Categories
Categories
Warehouse: United States
VMS 10 Min Read

How to configure LDAP with AD on an Exacq VMS Server

#Enterprise #Exacq #Active Directory
Published Feb 6, 2026
How to configure LDAP with AD on an Exacq VMS Server

How to Configure LDAP in exacqVision (Microsoft AD + Azure AD, LDAP + LDAPS)

This guide shows how to connect an exacqVision server to:

  • Microsoft Active Directory (on-prem AD DS), or
  • Azure AD via Microsoft Entra Domain Services (Azure AD Domain Services / “AAD DS”)

…and how to use either:

  • LDAP (389), or
  • LDAPS (636 / SSL)

0. Know what “Azure AD LDAP” actually means

Microsoft Entra ID (formerly Azure AD) does not natively expose LDAP. When people say “Azure AD LDAP”, they typically mean Microsoft Entra Domain Services (Azure AD DS), which provides a managed domain compatible with LDAP/LDAPS for legacy apps.

So your “directory type” choice is usually:

  • On-prem AD DS (your domain controllers)
  • Microsoft Entra Domain Services (Azure AD DS) (managed domain in Azure that integrates with your Entra ID tenant)

1. Prerequisites and compatibility

Licensing

  • The ActiveDirectory/LDAP tab is only available with exacqVision Enterprise.

Version notes (important for Azure AD DS integrations)

  • If you are integrating with Azure AD DS / Entra Domain Services, confirm your exacqVision Server/Client versions meet the minimums described by Exacq for “Azure AD LDAP authentication” support.

Information you need from IT

Regardless of AD vs Azure AD DS, collect:

  • Directory host (FQDN/IP)
  • Base DN
  • Bind account + password
  • Whether you will use LDAP or LDAPS
  • If using LDAPS: certificate trust requirements (and whether exacqVision server needs a CA cert imported)

2. Choose your connection mode (quick decision guide)

Option A — Microsoft AD (on-prem)

  • Hostname/IP: a domain controller (or a load-balanced LDAP endpoint)
  • LDAP: port 389
  • LDAPS: port 636, enable Use SSL

Option B — Azure AD via Entra Domain Services (Azure AD DS)

  • Hostname/IP: the managed domain endpoint for Azure AD DS
  • LDAP: typically 389 (within VNet / private connectivity scenarios)
  • LDAPS: 636, requires enabling “Secure LDAP” in Azure AD DS and certificate setup

If your exacqVision Server is on-prem and Azure AD DS is in Azure, you’ll also need network connectivity (VPN/ExpressRoute) and firewall rules to allow the LDAP/LDAPS ports.


3. Configure LDAP/LDAPS in exacqVision

  1. Open exacqVision Client
  2. Go to Config (Setup)
  3. In the navigation tree, select your server → Configure System
  4. Open the ActiveDirectory/LDAP tab
  5. Check Enable Directory Service
  6. Set the following fields:

Required fields

  • Hostname/IP Address
    • AD: dc01.example.com
    • Azure AD DS: aaddscontoso.com (your managed domain name / endpoint)
  • Schema
    • Select the appropriate LDAP schema option available (commonly “LDAP Schema” in many deployments)
  • Password / Confirm
    • The bind/service account password (or whatever the tab expects in your deployment)

Port + encryption (LDAP vs LDAPS)

  • LDAP (unencrypted):
    • Port: 389
    • Use SSL: unchecked
  • LDAPS (encrypted):
    • Port: 636
    • Use SSL: checked
  • Click Apply
  • Click Query AD/LDAP to test connectivity

4. Azure AD DS / Entra Domain Services: enable LDAPS (if you choose LDAPS)

If you chose LDAPS with Azure AD DS:

  1. In Microsoft Entra Domain Services, enable Secure LDAP
  2. Configure certificates per Microsoft guidance
  3. Ensure the network security group/firewall rules allow TCP 636 only from trusted source IPs (recommended)
  4. Use that Azure AD DS endpoint + port 636 + Use SSL in exacqVision

5. Add LDAP users/groups to exacqVision (so they can log in)

Once the directory connection succeeds, map directory identities into exacqVision.

