Skip to content

add authenticated flag to ldap configuration#37

Open
danielflira wants to merge 2 commits intofreman:masterfrom
danielflira:master
Open

add authenticated flag to ldap configuration#37
danielflira wants to merge 2 commits intofreman:masterfrom
danielflira:master

Conversation

@danielflira
Copy link

When server is using LDAP authentication and you type a valid user and keep password empty access is granted. It is because LDAP simple authentication allow one method called UNAUTHENTICATED described here https://tools.ietf.org/html/rfc4513#section-5.1.2 .

Normally login interfaces require non empty password but HTTP basic auth does not. The PR add a flag to force non empty password even if LDAP server allow unauthenticated login.

If it is false or not informed authentication behavior does not change.

README.md Outdated
| filter | Filter the users, eg "(&(memberOf=CN=group,OU=Users,OU=Company,DC=example,DC=com)(objectClass=user)(sAMAccountName=%s))" |
| principal_suffix | suffix to append to usernames (eg: @example.com) |
| pool_size | size of the connection pool, default is 10 |
| authenticated | true to force password be filled even server allow UNAUTHENTICATED login |
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe the this should be unauthenticated instead of authenticated as it's confusing

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Currently the plugin already allow unauthenticated login. I put the parameter to change this behavior enforcing authenticated policy.

If I invert this logic, turn parameter on will keep current behavior, turn parameter off will change the behavior.

I don't know if inform parameter off to enable function is clear but if you think it is better I can change.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants