Skip to content

Latest commit

 

History

History
42 lines (33 loc) · 2.27 KB

LDAP.md

File metadata and controls

42 lines (33 loc) · 2.27 KB

Multi-Users and LDAP authentication

By default, OpenBACH user management is kept very simple: users can create themselves but have to wait for an administrator to activate their account. If your target platform makes use of an LDAP to authenticate users, you can leverage it to avoid this manual intervention.

A few extra variables control the configuration of using an LDAP server alongside an OpenBACH platform:

Variable Name Required Effect
openbach_ldap_auth Boolean value to indicate if LDAP configuration is required or not (default: no)
openbach_ldap_server_ip IP address of the LDAP server to use
openbach_ldap_tls Boolean value to indicate if the LDAP server should be contacted using TLS (default: no)
openbach_ldap_bindDn Domain name to authenticate into the LDAP service (default: None)
openbach_ldap_bindPwd Password to authenticate into the LDAP service (default: None)
openbach_ldap_filter Field to use to filter users with (default: 'uid')
openbach_ldap_baseDn Domain name to connect to LDAP
openbach_ldap_groupDn LDAP group to fetch users from

Variables marked required does not need to be provided when LDAP configuration is deactivated (i.e. openbach_ldap_auth is not set to True).

To properly enable LDAP configuration, you need to provide these variables to each Controller/Collector/Auditorium that will use them. Assuming the 3 entities are on the same host, you could create the following group_vars/controller file:

---

openbach_ldap_auth: yes
openbach_ldap_server_uri: ldap://xx.xx.xx.xx
openbach_ldap_tls: no
openbach_ldap_bindDn:
openbach_ldap_bindPwd:
openbach_ldap_filter: uid
openbach_ldap_baseDn: "dc=example,dc=com"
openbach_ldap_groupDn: "cn=standard-users,ou=groups,dc=example,dc=com"

The groups are not yet supported in OpenBACH

Be careful to specify your own admin user, otherwise the playbook will crash asking a password.