mirror of
https://github.com/lldap/lldap.git
synced 2026-03-31 15:07:48 +01:00
docs: move authelia configuration to markdown file (#1205)
This commit is contained in:
@@ -6,7 +6,7 @@ configuration files:
|
|||||||
- [Airsonic Advanced](airsonic-advanced.md)
|
- [Airsonic Advanced](airsonic-advanced.md)
|
||||||
- [Apache Guacamole](apacheguacamole.md)
|
- [Apache Guacamole](apacheguacamole.md)
|
||||||
- [Apereo CAS Server](apereo_cas_server.md)
|
- [Apereo CAS Server](apereo_cas_server.md)
|
||||||
- [Authelia](authelia_config.yml)
|
- [Authelia](authelia.md)
|
||||||
- [Authentik](authentik.md)
|
- [Authentik](authentik.md)
|
||||||
- [Bookstack](bookstack.env.example)
|
- [Bookstack](bookstack.env.example)
|
||||||
- [Calibre-Web](calibre_web.md)
|
- [Calibre-Web](calibre_web.md)
|
||||||
|
|||||||
@@ -0,0 +1,39 @@
|
|||||||
|
# Configuration for Authelia
|
||||||
|
|
||||||
|
## Authelia LDAP configuration
|
||||||
|
|
||||||
|
For all configuration options see the [Authelia LDAP Documentation](https://www.authelia.com/configuration/first-factor/ldap/).
|
||||||
|
|
||||||
|
The following example configuration uses the LLDAP implementation template, the default values are documented in the
|
||||||
|
[Authelia LLDAP Integration Guide](https://www.authelia.com/integration/ldap/lldap/).
|
||||||
|
|
||||||
|
Users will be able to sign in using their username or email address.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
authentication_backend:
|
||||||
|
# How often authelia should check if there is a user update in LDAP
|
||||||
|
refresh_interval: '1m'
|
||||||
|
ldap:
|
||||||
|
implementation: 'lldap'
|
||||||
|
# Format is [<scheme>://]<hostname>[:<port>]
|
||||||
|
# ldap port for LLDAP is 3890 and ldaps 6360
|
||||||
|
address: 'ldap://lldap:3890'
|
||||||
|
# Set base dn that you configured in LLDAP
|
||||||
|
base_dn: 'DC=example,DC=com'
|
||||||
|
# The username and password of the bind user.
|
||||||
|
# "bind_user" should be the username you created for authentication with the "lldap_strict_readonly" permission. It is not recommended to use an actual admin account here.
|
||||||
|
# If you are configuring Authelia to change user passwords, then the account used here needs the "lldap_password_manager" permission instead.
|
||||||
|
user: 'UID=bind_user,OU=people,DC=example,DC=com'
|
||||||
|
# Password can also be set using a secret: https://www.authelia.com/configuration/methods/secrets/.
|
||||||
|
password: 'REPLACE_ME'
|
||||||
|
# Optional: Setup TLS if you've enabled LDAPS
|
||||||
|
# tls:
|
||||||
|
# skip_verify: false
|
||||||
|
# minimum_version: TLS1.2
|
||||||
|
|
||||||
|
# Disable the authelia password change and reset functionality if the "bind_user" does not have the "lldap_password_manager" permission.
|
||||||
|
password_reset:
|
||||||
|
disable: false
|
||||||
|
password_change:
|
||||||
|
disable: false
|
||||||
|
```
|
||||||
@@ -1,35 +0,0 @@
|
|||||||
###############################################################
|
|
||||||
# Authelia configuration #
|
|
||||||
###############################################################
|
|
||||||
|
|
||||||
# This is just the LDAP part of the Authelia configuration!
|
|
||||||
# See Authelia docs at https://www.authelia.com/configuration/first-factor/ldap/ for more info
|
|
||||||
|
|
||||||
authentication_backend:
|
|
||||||
# Password reset through authelia works normally.
|
|
||||||
password_reset:
|
|
||||||
disable: false
|
|
||||||
# How often authelia should check if there is a user update in LDAP
|
|
||||||
refresh_interval: 1m
|
|
||||||
ldap:
|
|
||||||
implementation: lldap
|
|
||||||
# Pattern is ldap://HOSTNAME-OR-IP:PORT
|
|
||||||
# Normal ldap port is 389, standard in LLDAP is 3890
|
|
||||||
address: ldap://lldap:3890
|
|
||||||
# Set base dn that you configured in LLDAP
|
|
||||||
base_dn: dc=example,dc=com
|
|
||||||
# The username and password of the bind user.
|
|
||||||
# "bind_user" should be the username you created for authentication with the "lldap_strict_readonly" permission. It is not recommended to use an actual admin account here.
|
|
||||||
# If you are configuring Authelia to change user passwords, then the account used here needs the "lldap_password_manager" permission instead.
|
|
||||||
user: uid=bind_user,ou=people,dc=example,dc=com
|
|
||||||
additional_users_dn: ou=people
|
|
||||||
# Password can also be set using a secret: https://www.authelia.com/configuration/methods/secrets/
|
|
||||||
password: "REPLACE_ME"
|
|
||||||
|
|
||||||
# Optional: Setup TLS if you've enabled LDAPS
|
|
||||||
# tls:
|
|
||||||
# skip_verify: false
|
|
||||||
# minimum_version: TLS1.2
|
|
||||||
|
|
||||||
# Optional: To allow sign in with BOTH username and email, you can change the users_filter to this
|
|
||||||
# users_filter: "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))"
|
|
||||||
@@ -56,7 +56,7 @@ FILTER = memberOf=cn=seafile_user,ou=groups,dc=example,dc=com
|
|||||||
|
|
||||||
## Configuring Seafile to use LLDAP with Authelia as an intermediary
|
## Configuring Seafile to use LLDAP with Authelia as an intermediary
|
||||||
Authelia is an open-source authentication and authorization server that can use LLDAP as a backend and act as an OpenID Connect Provider. We're going to assume that you have already set up Authelia and configured it with LLDAP.
|
Authelia is an open-source authentication and authorization server that can use LLDAP as a backend and act as an OpenID Connect Provider. We're going to assume that you have already set up Authelia and configured it with LLDAP.
|
||||||
If not, you can find an example configuration [here](authelia_config.yml).
|
If not, you can find an example configuration [here](authelia.md).
|
||||||
|
|
||||||
1. Add the following to Authelia's `configuration.yml`:
|
1. Add the following to Authelia's `configuration.yml`:
|
||||||
```
|
```
|
||||||
@@ -117,4 +117,4 @@ OAUTH_ATTRIBUTE_MAP = {
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
Restart both your Authelia and Seafile server. You should see a "Single Sign-On" button on Seafile's login page. Clicking it should redirect you to Authelia. If you use the [example config for Authelia](authelia_config.yml), you should be able to log in using your LLDAP User ID.
|
Restart both your Authelia and Seafile server. You should see a "Single Sign-On" button on Seafile's login page. Clicking it should redirect you to Authelia. If you use the [example config for Authelia](authelia.md), you should be able to log in using your LLDAP User ID.
|
||||||
|
|||||||
Reference in New Issue
Block a user