Skip to content

Kinto/kinto-ldap

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

kinto-ldap

travis Coverage

Validate Basic Auth provided user login and password with an LDAP server.

Dependencies

Before installing you will need the following system dependencies:

On Debian based systems:

sudo apt-get install libsasl2-dev python-dev libldap2-dev libssl-dev

On RPM based systems:

sudo yum install openldap-devel openssl-devel python-devel

Installation

Install the Python package:

pip install kinto-ldap

Include the package in the project configuration:

kinto.includes = kinto_ldap

And configure authentication policy using pyramid_multiauth formalism:

multiauth.policies = ldap

By default, it will rely on the cache configured in Kinto.

Configuration

multiauth.policy.ldap.use = kinto_ldap.authentication.LDAPBasicAuthAuthenticationPolicy

kinto.ldap.cache_ttl_seconds = 30
kinto.ldap.endpoint = ldap://ldap.prod.mozaws.net
# kinto.ldap.bind_dn = uid=read_user,ou=logins,dc=mozilla
# kinto.ldap.bind_password = user_password

If necessary, override default values for authentication policy:

# multiauth.policy.ldap.realm = Realm
# kinto.ldap.base_dn = dc=mozilla
# kinto.ldap.filters = (mail={mail})
# kinto.ldap.pool_size = 10
# kinto.ldap.pool_retry_max = 3
# kinto.ldap.pool_retry_delay = .1
# kinto.ldap.pool_timeout = 30

About

A LDAP Basic Auth authentication layer that validate the user/password against a LDAP server.

Resources

License

Stars

Watchers

Forks

Packages

No packages published