nginx-auth-ldap
nginx-auth-ldap copied to clipboard
LDAP authentication module for nginx
```root@box-1:/etc/nginx# nginx -t nginx: [emerg] http_auth_ldap: Protocol "ldaps://" is not supported. in /etc/nginx/nginx.conf:81 nginx: configuration file /etc/nginx/nginx.conf test failed ``` I built my nginx from source using the following: ```...
@kvspb This PR breaks us: https://github.com/kvspb/nginx-auth-ldap/pull/170 We have a working config on the prev. commit from April. With this commit, we break with logs like: Jul 21 22:08:35 6608246572f6 DEBUG...
Is it possible to do smthing like this? So that can validate user with username OR mail OR smthing else? url ldap://host:389/dc=example,dc=com?uid,mail?sub?(&(objectClass=posixAccount)(|(uid=%u)(mail=%u)));
Hello., We wanted to have nginx with anonymous LDAP access, can you please share the example on how the ldap config should be ? We dont provide "Root DN", no...
Hi All, Before introducing ldap to my nginx, I was working with normal htp password and all working fine including my websocket. but as soon as I introduced ldap websocket...
Dear All, I have installed Nginx from FreeBSD ports with HHTP_AUTH_LDAP enabled. Compilation worked without any flaws. nginx -v yieds: ``` nginx -V nginx version: nginx/1.10.1 configure arguments: --prefix=/usr/local/etc/nginx --with-cc-opt='-I...
I am seeing these issues on a fresh installations: Jan 29 10:48:11 testbox kernel: [845310.021759] nginx[1963] general protection ip:476661 sp:7fffd9f29a90 error:0 in nginx[400000+97000] Jan 29 10:48:15 testbox kernel: [845313.112678] nginx[1610]...
In Active Directory it is possible to configure a group to be a member of another group. In bigger organizations the way of building hierarchies this way is quite common....
ubuntu 14.04 nginx 1.10 Crashes when having to much ldap server in virtual hosts. this what I use ``` ldap_server coa { url ldaps://ipa.domain.com/DC=domain,DC=com?uid?sub?(&(memberOf=cn=coa,cn=groups,cn=accounts,dc=domain,dc=com)(objectClass=person)); binddn "uid=ldap_proxy,cn=users,cn=compat,dc=domain,dc=com"; binddn_passwd "paaass"; require valid_user;...