The root cause is how LDAP sync configuration handles user DN mapping when credentials change. Let me break down what’s happening and provide the complete solution.
LDAP Sync Configuration Issue:
Agile’s LDAP connector performs two distinct operations:
- User authentication (login validation)
- Credential synchronization (password propagation from AD)
Authentication works recursively by default - it searches the entire directory tree from the base DN. That’s why ECN users can initially log in.
Credential propagation does NOT search recursively - it expects an exact DN match based on the configured mapping. When AD passwords change, the sync process:
- Queries base DN for user accounts
- Builds DN string using mapping template
- Attempts to bind with new credentials
- Updates Agile user record if successful
For nested OUs, the DN construction fails because the mapping template doesn’t include the intermediate OU.
User DN Mapping Fix:
Instead of adding multiple base DNs, configure the DN mapping to search dynamically:
-
Admin Console > System Settings > LDAP Configuration
-
Locate ‘User DN Mapping’ section
-
Current setting likely shows:
DN Template: CN={username},OU=Engineering,DC=company,DC=com
-
Change to dynamic search mapping:
DN Search Base: DC=company,DC=com
DN Search Filter: (sAMAccountName={username})
DN Search Scope: subtree
This makes the connector search the entire directory tree to find the user’s actual DN, regardless of OU structure.
Credential Propagation Configuration:
Verify these settings are enabled:
- ‘Sync passwords on change’ = true
- ‘Password sync interval’ = 300 seconds (5 min)
- ‘Enable recursive search’ = true (if available in 9.3.5)
In ldap_connector.properties, add:
ldap.sync.recursive=true
ldap.dn.resolution=dynamic
ldap.auth.fallback=true
Module-Specific Consideration:
ECN Management has stricter authentication requirements due to compliance tracking. The module caches credentials differently than others. After fixing the DN mapping, force a credential refresh:
- Clear cached credentials: Admin > User Management > Bulk Operations > ‘Reset Authentication Cache’
- Force immediate sync: Admin > LDAP Configuration > ‘Sync Now’ button
- Monitor ldap_sync.log for successful DN resolution
Testing Steps:
-
Have an ECN user change their AD password
-
Wait 5 minutes for sync interval
-
Check ldap_sync.log - should show:
DN resolved: CN=John Smith,OU=ECN,OU=Engineering,DC=company,DC=com
Credential sync successful for user: jsmith
-
User should be able to log into ECN Management with new password
Why This Affects ECN Specifically:
ECN Management module enforces stricter audit trails for engineering changes. It validates credentials on every operation, not just at login. When credential propagation fails, the cached password becomes stale, causing lockouts during ECN operations even if initial login succeeded.
After implementing dynamic DN mapping, all users regardless of OU structure will sync properly when passwords change in Active Directory.