Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A ldap(s) authentification plugin #1022

Closed
sergepeter opened this issue Feb 25, 2016 · 4 comments
Closed

A ldap(s) authentification plugin #1022

sergepeter opened this issue Feb 25, 2016 · 4 comments
Assignees
Labels
idea/new plugin [legacy] those issues belong to Kong Nation, since GitHub issues are reserved for bug reports.

Comments

@sergepeter
Copy link

It could be great to have a ldap authentification plugin that give back principal with group details, that could then be use to whitelist an api.

best regards

serge

@shashiranjan84
Copy link
Contributor

Currently we are working on LDAP Plugin which authenticate user using Bind Authentication. We still defining the scope of the LDAP plugin and Authorization going to be part of it eventually.

@subnetmarco subnetmarco added the idea/new plugin [legacy] those issues belong to Kong Nation, since GitHub issues are reserved for bug reports. label Feb 26, 2016
@ambrons
Copy link

ambrons commented Mar 3, 2016

@shashiranjan84 How would this integrate with Consumer? Or would it be a replacement?

@shashiranjan84
Copy link
Contributor

@ambrons So far the plugin implementation validate user using the credential(username:password) sent in the request against the LDAP server using Bind Authentication and cache the credential for future use.

Please give it a try if possible https://github.com/Mashape/kong/tree/plugin/ldap

@subnetmarco
Copy link
Member

Closed with #1133.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
idea/new plugin [legacy] those issues belong to Kong Nation, since GitHub issues are reserved for bug reports.
Projects
None yet
Development

No branches or pull requests

5 participants