To allow LDAP users to access the Kong Manager GUI in Kong Gateway Enterprise 3.4, you’ll need to integrate LDAP authentication via the Kong Enterprise Role-Based Access Control (RBAC) system.
Here’s how you can get it working step-by-step 👇
👤 Step 1: Configure LDAP Authentication for Kong Manager
Edit your kong.conf or pass these as environment variables if you’re using a container setup.
admin_gui_auth = ldap-auth
admin_gui_auth_conf = {
"ldap_host": "ldap.example.com",
"ldap_port": 389,
"ldap_base_dn": "dc=example,dc=com",
"ldap_attribute": "uid",
"ldap_bind_dn": "cn=admin,dc=example,dc=com",
"ldap_password": "adminpassword",
"start_tls": false,
"verify_ldap_host": false
}
✅ If you’re using LDAPS, set
ldap_port = 636andstart_tls = falseor configure accordingly.
Restart Kong after updating this config.
👥 Step 2: Create an RBAC User Linked to the LDAP Username
Kong still needs an RBAC user that maps to the LDAP-authenticated identity.
curl -i -X POST http://localhost:8001/rbac/users \
--data "name=jdoe" \
--data "user_token=jdoe-admin-token"
The
namehere must match the LDAPuidor whatever attribute you configured withldap_attribute.
🔐 Step 3: Assign a Role to the RBAC User
curl -i -X POST http://localhost:8001/rbac/users/jdoe/roles \
--data "roles=read-only" # Or "admin", "super-admin", etc.
Available roles:
read-only,admin,super-admin, or your own custom roles.
🔓 Step 4: Log into Kong Manager with LDAP User
Go to your Kong Manager GUI:
https://<KONG_MANAGER_URL>:8445
Enter:
- Username:
jdoe(LDAPuid) - Password: LDAP user’s actual password (Kong will bind to LDAP and verify it)
🛠️ Optional: Test LDAP Config from CLI
You can test the LDAP binding from Kong CLI:
curl -i -X POST http://localhost:8001/rbac/users \
--data "name=testuser" \
--data "user_token=test123"
Then try logging into Kong Manager with testuser using their LDAP password.