LDAP authentication and authorization for Amazon MQ for RabbitMQ
Amazon MQ for RabbitMQ supports authentication and authorization of broker users using an external LDAP server. For other supported methods, see Authentication and authorization for Amazon MQ for RabbitMQ brokers.
Important considerations
-
The LDAP server needs to be accessible over the public internet. Amazon MQ for RabbitMQ can be configured to authenticate to the LDAP server using mutual TLS.
-
Amazon MQ for RabbitMQ enforces the use of AWS ARNs for sensitive LDAP settings such as passwords and for settings that require access to the local file system. See ARN support in RabbitMQ configuration for more details.
-
You must include the IAM permission,
mq:UpdateBrokerAccessConfiguration, to enable LDAP on existing brokers. -
Amazon MQ automatically creates a system user named
monitoring-AWS-OWNED-DO-NOT-DELETEwith monitoring-only permissions. This user uses RabbitMQ's internal authentication system even on LDAP-enabled brokers and is restricted to loopback interface access only. Amazon MQ prevents deletion of this user by adding the protected user tag.
For information about how to configure LDAP for your Amazon MQ for RabbitMQ brokers, see Using LDAP authentication and authorization.
On this page
Supported LDAP configurations
Amazon MQ for RabbitMQ supports all configurable variables in RabbitMQ LDAP plugin
Configurations requiring ARNs
auth_ldap.dn_lookup_bind.password-
Use
aws.arns.auth_ldap.dn_lookup_bind.passwordinstead auth_ldap.other_bind.password-
Use
aws.arns.auth_ldap.other_bind.passwordinstead auth_ldap.ssl_options.cacertfile-
Use
aws.arns.auth_ldap.ssl_options.cacertfileinstead auth_ldap.ssl_options.certfile-
Use
aws.arns.auth_ldap.ssl_options.certfileinstead auth_ldap.ssl_options.keyfile-
Use
aws.arns.auth_ldap.ssl_options.keyfileinstead
Unsupported SSL options
The following SSL configuration options are also not supported:
-
auth_ldap.ssl_options.cert -
auth_ldap.ssl_options.client_renegotiation -
auth_ldap.ssl_options.dh -
auth_ldap.ssl_options.dhfile -
auth_ldap.ssl_options.honor_cipher_order -
auth_ldap.ssl_options.honor_ecc_order -
auth_ldap.ssl_options.key.RSAPrivateKey -
auth_ldap.ssl_options.key.DSAPrivateKey -
auth_ldap.ssl_options.key.PrivateKeyInfo -
auth_ldap.ssl_options.log_alert -
auth_ldap.ssl_options.password -
auth_ldap.ssl_options.psk_identity -
auth_ldap.ssl_options.reuse_sessions -
auth_ldap.ssl_options.secure_renegotiate -
auth_ldap.ssl_options.versions.$version -
auth_ldap.ssl_options.sni
Additional validations for LDAP configurations in Amazon MQ
Amazon MQ also enforces the following additional validations for LDAP authentication and authorization:
-
auth_ldap.logcannot be set tonetwork_unsafe -
LDAP server must use LDAPS. Either
auth_ldap.use_sslorauth_ldap.use_starttlsmust be explicitly enabled -
If any setting requires the use of an AWS ARN,
aws.arns.assume_role_arnmust be provided. -
auth_ldap.serversmust be a valid IP address or valid FQDN -
The following keys must be a valid LDAP Distinguished Name:
-
auth_ldap.dn_lookup_base -
auth_ldap.dn_lookup_bind.user_dn -
auth_ldap.other_bind.user_dn -
auth_ldap.group_lookup_base
-