Skip to main content

Connectors

Connectors sync users from external identity providers (Google Workspace, Azure AD, Okta, LDAP) into IronWifi. Once connected, users can authenticate to WiFi using their existing credentials without creating separate accounts.

How Connectors Work

  1. Sync - IronWifi pulls user and group information from the external source
  2. Authenticate - Authentication requests can be forwarded to the external provider
  3. Update - Changes in the external source are reflected in IronWifi

Available Connectors

Google Workspace

Sync users from Google Workspace (formerly G Suite):

  • Import users and groups
  • Authenticate against Google credentials
  • Auto-sync on schedule

See: Google Integration

Azure Active Directory

Connect to Microsoft Azure AD:

  • User and group synchronization
  • SAML or OAuth authentication
  • Support for hybrid environments

See: Azure Integration

LDAP/Active Directory

Connect to on-premises directories:

  • Microsoft Active Directory
  • OpenLDAP
  • Other LDAP-compliant directories

Requirements:

  • Network connectivity to LDAP server
  • Service account credentials
  • LDAPS recommended for security

REST API

Authenticate against custom backends:

  • Custom user databases
  • Third-party systems
  • Internal applications

Configuration:

  • Authentication endpoint URL
  • Expected request/response format
  • Timeout settings

Creating a Connector

  1. Navigate to Connectors
  2. Click Add Connector
  3. Select connector type
  4. Configure connection settings
  5. Test the connection
  6. Enable synchronization

Connector Settings

Sync Options

SettingDescription
Auto-syncAutomatically sync on schedule
Sync intervalHow often to sync (hourly, daily)
Sync scopeWhich users/groups to sync

Authentication Options

SettingDescription
Auth forwardingForward auth requests to external provider
FallbackUse local auth if external fails
Cache credentialsCache for offline authentication

User Mapping

Map external attributes to IronWifi fields:

  • Username → username
  • Email → email
  • Display Name → fullname
  • Department → organizational_unit

Testing Connectors

Connection Test

Verify connectivity to the external system:

  1. Click Test Connection
  2. Review results
  3. Fix any errors shown

Sync Test

Test user synchronization:

  1. Click Test Sync
  2. Review users that would be imported
  3. Verify attribute mapping

Authentication Test

Test authentication forwarding:

  1. Enter test credentials
  2. Click Test Authentication
  3. Verify success/failure

Troubleshooting

Connection Failed

  • Verify network connectivity
  • Check firewall rules
  • Confirm credentials are correct
  • Review SSL certificate (if using LDAPS)

Sync Issues

  • Check sync logs for errors
  • Verify user/group filters
  • Confirm attribute mapping
  • Check for duplicate usernames

Authentication Failed

  • Test with known-good credentials
  • Check auth forwarding settings
  • Review external provider logs
  • Verify user exists in IronWifi

Best Practices

  1. Use dedicated service accounts - Don't use personal credentials
  2. Enable HTTPS/LDAPS - Always use encrypted connections
  3. Regular sync - Keep users up to date
  4. Monitor logs - Watch for sync failures
  5. Test after changes - Verify functionality after configuration changes