Skip to main content

IMPORTANT - Product End of Life Statement - IMPORTANT

Request RE, Survey, and Calendar 1.5 Support Ending December 31, 2020
Contact Kinetic Data Support with Questions
Kinetic Community

Tutorial: Bridging with LDAP

You can connect to Lightweight Diretory Access Protocol (LDAP) information sources with Kinetic Bridging.

Kinetic Bridging with LDAP

LDAP bridging allows you to connect to external LDAP information stores so you can collect, present, and use that data in Kinetic Request.

Configuring the LDAP Bridge Console

After installing the LDAP Bridge, here's how to configure it to point to your LDAP data source. We'll demonstrate the process by pointing to an open server that's freely available for testing.

  • Server:
  • Port: 389
  • Security Principal: cn=stuart,ou=Users,dc=testathon,dc=net
  • Security Credentials: stuart
  • Search Base: dc=testathon,dc=net
  • Page Size: 50
  • Maximum Pages: 20

You can test connectivity to the LDAP server by clicking the Update button at the bottom of the page. If you've set it up correctly, the word initialized will appear next to the Bridge Settings heading.

Configuring the Bridge Console



Identifying Your Sources

Seeing the structure of the source data can help you understand what you're searching for. A tool like Softerra's LDAP Browser can be very helpful for this kind of work.  Here's how to configure the Softerra tool for the "testathon" server.

  • Host:
  • Base DN: dc=testathon,dc=net
  • Mechanism: Simple
  • Principal: cn=stuart,ou=Users,dc=testathon,dc=net
  • Password: stuart

Configuring Softerra's LDAP Browser


When you've connected to the server with the LDAP browser, you can easily see how the data is laid out.  For example, here's the "person record" for a guy named Dennis Doorbell.

Viewing Data in the LDAP Browser


We've highlighted the attribute "inetOrgPerson" because the objectClass is what the LDAP Bridge uses as the data source structure value. In other words, where the ARS Bridge uses a form name, the LDAP Bridges uses the source value of the objectClass. And in this case, it's "inetOrgPerson".

Configuring the Kinetic Bridge Manager

The Structures Tab

Using either Remedy User or the Mid Tier client, open up the Bridge Manager. On the Structures tab, create a new Model; then add the Model Attributes that we intend to retrieve from the testathon server. In our example, we used "Test People" with the following attributes:

  • Email
  • First Name
  • Last Name
  • Phone
  • User ID

Creating a New Model


For testing, we want two kinds of Qualifications: one that returns multiple results, and another that returns what we hope will be a single result. We called one "All" and the other "by User ID". The "All" qualification has no parameters, but for "by User ID," we created a Qualification Parameter called "UserID".

Creating Qualifications and Parameters


The Bridges Tab

Create your Bridge "connection" using the Bridge Path from the web console as the Bridge URL.


The Mappings Tab

Now it's time to "wire up" the elements from the source data store. First, create a Model Mapping entry by clicking the Add button under the Model Mappings table. In our example, we called it "Test People (LDAP)." Connect the model to the correct Bridge connection by selecting the Bridge Name from the drop-down list. Finally, enter the objectClass value in the Structure field. In our case, it's inetOrgPerson.

Bridge Mapping Configuration

Next, you'll need to configure each Model Attribute Mapping entry. 

  • Email: <%=field["mail"]%>
  • First Name: <%=field["givenName"]%>
  • Last Name: <%=field["sn"]%>
  • Phone: <%=field["telephoneNumber"]%>
  • User ID: <%=field["uid"]%>

And finally, you'll need to flesh out the Qualification Mappings.

  • All
    • Query: (objectClass=inetOrgPerson)
    • Result Type: Multiple
  • by User ID
    • Query: (uid=<%=parameter["UserID"]%>)
    • Result Type: Single

Qualification Mapping Configuration

Using LDAP Bridge Data in a Service Item

To test our LDAP Bridge setup, we cloned an existing service item and then added two questions:

  • Person (as a Dynamic List)
  • Email (as Free Text)

The goal is for the Person field on the form to appear as a drop-down list of all people found on the testathon server. On selecting a person, we want to retrieve his or her email address and place it in the new Email field.

Configuring the Questions

First, we'll set the Person Question to use bridging.


From the Model drop-down menu, pick the LDAP model (e.g., "Test People"). Since we want to return all the people entries in the LDAP source, select the "All" Qualification from the drop-down list. Finally, select the User ID for both the Label and the Value.


Next, to set the returned email value into the Email question field, let's create an event. Click the event tab in the Question Dialog. We want the event to fire whenever the Person value changes, so the Event will be change.




Select the LDAP Model and the "single" Qualification -- by User ID. For the Parameter Name/Parameter Value settings, use the Add Fields menu in the Parameter dialog to pick the field designation for the Person question. See the highlighted box below.

Select the Parameter


Next, we'll create a destination field for our email value. Click the Add button next to the second table in the Set Fields dialog.

Choose Destination Field 01


From the Question drop-down in the Destination section, pick the newly created Email field. Next, from the Attribute field in the Source section, pick Email.  Finally, click the Add button next to the Attribute field. You should see something like this:

Choose Destination Field 02

The Value field will now contain:  <%=attribute["Email"]%>

Click Save. Then click Save again in the Set Fields dialog. Then Save the Question. And finally, Save the Service Item itself.

Testing the Service Item

Click Open Anonymous in the Service Catalog Console. Log into Kinetic Request, if prompted.

Click the down arrow button in the Person field to activate the drop-down menu. 

Click Person Field

The LDAP Bridge returns all people records from the server and by default alphabetizes them. Now select "alice" from the list.

Email Returned


How It Looks in the Bridge Log

I've you've enabled trace logging, you'll see the queries and their return values.


2013-03-12 10:18:34,481 TRACE [http-8085-1           ] - Searching Ldap Records:
2013-03-12 10:18:34,481 TRACE [http-8085-1           ] -   Structure: inetOrgPerson
2013-03-12 10:18:34,481 TRACE [http-8085-1           ] -   Query: (objectClass=inetOrgPerson)
2013-03-12 10:18:34,481 TRACE [http-8085-1           ] -   Fields: uid,uid
2013-03-12 10:18:35,643 DEBUG [http-8085-1           ] - Processing Time: 1162
2013-03-12 10:18:35,654 DEBUG [http-8085-1           ] - Received response:
2013-03-12 10:22:47,320 TRACE [http-8085-1           ] - Incoming request for com.kineticdata.bridge.bootstrap.BridgeServlet:
2013-03-12 10:22:47,320 TRACE [http-8085-1           ] -   Request URI:  /kineticLdapBridge2/api/1.0/retrieve
2013-03-12 10:22:47,320 TRACE [http-8085-1           ] -   Servlet Path: /api/1.0
2013-03-12 10:22:47,320 TRACE [http-8085-1           ] -   Context Path: /kineticLdapBridge2
2013-03-12 10:22:47,321 DEBUG [http-8085-1           ] - Processing API request.
2013-03-12 10:22:47,321 TRACE [http-8085-1           ] - Retrieving Ldap Records:
2013-03-12 10:22:47,321 TRACE [http-8085-1           ] -   Structure: inetOrgPerson
2013-03-12 10:22:47,321 TRACE [http-8085-1           ] -   Query: (uid=<%=parameter["UserID"]%>)
2013-03-12 10:22:47,325 TRACE [http-8085-1           ] -   Fields: mail
2013-03-12 10:22:48,470 DEBUG [http-8085-1           ] - Processing Time: 1149
2013-03-12 10:22:48,470 DEBUG [http-8085-1           ] - Received response: