Authenticating against active directory using python + ldap

How do I authenticate against AD using Python + LDAP. I'm currently using the python-ldap library and all it is producing is tears.

I can't even bind to perform a simple query:

import sys
import ldap

Server = "ldap://my-ldap-server"
DN, Secret, un = sys.argv[1:4]

Base = "dc=mydomain,dc=co,dc=uk"
Scope = ldap.SCOPE_SUBTREE
Filter = "(&(objectClass=user)(sAMAccountName="+un+"))"
Attrs = ["displayName"]

l = ldap.initialize(Server)
l.protocol_version = 3
print l.simple_bind_s(DN, Secret)

r =, Scope, Filter, Attrs)
Type,user = l.result(r,60)
Name,Attrs = user[0]
if hasattr(Attrs, 'has_key') and Attrs.has_key('displayName'):
  displayName = Attrs['displayName'][0]
  print displayName


Running this with password username gives me one of two errors:

Invalid Credentials - When I mistype or intentionally use wrong credentials it fails to authenticate.

ldap.INVALID_CREDENTIALS: {'info': '80090308: LdapErr: DSID-0C090334, comment: AcceptSecurityContext error, data 52e, vece', 'desc': 'Invalid credentials'}


ldap.OPERATIONS_ERROR: {'info': '00000000: LdapErr: DSID-0C090627, comment: In order to perform this operation a successful bind must be completed on the connection., data 0, vece', 'desc': 'Operations error'}

What am I missing out to bind properly?

I am getting the same errors on fedora and windows.

I was missing

l.set_option(ldap.OPT_REFERRALS, 0)

From the init.

Use this option if you want to have your application authenticate against AAD using its own credentials, rather than those of a user. Using this process, your application will receive the tokens necessary to use the Data Lake Analytics Python SDK as a service principal, which represents your application in AAD.

If you are open to using pywin32, you can use Win32 calls from Python. This is what we do in our CherryPy web server:

import win32security
token = win32security.LogonUser(
authenticated = bool(token)

Authenticating your Python application against Azure Active Directory Overview. When building an application that uses the Python SDK for Data Lake Analytics (ADLA), you need to pick how Required Python packages. Required imports. To simplify the code samples, ensure you have the following

That worked for me, l.set_option(ldap.OPT_REFERRALS, 0) was the key to access the ActiveDirectory. Moreover, I think that you should add an "con.unbind()" in order to close the connection before finishing the script.

For a school project, we have to implement LDAP authentication in edX. edX is build on Django and Python, so I decided to explore how to implement LDAP with Python.. I’m not a Microsoft fan, but to mirror the deployment set-up, we decided to use Microsoft Server with Active Directory.

Here's some simple code that works for me.

import ldap  # run 'pip install python-ldap' to install ldap module.
conn ="")
conn.simple_bind_s("", "mypassword")

This is based on a previous answer.

Before the Azure Active Directory Authentication Library (ADAL) for Python was available, you has to use the now-deprecated UserPassCredentials class. This class doesn't support two-factor authentication and should no longer be used. See also. Configure your local Python dev environment for Azure; Example: Provision a resource group

if you have Kerberos installed and talking to AD, as would be the case with, say, Centrify Express installed and running, you might just use python-kerberos. E.g.

import kerberos

would return True a user 'joe' has password 'pizza' in the Kerberos realm X.PIZZA.COM. (typically, I think, the latter would be the same as the name of the AD Domain)

Authenticating against active directory using python+ldap (8) How do I authenticate against AD using Python + LDAP. I'm currently using the python-ldap library and all it is producing is tears. I can't even bind to perform a simple query:

ldap_tls_cacert is the path to your Active Directory CA certificate, in PEM format ldap_user_ssh_public_key is the AD user’s attribute that SSSD will look for the SSH public key Note:

AD DS security is key for any environment as it is foundation of identity protection. Before look in to improvements of AD DS security in an environment, it is important to understand how Active Directory authentication works with Kerberos. In this post I am going to explain how AD authentication works behind the scene. In infrastructure, there are different types of authentication protocols

Authentification contre active directory en utilisant python + ldap Comment puis-je m'authentifier contre la publicité en utilisant Python + LDAP. J'utilise actuellement la bibliothèque python-ldap et tout ce qu'elle produit c'est des larmes. Je ne peux même pas me lier pour effectuer une simple requête:

  • "...and all it is producing is tears." Does tears rhyme with Bears or Beers?
  • The root cause of this bug is that you have referrals in the initial response and the windows LDAP code does not send the credentials to the referral server. If you used kerberos credentials it should work.
  • I had different symptoms but this same option fixed my problem. Summarized it in a blog post:…
  • Not sure if related, but I had the same problem and it seems 1729's solution did something - But sometimes the LDAP server just answers INVALID CREDENTIALS immediately. After a while it calms down and works again.
  • simple and clean! Thanks!
  • This solution worked for me in a Python Flask application while behind a restrictive NTLM corporate proxy. Some other LDAP-based options simply wouldn't work.
  • From the python-ldap documentation: Instances of LDAPObject are returned by initialize(). The connection is automatically unbound and closed when the LDAP object is deleted.
  • You close the session, not the connection.
  • This doesn't work anymore, you'll receive AttributeError: module 'ldap' has no attribute 'open'