Enterprise Users (recommended for multi-system environments)

  1. Open Enterprise Users
  2. Click Query AD/LDAP
  3. Choose a domain/Base DN (if prompted)
  4. Search for the user/group and select it
  5. Select which servers the user/group can access
  6. Click Apply to Selected Systems
  7. In the Add Systems window, select Use Single Sign-On (important)

If you don’t select Use Single Sign-On, LDAP users/groups can fail to log on.

Single-system environments

Use the server’s Users window and the Query AD/LDAP option there to search and add directory users/groups.


6. Common troubleshooting

Connection test fails (Query AD/LDAP)

  • Confirm DNS + routing from the exacqVision Server to the directory endpoint
  • Confirm firewall ports:
    • LDAP: 389
    • LDAPS: 636
  • Confirm bind account credentials
  • Confirm Base DN is correct (wrong Base DN = “no results” or failed queries)

LDAPS issues

  • The most common cause is certificate trust
    • Your exacqVision Server may need the issuing CA certificate imported/available so it trusts the directory’s LDAPS certificate.
  • If enabling LDAPS flips the port/connection behavior, re-test with Query AD/LDAP immediately after changes.

Users can’t log in after being added

  • Re-check that Use Single Sign-On was selected when applying the LDAP user/group to the target server(s).

7. Security recommendations (practical defaults)

  • Prefer LDAPS over LDAP whenever possible.
  • For Azure AD DS, avoid exposing LDAPS broadly to the internet; restrict TCP 636 to known source IPs.
  • Use a dedicated service account for binds, with least privilege needed to read users/groups.
  • Keep a local admin account enabled until LDAP auth is confirmed working end-to-end.

Frequently Asked Questions

Always use LDAPS (port 636) in production environments. Standard LDAP transmits credentials in cleartext, which means any device on the network path can capture usernames and passwords with a packet sniffer. LDAPS encrypts the entire session with TLS. If your domain controller does not have a valid TLS certificate, you can use StartTLS on port 389 as a fallback, but a properly issued certificate (even from an internal CA) is strongly recommended.

Not directly. exacqVision uses standard LDAP/LDAPS bind operations, which Azure AD (Entra ID) does not natively support. You must enable Microsoft Entra Domain Services (formerly Azure AD Domain Services) in your Azure tenant, which provisions managed domain controllers that expose LDAPS on port 636. Once Entra Domain Services is running, exacqVision connects to it the same way it would connect to on-prem AD DS.

The most common causes are: (1) the Base DN is too narrow and does not include the OU where the user accounts reside—use a broader base like DC=company,DC=com; (2) the user is not a member of the AD security group mapped in exacqVision; (3) the LDAP filter is excluding the user's objectClass; or (4) the user's UPN (user@domain.com) vs sAMAccountName (DOMAIN\user) format does not match what exacqVision expects. Check the exacqVision server logs under /usr/local/exacq/logs/ for detailed bind failure messages.

In the exacqVision Configuration Client, navigate to Users > LDAP Groups. Add each AD security group DN and assign it an exacqVision user profile (Admin, Power User, Live Only, etc.). When a user authenticates, exacqVision queries their group membership and applies the matching profile. If a user belongs to multiple mapped groups, the highest-privilege profile takes precedence. Create dedicated AD security groups (e.g., 'ExacqAdmins', 'ExacqViewers') rather than reusing broad groups like 'Domain Users'.

LDAP itself does not support MFA—it is a simple bind (username + password) protocol. If your organization requires MFA for VMS access, consider placing exacqVision behind a VPN or zero-trust network access (ZTNA) solution that enforces MFA at the network layer before the user reaches the exacqVision client. Some organizations also use smart card authentication at the Windows OS level on exacqVision workstations as a compensating control.


Related Products

NDAA Compliant
Exacq EVENIP-01 Enterprise License for exacqVision IP Camera, Includes 1-Year of Software Updates
NDAA Compliant
Exacq SSA-ENT-C Enterprise Current Version Upgrade
Exacq
Exacq SSA-ENT-C Enterprise Current Version Upgrade
SSA-ENT-C
Special Order
$452.81
NDAA Compliant
Exacq SSA-PRO-C Professional Current Version Update
Exacq
Exacq SSA-PRO-C Professional Current Version Update
SSA-PRO-C
Special Order
$338.39

Was this guide helpful?

Need specific configuration help? Contact our Engineering Team.