runZero integrates with Microsoft Active Directory (AD) via LDAP to allow you to sync and enrich your asset inventory, as well as gain visibility into domain users and groups. Adding your AD data to runZero makes it easier to find assets that are not part of your domain.
To set up the Active Directory integration, you’ll need to:
- Add the AD credential in runZero.
- Choose whether to configure the integration as a scan probe or connector task.
- Activate the Active Directory integration to sync your data with runZero.
Before you can set up the LDAP integration:
- Verify that you have runZero Professional or Enterprise.
- runZero Professional and Enterprise users will be able to view and query LDAP assets.
- runZero Enterprise users will also be able to view and query LDAP users and groups.
- Make sure you have credentials for an LDAP account.
Step 1: Add the LDAP credential to runZero
- Go to the Add credential page in runZero. Provide a name for the credentials, like
- Choose LDAP Username & Password from the list of credential types.
- Provide the following information:
- LDAP username - The username you want to use with the LDAP integration. The account used for this integration does not require any special permissions. The following username formats are accepted:
- Distinguished Name (DN):
- User Principle Name (UPN):
- LDAP password - The password for the username to be used with the LDAP integration.
- LDAP base DN - The base distinguished name for LDAP searches. This field requires distinguished name format:
DC=[domain],DC=[tld]. Note that only entities underneath the specified base DN will be imported into runZero.
- LDAP URL - The URL for your LDAP server. This field supports
IP[:port] notation as well as
hostname.domain.tld[:port]. This field requires that the URL entered begins with
ldap:// (for insecure LDAP connections) or
ldaps:// (for secure LDAP connections). For example:
- LDAP insecure - Set this to
Yes if you want to attempt authentication without a verified thumbprint. By default, runZero will attempt to connect with LDAPS but will fall back to LDAP+StartTLS then LDAP. LDAP without StartTLS will only work if this toggle is set to
- LDAP thumbprints (optional) - A set of
hostname.domain.tld=SHA256:B64HASH pairs to trust for authentication.
- You will need to scan your LDAP server with runZero in order to obtain the TLS thumbprint. The TLS fingerprints service attribute report lists all previously seen fingerprints. The TLS thumbprints used for self-signed certificates will only work with LDAPS. If you want to use LDAP+StartTLS with a self-signed certificate, you will need to set the Insecure option to
LDAP insecure is set to
No and no thumbprints are provided:
- With a self-signed certificate, the connection will fail because the certificate chain cannot be verified.
- With a valid certificate from a public CA, the connection will work without thumbprints.
- If you want all other organizations to be able to use this credential, select the Make this a global credential option. Otherwise, you can configure access on a per-organization basis.
- Save the credential. You’re now ready to set up and activate the connection to bring in data from LDAP.
Step 2: Choose how to configure the Active Directory integration
The Active Directory integration can be configured as either a scan probe or a connector task. Scan probes gather data from integrations during scan tasks. Connector tasks run independently from either the cloud or one of your Explorers, only performing the integration sync.
Step 3: Set up and activate the Active Directory integration to sync data
After you add your Active Directory credential, you’ll need to set up a connector task or scan probe to sync your data.
Step 3a: Configure the Active Directory integration as a connector task
After you add your LDAP credential, you’ll need to set up a connection to sync your data from LDAP. A connection requires you to set a schedule and choose a site. The schedule determines when the sync occurs, and the site determines where any new LDAP-only assets are created.
- Activate a connection to Active Directory. You can access all available third-party connections from your inventory or tasks page.
- Choose the credentials you added earlier. If you don’t see the credentials listed, make sure the credentials have access to the organization you are currently in.
- Enter a name for the task, like
- Schedule the sync. A sync can be set to run on a recurring schedule or run once. The schedule will start on the date and time you have set.
- Under Task configuration, choose the site you want to add your assets to.
- If you want to exclude assets that have not been scanned by runZero from your integration import, switch the Exclude unknown assets toggle to
Yes. By default, the integration will include assets that have not been scanned by runZero.
- Activate the connection when you are done. The sync will run on the defined schedule. You can always check the Scheduled tasks to see when the next sync will occur.
Step 3b: Configure the Active Directory integration as a scan probe
- Create a new scan task or select a future or recurring scan task from your Tasks page.
- Add or update the scan parameters based on any additional requirements.
- On the Probes and SNMP tab, choose which additional probes to include, set the LDAP toggle to
Yes, and change any of the default options if needed.
- On the Credentials tab, set the LDAP toggle for the credential you wish to use to
- Click Initialize scan to save the scan task and have it run immediately or at the scheduled time.
Step 4: View Active Directory assets
After a successful sync, you can go to your inventory to view your LDAP assets. These assets will have an Active Directory icon listed in the Source column.
To filter by LDAP assets, consider running the following queries:
Click into each asset to see its individual attributes. runZero will show you the attributes returned by LDAP.
For Enterprise users, the LDAP integration provides details about users and groups in addition to enriching asset inventory data. Go to Inventory > Users or Inventory > Groups to view the data provided by LDAP.