Connectors
Connectors sync users from external identity providers (Google Workspace, Azure AD, Okta, LDAP) into IronWifi. Once connected, users can authenticate to WiFi using their existing credentials without creating separate accounts.
How Connectors Work
- Sync - IronWifi pulls user and group information from the external source
- Authenticate - Authentication requests can be forwarded to the external provider
- Update - Changes in the external source are reflected in IronWifi
Available Connectors
Google Workspace
Sync users from Google Workspace (formerly G Suite):
- Import users and groups
- Authenticate against Google credentials
- Auto-sync on schedule
See: Google Integration
Azure Active Directory
Connect to Microsoft Azure AD:
- User and group synchronization
- SAML or OAuth authentication
- Support for hybrid environments
See: Azure Integration
LDAP/Active Directory
Connect to on-premises directories:
- Microsoft Active Directory
- OpenLDAP
- Other LDAP-compliant directories
Requirements:
- Network connectivity to LDAP server
- Service account credentials
- LDAPS recommended for security
REST API
Authenticate against custom backends:
- Custom user databases
- Third-party systems
- Internal applications
Configuration:
- Authentication endpoint URL
- Expected request/response format
- Timeout settings
Creating a Connector
- Navigate to Connectors
- Click Add Connector
- Select connector type
- Configure connection settings
- Test the connection
- Enable synchronization
Connector Settings
Sync Options
| Setting | Description |
|---|---|
| Auto-sync | Automatically sync on schedule |
| Sync interval | How often to sync (hourly, daily) |
| Sync scope | Which users/groups to sync |
Authentication Options
| Setting | Description |
|---|---|
| Auth forwarding | Forward auth requests to external provider |
| Fallback | Use local auth if external fails |
| Cache credentials | Cache for offline authentication |
User Mapping
Map external attributes to IronWifi fields:
- Username → username
- Email → email
- Display Name → fullname
- Department → organizational_unit
Testing Connectors
Connection Test
Verify connectivity to the external system:
- Click Test Connection
- Review results
- Fix any errors shown
Sync Test
Test user synchronization:
- Click Test Sync
- Review users that would be imported
- Verify attribute mapping
Authentication Test
Test authentication forwarding:
- Enter test credentials
- Click Test Authentication
- Verify success/failure
Troubleshooting
Connection Failed
- Verify network connectivity
- Check firewall rules
- Confirm credentials are correct
- Review SSL certificate (if using LDAPS)
Sync Issues
- Check sync logs for errors
- Verify user/group filters
- Confirm attribute mapping
- Check for duplicate usernames
Authentication Failed
- Test with known-good credentials
- Check auth forwarding settings
- Review external provider logs
- Verify user exists in IronWifi
Best Practices
- Use dedicated service accounts - Don't use personal credentials
- Enable HTTPS/LDAPS - Always use encrypted connections
- Regular sync - Keep users up to date
- Monitor logs - Watch for sync failures
- Test after changes - Verify functionality after configuration changes