You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello,
It's dificult to have 2 (or more) AD LDAPs backend on Kubernetes.
But if you want to make update KC -> AD available (password change for me), SSL is mandatory.
So I find a simple working solution, by using haproxy as LDAP to LDAPs.
Here is the haproxy.cfg
` global
log /dev/log local6
pidfile /var/run/haproxy.pid
chroot /var/lib/haproxy
maxconn 8192
user haproxy
group haproxy
daemon
stats socket /var/lib/haproxy/stats.socket mode 660 level admin
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Hello,
It's dificult to have 2 (or more) AD LDAPs backend on Kubernetes.
But if you want to make update KC -> AD available (password change for me), SSL is mandatory.
So I find a simple working solution, by using haproxy as LDAP to LDAPs.
Here is the haproxy.cfg
` global
log /dev/log local6
pidfile /var/run/haproxy.pid
chroot /var/lib/haproxy
maxconn 8192
user haproxy
group haproxy
daemon
stats socket /var/lib/haproxy/stats.socket mode 660 level admin
Beta Was this translation helpful? Give feedback.
All reactions