication
Configure Active Directory integration to allow users to sign in with their domain credentials.
| Field | Description |
|---|---|
| Auth Domain | The hostname or IP address of the Active Directory domain controller |
| Auth Container | The LDAP distinguished name (DN) of the container to search for users (e.g., DC=company,DC=com) |
Group → Team mappings
Map Active Directory groups to fDeploy teams so that domain users are automatically assigned to the correct teams when they sign in. Team memberships are also revoked automatically if the user no longer belongs to the corresponding AD group.
To add a mapping:
- Click Add Mapping
- Enter the AD Group name
- Select the corresponding fDeploy team from the dropdown
- Repeat for additional mappings as needed
To remove a mapping, click the delete icon next to it.
External OIDC provider
Configure an external OpenID Connect identity provider (such as Microsoft Entra ID, Auth0, or Okta) for single sign-on.
| Field | Description |
|---|---|
| Enable external OIDC | Toggle to enable or disable the external OIDC provider |
| Display Name | The label shown on the sign-in button (e.g., “Sign in with Entra ID”) |
| Authority | The URL of the identity provider (e.g., https://login.microsoftonline.com/{tenant-id}/v2.0) |
| Client ID | The application (client) ID from your identity provider’s app registration |
| Client Secret | The client secret from your identity provider’s app registration |
Saving changes
After modifying any settings, click Save to apply the changes. A confirmation notification will appear when the settings are saved successfully.