Dashboard
Total Users
Total Groups
Active Protocols
3
Protocols
SCIM 2.0
Google Directory API
LDAP / LDAPS
SAML 2.0
OAuth 2.0
OpenID Connect
Provisioning Endpoints
Users
Groups
Getting Started
Users
User Email Status ID
Groups
Group Members ID
Google Directory API — Endpoints Active

Drop-in replacement for the Google Admin SDK Directory API. Point your app at these URLs instead of admin.googleapis.com.

Service Account Credentials

Generate a service account credential file to configure your client application. This mirrors the structure of a Google Cloud service account key.

API Console
Live
Incoming Requests 0 entries
No requests yet — make an API call to see it here
Checking…
LDAPS Server Configuration
Active

LDAPS (LDAP over SSL/TLS) allows SaaS applications like Forcepoint, Palo Alto, and others to securely sync users and groups from your directory using the standard LDAP protocol.

Non-standard ports (10389 / 10636): Hosting on NearlyFreeSpeech.net (and most shared hosts) blocks privileged ports 389 and 636. The mock LDAP daemon runs on 10389 (LDAP) and 10636 (LDAPS) instead. Forcepoint and most enterprise tools support custom ports in the Connection URL.
Connection
Bind Credentials
Service Enabled
LDAP Schema Mapping

Configure how your IdP directory maps to LDAP object classes and attributes. These settings determine how LDAP clients discover and read users and groups.

Users
Groups
TLS / SSL Certificate

LDAPS requires a valid TLS certificate. Import the certificate into Forcepoint's trusted store so it can verify the LDAPS connection. Click Download .crt to get the file, then upload it in Forcepoint under SSL Inspection > Trusted Root Certificates.

Loading certificate info...
Directory Browser
0 entries
Forcepoint Web Security — Add LDAPS
Integration Guide
Enabled

In Forcepoint ONE / Web Security, navigate to Settings > Identity Management > Add LDAPS. Copy the values below into each field exactly as shown.

Vendor
Others
General
Default
www.anthonybennis.com
Direct
Identity Server IdP — LDAPS directory service
Server Settings
cn=admin,dc=anthonybennis,dc=com
••••••••
ldaps://anthonybennis.com:10636
1
30
LDAPS Schema
dc=anthonybennis,dc=com
ou=People,dc=anthonybennis,dc=com
ou=Groups,dc=anthonybennis,dc=com
ou=People,dc=anthonybennis,dc=com
User Schema
givenName
sn
(Leave empty — not required for this directory)
(Leave empty — not applicable)
mobile
cn
mail
(&(objectCategory=person)(objectClass=user))
entryUUID
member
uid
(Leave empty — not required for this directory)
(Leave empty — Active Directory only)
(Leave empty — Active Directory only)
(Leave empty — Active Directory only)
(Leave empty — Active Directory only)
Group Schema
(objectCategory=group)
entryUUID
cn
mail
Organization Unit Schema
(objectClass=organizationalUnit)
LDAP Request Console
Live
LDAP Operations 0 entries
No LDAP requests yet — connect an LDAP client to see activity here
SCIM 2.0 Endpoints Active
Loading…
Authentication

Configure the bearer token your SaaS application sends when calling SCIM endpoints.

Authorization: Bearer <your-token>
Not configured
Supported Operations
Create User
Update User
Deactivate User
Delete User
Create Group
Update Group Membership
PATCH Operations
Filter Queries