You click “Login with LDAP.” It spins, then fails. Another ticket opened, another “user not found” mystery. If your Phabricator instance and LDAP directory keep arguing about who’s in charge, you are not alone. Getting these two to agree on identity is one of those technical chores that feels simple until you try it.
LDAP Phabricator integration connects your enterprise directory with your development workflow. LDAP (Lightweight Directory Access Protocol) keeps credentials and user data consistent. Phabricator manages code reviews, tasks, and repositories. Together, they promise one login, one source of truth, and one less spreadsheet of user accounts. When done right, onboarding and offboarding happen automatically, and permission changes flow without a Slack apology to ops.
At its core, LDAP Phabricator works through identity federation. Authentication delegates to LDAP, while Phabricator syncs user profiles to match directory records. Group attributes can define project membership or repository access. This setup replaces local accounts with centralized control, aligning with what systems like Okta or AWS IAM do at scale. Password resets, security rules, and audit trails all live in one place—the directory—while Phabricator focuses on collaboration.
How do I connect LDAP and Phabricator?
You point Phabricator’s authentication stack to your LDAP server and match attribute names for user IDs and emails. Once linked, login requests route through LDAP, and new user sessions generate automatically. Many teams test with read-only permissions first, then expand to full synchronization once confidence builds.