<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Directory Connector with Azure AD in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/2543627#M32619</link>
    <description>&lt;P&gt;I'm facing similar/same challenge now. If I understand this correctly, this solution only &lt;FONT color="#339966"&gt;&lt;STRONG&gt;works&lt;/STRONG&gt;&lt;/FONT&gt; for&amp;nbsp;&lt;STRONG&gt;Microsoft &lt;FONT color="#339966"&gt;Entra Domain Services&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;It &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;doesn't work&lt;/STRONG&gt;&lt;/FONT&gt; for &lt;STRONG&gt;Microsoft &lt;FONT color="#FF0000"&gt;Entra ID&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Is that right?&lt;/P&gt;&lt;P&gt;Meaning, there's still no way to setup a User Directory Connector that will work with Entra ID. Is that right?&lt;/P&gt;</description>
    <pubDate>Tue, 24 Feb 2026 19:46:51 GMT</pubDate>
    <dc:creator>mbespartochnyy</dc:creator>
    <dc:date>2026-02-24T19:46:51Z</dc:date>
    <item>
      <title>User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433893#M18000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, I had a User Directory Connector (UDC) configured with our on premises AD (filtering some users and cost centers) and using the default Virtual Proxy (VP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, we configured a new VP to Azure AD (AAD) to single sign-on (SSO) sucessfully. But have no idea how to filter the same cost centers to get the users from AAD. We tried to create a new UDC with a generic LDAP but no success (same URL from first UDC - I know, strage, but we gave it a shot).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw &lt;A href="https://community.qlikview.com/thread/233780" target="_blank"&gt;this post&lt;/A&gt; but I think the guys are stuck in the same point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the only way to ask the users access at least one time to then allocate a license to them? Or is there a way to get them from AAD via UDC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd really appreciate any help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2021 07:41:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433893#M18000</guid>
      <dc:creator>ennioaoki</dc:creator>
      <dc:date>2021-04-02T07:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433894#M18001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If someone need the info, we solved this issue:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Using the same Path and LDAP filter of the old UDC;&lt;/LI&gt;&lt;LI&gt;In Directory Entry Attributes, the Account Name as the same attribute used in claim with AAD (in our case, "mail");&lt;/LI&gt;&lt;LI&gt;And the User Identification attribute as "user" instead the default "inetOrgPerson";&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QS June 2017, BTW.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Sep 2017 17:45:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433894#M18001</guid>
      <dc:creator>ennioaoki</dc:creator>
      <dc:date>2017-09-05T17:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433895#M18002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ennio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;great information thank you very much.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In Directory Entry Attributes, the Account Name as the same attribute used in claim with AAD (in our case, "mail");&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;In this sentence, what is "the same attribute used in claim with AAD" ? Are you talking about a property of the Qlik Sense Virtual Proxy or a property of your Azure AD ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;Johann&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Oct 2017 19:16:19 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433895#M18002</guid>
      <dc:creator>jchoucq</dc:creator>
      <dc:date>2017-10-19T19:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433896#M18003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for delay, &lt;A href="https://community.qlik.com/qlik-users/7491"&gt;jchoucq&lt;/A&gt;‌. I don't know if still helps but is the property of AAD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;SPAN style="color: #636363; font-family: 'Segoe UI', 'Lucida Grande', Verdana, Arial, Helvetica, sans-serif; font-size: 13px; font-weight: bold; background-color: #ededed;"&gt;Ldap-Display-Name&lt;/SPAN&gt; from &lt;A href="https://msdn.microsoft.com/en-us/library/ms675090%28v=vs.85%29.aspx?f=255&amp;amp;MSPPError=-2147217396"&gt;MSDN&lt;/A&gt; (or from &lt;A href="http://edocs.mitel.com/UG/UCA_Web_Help/Admin_Web_Help/7.0/uca/common_ad_ldap_field_mappings.htm"&gt;this friendly version&lt;/A&gt;).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 14:41:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433896#M18003</guid>
      <dc:creator>ennioaoki</dc:creator>
      <dc:date>2017-11-23T14:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433897#M18004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ennio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How did you manage to import users in Qlik Sense, did you successfully create an UDC to Azure AD ?&lt;/P&gt;&lt;P&gt;I cannot make it work (QS Feb.2018, Azure AD over SSL port 636).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for this information !&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2018 15:22:27 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433897#M18004</guid>
      <dc:creator>thomaslg_wq</dc:creator>
      <dc:date>2018-04-16T15:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433898#M18005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Thomas.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually, we created a UDC to our on-premise AD (using Generic LDAP connection).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we just authenticate in AAD. The title of the thread was unfortunate, after all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Apr 2018 21:37:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433898#M18005</guid>
      <dc:creator>ennioaoki</dc:creator>
      <dc:date>2018-04-22T21:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433899#M18006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if anyone wants to create an Azure AD UDC : here attached is the "Generic LDAP UDC configuration".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, you just have to change the User-Directory-Attribute "User identification" to "Person" and that's it&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Resolution Ldap Azure.png" class="jive-image image-1" src="/legacyfs/online/200853_Resolution Ldap Azure.png" style="height: 591px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Apr 2018 09:05:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1433899#M18006</guid>
      <dc:creator>thomaslg_wq</dc:creator>
      <dc:date>2018-04-26T09:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1661509#M18007</link>
      <description>&lt;P&gt;To expand on the answer of&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/48982"&gt;@thomaslg_wq&lt;/a&gt;&amp;nbsp;, we have a case where we had to use LDAPS protocol, which requires a SSL certificate installed on the qlik server (we had a *-certificate, which works for ldaps.domain.com). The base setup for the LDAP connector worked as demonstrated, but it also required some configuration in Azure network security groups for the UDC to become operational.&lt;/P&gt;&lt;P&gt;Unfortunately I don't have detailed information on this step, as it was done by our clients IT supplier, but after this the connection between the UDC and azure ad was effectively opened up, and we successfully managed to bring all users from azure AD to the qlik repository.&lt;/P&gt;&lt;P&gt;Before this, running LDAP Admin tool on the qlik server returned a "Server down!" error, so I assume Azure NSG works as something like a firewall between the domain server and azure ad.&lt;/P&gt;&lt;P&gt;I cannot say for sure if all the steps would have been required, or just whatever was done in the Azure NSG, but with this configuration it works for our case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 14:36:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/1661509#M18007</guid>
      <dc:creator>mlinden</dc:creator>
      <dc:date>2019-12-30T14:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory Connector with Azure AD</title>
      <link>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/2543627#M32619</link>
      <description>&lt;P&gt;I'm facing similar/same challenge now. If I understand this correctly, this solution only &lt;FONT color="#339966"&gt;&lt;STRONG&gt;works&lt;/STRONG&gt;&lt;/FONT&gt; for&amp;nbsp;&lt;STRONG&gt;Microsoft &lt;FONT color="#339966"&gt;Entra Domain Services&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;It &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;doesn't work&lt;/STRONG&gt;&lt;/FONT&gt; for &lt;STRONG&gt;Microsoft &lt;FONT color="#FF0000"&gt;Entra ID&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Is that right?&lt;/P&gt;&lt;P&gt;Meaning, there's still no way to setup a User Directory Connector that will work with Entra ID. Is that right?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 19:46:51 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/User-Directory-Connector-with-Azure-AD/m-p/2543627#M32619</guid>
      <dc:creator>mbespartochnyy</dc:creator>
      <dc:date>2026-02-24T19:46:51Z</dc:date>
    </item>
  </channel>
</rss>

