Improve LDAP authentication support
See original GitHub issueScouts support for LDAP authentication is fairly basic and the login documentation contains some minor errors.
It would be nice to describe how to use the authentication variables, LDAP_BIND_USER_DN and LDAP_BIND_USER_PASSWORD and filtering variables LDAP_USER_DN and LDAP_GROUP_DN.
Also it would be good if we could mirror the function of LDAP_REQUIRED_GROUP
so you could setup different user groups which has access to different softwares.
Errors
- Configuration variable
LDAP_REQUIRED_GROUP
is not supported by flask-ldap3-login flask-ldap3-login - The documentation say that Scout supports login with username and password which is wrong. Scouts basic auth uses only email.
Issue Analytics
- State:
- Created 2 years ago
- Reactions:2
- Comments:6 (3 by maintainers)
Top Results From Across the Web
Remediating LDAP Client Security
LDAP clients that don't perform signing are clients that authenticate to a DC using a simple LDAP bind. The first thing to do...
Read more >LDAP Authentication And Security | CalCom Software
LDAP channel binding is a method developed to increase security in communication with Active Directory (AD). LDAP channel binding lowers the ...
Read more >LDAP considerations in ADDS performance tuning
Important. The following is a summary of the key recommendations and considerations to optimize server hardware for Active Directory ...
Read more >How to improve LDAP security in AWS Directory Service with ...
In the Client-side LDAPS section, once the Registration status field for the certificate reads Registered, select the Enable button. Click the ...
Read more >Customizing search processing to improve LDAP service ...
To improve the performance of the LDAP service, you can choose options to customize how the service processes searches. These settings apply to...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@northwestwitch I have a functional setup with osixia/openldap and using wheelybird/ldap-user-manager to manage the database. It takes the configuration from a environment file which allows you to have separate environments and parameters for testing and production.
I don’t think so, I was just looking for an easy-to use dockerized solution that contains all the options you might find when using a real LDAP server