Skip to Content

Configure AD Settings

⏱️5 minutes

Configure the connection between AD Unlock and your Active Directory.

Steps

1. Navigate to Settings

  1. Log in to admin.adunlock.me 
  2. Go to SettingsActive Directory

2. Configure Connection

Fill in the following fields:

FieldValueExample
AD ServerDomain Controller FQDNdc01.company.local
PortLDAPS port636
TLS ModeConnection securityLDAPS
Base DNRoot of AD searchDC=company,DC=local

3. Configure Service Account

FieldValueExample
Service AccountUPN or DOMAIN\usersvc_adunlock@company.local
PasswordService account password•••••••

The password is encrypted and stored securely. It’s never logged or exposed.

4. Configure Allowed OUs

Specify which OUs contain users who can use self-service:

OU=Staff,OU=Users,DC=company,DC=local OU=Remote,OU=Users,DC=company,DC=local OU=Contractors,DC=company,DC=local

Only users in these OUs will be able to use AD Unlock. Use this to limit scope.

5. Configure Denied Groups

Important: Block privileged accounts from self-service:

Domain Admins Enterprise Admins Schema Admins Account Operators Server Operators Backup Operators

Security requirement: Always deny Domain Admins and Enterprise Admins. Privileged accounts should not use self-service password reset.

6. Test Connection

Click Test Connection to verify settings.

Expected Result
✅ Connection successful ✅ Bind successful (as svc_adunlock) ✅ Search successful (found 150 users in base DN) ✅ Service account has required permissions
🔧If Something Goes Wrong
SymptomCauseSolution
Connection timeoutDC not reachableCheck firewall, verify DC hostname
Bind failedWrong credentialsVerify service account UPN and password
0 users foundWrong Base DNVerify Base DN matches your AD structure
Missing permissionsDelegation not completeRe-run permissions script

Full Configuration Example

# Example AD settings server: dc01.company.local port: 636 tls_mode: ldaps base_dn: DC=company,DC=local service_account: svc_adunlock@company.local service_password: ${AD_SERVICE_PASSWORD} # From environment allowed_ous: - "OU=Staff,OU=Users,DC=company,DC=local" - "OU=Remote,OU=Users,DC=company,DC=local" denied_groups: - "Domain Admins" - "Enterprise Admins" - "Schema Admins" - "Account Operators"

Next Step

Last updated on