The Okta Active Directory (AD) LDAP filter feature provides granular control over user and group imports by allowing customers to apply LDAP queries during import. This functionality enables administrators to define precise import scopes in large environments where standard Organizational Unit (OU) selection is insufficient.
This Early Access feature may be useful when:
-
Administrators require specific filtering beyond the OU level.
-
Large or complex AD deployments necessitate high-performance import queries.
- Okta Identity Engine (OIE)
- Okta Classic Engine
- Active Directory
- Import Settings
- AD LDAP Filter
How are Okta AD LDAP filters configured and tested?
The AD LDAP filter functions as a refinement tool for OUs already selected in the AD integration configuration within Okta, providing further filtering only within selected OUs.
The AD LDAP Filter is an Early Access feature. Submit an Okta Support request to have this feature enabled. Once enabled, the feature will add new fields for User Filter and Group Filter within the directory integration settings where custom LDAP queries can be applied.
Misconfigured LDAP filters can lead to unintended user deprovisioning or application unassignment. If the filter incorrectly excludes valid users, Okta will assume those users no longer exist in the directory and may deactivate the users.
Before applying a filter to a production environment, use the following steps to verify the LDAP query within the AD environment to prevent accidental deprovisioning:
-
Open Active Directory Users and Computers.
-
Right-click Saved Queries, select New, and then select Query.
-
Enter a name for the query and select Define Query....
-
In the Find field, select Custom Search, and then select the Advanced tab.
-
Enter the LDAP query and select OK.
-
Review the populated results to ensure all intended objects appear.
NOTE: Objects missing from this list will not be imported into Okta.
Implementation Considerations
Adhere to these guidelines to ensure import reliability:
-
Incremental Imports: If a filter relies on the
memberOfattribute, incremental imports might fail to detect changes because group membership updates do not modify theuSNChangedvalue of a user. -
Multi-Domain Environments: The
memberOfattribute can be unreliable when accessed via the Global Catalog in multi-domain setups. -
Native Attributes: Filter using attributes native to the user object that remain available in the Global Catalog for the best results.
NOTE: Okta Support does not provide assistance with the design or troubleshooting of custom LDAP queries.
