Redis Enterprise Software supports LDAP through a role-based mechanism, first introduced in v6.0.20.

Earlier versions of Redis Enterprise Software supported a cluster-based mechanism; however, that mechanism was removed in v6.2.12.

If you’re using the cluster-based mechanism to enable LDAP authentication, you need to migrate to the role-based mechanism before upgrading to Redis Enterprise Software v6.2.12 or later.

Migration checklist

This checklist covers the basic process:

  1. Identify accounts per app on the customer end.

  2. Create or identify an LDAP user account on the server that is responsible for LDAP authentication and authorization.

  3. Create or identify an LDAP group that contains the app team members.

  4. Verify or configure the Redis Enterprise ACLs.

  5. Configure each database ACL.

  6. Remove the earlier “external” (LDAP) users from Redis Enterprise.

  7. Use Settings > LDAP to enable role-based LDAP.

  8. Map your LDAP groups to access control roles.

  9. Test application connectivity using the LDAP credentials of an app team member.

  10. (Recommended) Turn off default access for the database to avoid anonymous client connections.

Because deployments and requirements vary, you’ll likely need to adjust these guidelines.

Test LDAP access

To test your LDAP integration, you can:

  • Connect with redis-cli and use the AUTH command to test LDAP username/password credentials.

  • Sign in to the admin console using LDAP credentials authorized for admin access.

  • Use RedisInsight to access a database using authorized LDAP credentials.

  • Use the REST API to connect using authorized LDAP credentials.

More info