ldapauthenticator
ldapauthenticator copied to clipboard
LDAP Authenticator Plugin for Jupyter
Trying to use LDAPAuthenticator with JupyterHub. The authentication process returns the following error: [I 2022-06-15 18:47:09.505 JupyterHub app:2479] **Running JupyterHub version 1.5.0** [I 2022-06-15 18:47:09.505 JupyterHub app:2509] **Using Authenticator: ldapauthenticator.ldapauthenticator.LDAPAuthenticator-1.3.2**...
The plugin appears to be configured correctly but not accepting my password. Here is the debug trace: ``` [D 2018-08-23 14:29:23.985 JupyterHub ldapauthenticator:299] TYPE= 'False' [D 2018-08-23 14:29:23.985 JupyterHub ldapauthenticator:223]...
This change does the following: - Allows looking up group membership from the LDAP `memberOf` attribute attached to the user's LDAP object - Provides Active Directory specific lookup support to...
This changes will allow us to use `ldaps://` endpoints. Closes #49
We are doing POC to setup the jupyterhub with ldapauthenticator. Currently, our SSL enabled openLDAP only accepts certificate like this below example ldap_uri = ldap://ldap:389 ldap_default_bind_dn = cn=serviceaccount,dc=example,dc=com ldap_default_authtok_type =...
### Bug description The plugin uses a so called *search user* to lookup the dn of the user to be authenticated. The authentication is done using an ldap bind which...
### Summary This pull request adds the boolean option `use_search_user_to_check_groups` which allows to switch the ldap user that is used to verify the membership of the user being authenticated with...
### Bug description I tried to use ldapauthenticator to connect to openldap server, as my server has no ssl and I want to connect it to 389, so I set...
Hi and thanks for all your work on the jupyter ecosystem! Please see [equivalent post over in the discourse forum](https://discourse.jupyter.org/t/ldap-not-working-ldapstarttlserror/11047). ### Bug description * Any attempted login results in a...
This PR adds a new configuration option `admin_groups`, to grant admin access to all users that are members of these groups and thus lets you define admin access through ldap...