curl --request GET \
--url https://us.infisical.com/api/v1/app-connections/ldap/{connectionId}{
"appConnection": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"orgId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"app": "ldap",
"method": "simple-bind",
"credentials": {
"provider": "active-directory",
"url": "<string>",
"dn": "<string>",
"sslRejectUnauthorized": true,
"sslCertificate": "<string>"
},
"description": "<string>",
"version": 1,
"isPlatformManagedCredentials": false,
"gatewayId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"projectId": "<string>",
"credentialsHash": "<string>",
"project": {
"name": "<string>",
"id": "<string>",
"type": "<string>",
"slug": "<string>"
}
}
}Get the specified LDAP Connection by ID.
curl --request GET \
--url https://us.infisical.com/api/v1/app-connections/ldap/{connectionId}{
"appConnection": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"orgId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"app": "ldap",
"method": "simple-bind",
"credentials": {
"provider": "active-directory",
"url": "<string>",
"dn": "<string>",
"sslRejectUnauthorized": true,
"sslCertificate": "<string>"
},
"description": "<string>",
"version": 1,
"isPlatformManagedCredentials": false,
"gatewayId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"projectId": "<string>",
"credentialsHash": "<string>",
"project": {
"name": "<string>",
"id": "<string>",
"type": "<string>",
"slug": "<string>"
}
}
}The ID of the LDAP Connection to retrieve.
Default Response
Show child attributes
ldap simple-bind Show child attributes
The type of LDAP provider. Determines provider-specific behaviors.
active-directory The LDAP/LDAPS URL to connect to (e.g., 'ldap://domain-or-ip:389' or 'ldaps://domain-or-ip:636').
1The Distinguished Name (DN) or User Principal Name (UPN) of the principal to bind with (e.g., 'CN=John,CN=Users,DC=example,DC=com').
1Whether or not to reject unauthorized SSL certificates (true/false) when using ldaps://. Set to false only in test environments.
The SSL certificate (PEM format) to use for secure connection when using ldaps:// with a self-signed certificate.
Was this page helpful?