Configuration
Basic information:- Name: the display name shown to your users (e.g. 
JumpCloud) - Identity Provider ID: a human-readable unique string, only lower-case alphabets and hyphens are allowed (e.g. 
jumpcloud) - Domain: the domain name to scope associated users (e.g. 
jumpcloud.com, optional) 
- Host: the host of LDAP server (e.g. 
ldap.jumpcloud.com) - Port: the port number of the LDAP server, usually 389 for StartTLS and 636 for LDAPS
 - Bind DN: the Distinguished Name (DN) of the user to bind as a service account to perform search requests (e.g. 
uid=system,ou=Users,dc=jumpcloud,dc=com) - Bind Password: the password of the user to bind as a service account
 - Base DN: the base Distinguished Name (DN) to search for users (e.g. 
ou=users,dc=jumpcloud,dc=com) - User Filter: the filter to search for users (e.g. 
(uid=%s), where%swill be subsituted by the username) - Security protocol: the security protocol to be used for establishing connections with the LDAP server
 
- Email: the attribute to be used as the Bytebase user email address (e.g. 
mail) - Display name: the attribute to be used as the Bytebase user display name (e.g. 
displayName, optional) - Phone: the attribute to be used as the Bytebase user phone number (e.g. 
phone, optional) 
JumpCloud
The attribute 
uid is the username (e.g. system) not the email (e.g. system@example.com) in JumpCloud.- Follow the JumpCloud Use Cloud LDAP to create an LDAP binding user and add Users to the LDAP directory.
 - In Bytebase, go to Settings > SSO to create a new LDAP provider (all values are examples):
- Name: 
JumpCloud - Identity Provider ID: 
jumpcloud - Domain: 
jumpcloud.com - Host: 
ldap.jumpcloud.com - Port: 
389 - Bind DN: 
uid=YOUR_USERNAME,ou=Users,o=YOUR_ORG_DN,dc=jumpcloud,dc=com - Bind Password: 
YOUR_PASSWORD - Base DN: 
ou=Users,o=YOUR_ORG_NAME,dc=jumpcloud,dc=com - User Filter: 
(&(objectClass=posixAccount)(uid=%s)) - Security protocol 
StartTLS - Email: 
mail - Display name: 
displayName 
 - Name: 
 
Okta
The attribute 
uid is the username (e.g. system) not the email (e.g. system@example.com) in Okta.- Follow the Okta Enable the LDAP interface to enable LDAP interface for your directory.
 - In Bytebase, go to Settings > SSO to create a new LDAP provider (all values are examples):
- Name: 
Okta - Identity Provider ID: 
okta - Domain: 
okta.com - Host: 
YOUR_SUBDOMAIN.ldap.okta.com - Port: 
389 - Bind DN: 
uid=YOUR_USERNAME,ou=users,dc=YOUR_SUBDOMAIN,dc=okta,dc=com - Bind Password: 
YOUR_PASSWORD - Base DN: 
ou=users,dc=YOUR_SUBDOMAIN,dc=okta,dc=com - User Filter: 
(&(objectClass=inetOrgPerson)(uid=%s)) - Security protocol 
StartTLS - Email: 
mail - Display name: 
cn 
 - Name: 
 

