Corporate directory integration#

Mattermost offers advanced security and authentication options for integrating with corporate directories. This guide outlines the options available.

Basic authentication#

By default, Mattermost offers authentication via email and password, which offers basic features including:

  • Account sign up using email and password.

  • Password reset via email.

  • Ability to use the same credentials to log into web, desktop, and mobile app experiences.

  • Ability to use a username and password in place of email and password.

Security features for authentication#

A core set of features is available with all authentication options to help increase security:

  • Ability to set session length to define how long a user can use Mattermost before needing to re-enter credentials.

  • Ability for users to remotely sign out of devices.

  • Ability for IT admin to force sign out of a user from devices.

  • Ability to set rate limits on authentication API calls to deter password-guessing attacks.

  • Ability to require multi-factor authentication on log in.

  • For advanced deployments, password requirements for length and special characters can be added.

AD/LDAP authentication#

AD/LDAP is the most popular corporate directory integration option for deploying Mattermost behind a corporate firewall. Features include:

  • Account creation using AD/LDAP credentials.

  • AD/LDAP user filters to define which users get access to Mattermost in the form of a query.

  • Ability to use a low-privileged AD/LDAP account to run queries over a secure TLS or STARTTLS connection.

  • Attribute mapping to place First Name, Last Name, Nickname, and other attributes from AD/LDAP into Mattermost.

  • Customization of login screen to specify whether users are logging in with email, username, or other attribute.

  • Synchronization with AD/LDAP to disable, enable, and update Mattermost users based on AD/LDAP.

Note

  • New user accounts are created when new users log in with their AD/LDAP credentials. You can optionally pre-create user accounts using the bulk loading tool.

  • If youโ€™re using email or username and password authentication users can switch to AD/LDAP manually, and the conversion to AD/LDAP can also be done using the mmctl user migrate auth command by an IT admin.

For very large AD/LDAP instances you can also configure max page size to divide a Mattermost AD/LDAP query into several pieces to not overtax the authentication server when synchronizing.

Authentication options outside of a private network#

When deploying Mattermost to a DMZ location outside the security of a private network, additional authentication options include:

Generic OAuth is not currently supported.

Future authentication methods#

Mattermost releases new improvements monthly. Several additional authentication methods are planned, but not yet scheduled. If youโ€™re an enterprise interested in deploying with an option not yet provided in our documentation, talk to a Mattermost Expert to discuss further.