docker-openldap
AzureAD-LDAP-wrapper
Our great sponsors
docker-openldap | AzureAD-LDAP-wrapper | |
---|---|---|
15 | 6 | |
3,946 | 105 | |
1.6% | - | |
0.0 | 6.4 | |
6 months ago | 23 days ago | |
Shell | JavaScript | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
docker-openldap
-
Question: How to Use LDAP Authentication and User Accounts On TAK Servers
I'm entirely unfamiliar with overlays. I don't believe I've configured any on my OpenLDAP server, as it is just a default docker image I've populated with some OUs and users.
-
LDAP resources/recommendations question
I'm trying to integrate LDAP into my small homelab but I'm extreme noobie in it. So far I've tried: 1. OpenLDAP - not so resource heavy but I found it difficult go get working correctly with NextCloud, Keycloak and Jellyfin. Maybe someone could recommend an easy to follow guide? 2. LLDAP - honestly it's almost prefect. Nice clean UI, great guides how to setup with everything I need, but it's a read-only LDAP, so I cannot create or manage users with Keycloak or NC, that's about the only downside and probably bugs me more than it should. 3. 389ds - has everything I need (and probably some more), super easy to setup with this guide but the elephant in the room is that it uses 700MiB of RAM (whereas LLDAP uses only 7-8MiB). That's a big difference which really makes me question whether I want to use this particular solution.
-
`sudo: account validation failure, is your account locked?`
I have been struggling for a week to get sudo to work with my LDAP setup. I am using this docker setup. I have added these attributes to my server.
-
OpenLDAP Docker Container issue
Hi, I've used the osixia github repository to spin up a docker container act as a LDAP Slave and I've successfully used the custom configuration and spin up the container. When i checked the logs of the container i saw the following as the output when it tries to sync with the Master.
-
Using sssd in a Playground Without TLS
It is quite straightforward to stand up an LDAP server listening in plaintext. My favorite mechanism is using the openldap container, although there are other options.
-
osixia/docker-openldap configuration to let users other than admin search the database
I'm trying to setup a LDAP server using the Osixia Docker container through docker-compose. I want it to contain lists of PosixAccount and PosixGroups, and use them to grant access to some external applications which also have a simpleSecurityObject entry in the directory (e.g. Grafana, which I already integrated with another LDAP server).
-
OpenLdap Docker setup help
I've been trying to setup an openldap server from https://github.com/osixia/docker-openldap
- Guter Einstieg in LDAP
-
Keycloak users out there, how do you use Keycloak with apps that require LDAP?
I've grown quite tired of how painful it is to manage my LDAP server with multi-master replication. Currently I'm running osixia/openldap, with a wheelybird/ldap-user-manager frontend to manage users, all hosted on my Kubernetes cluster. Eventually, I'm looking to migrate to nitnelave/lldap
- Best OpenLDAP docker container with WebUI
AzureAD-LDAP-wrapper
-
Migrate from AAD-only to AD + AAD Connect for on-prem resources?
You could run the AzureAD-LDAP-wrapper docker container on your NAS.
- LDAPS with Azure AD tenant bundled with Office 365?
-
Best ideas for large local file storage with AzureAD
just to be clear I did no mean the way with vpn and ad join I ment this project: https://github.com/ahaenggli/AzureAD-LDAP-wrapper
-
Synology sync to Azure Active Directory? Possible alternatives to having two separate logins/passwords for users?
You could run a tiny VM for AD ($30/mo) in Azure and use a site to site basic SKU ($26/mo) to connect them. It would probably be half the cost of the AD DS at $115/mo. The major downside is now you'd have to run dirsynced accounts with AD as the root, which completely changes the management vs AD DS allows AzureAD to be the root as you're looking for. The only other alternative approach I've seen is something like this LDAP wrapper project: https://github.com/ahaenggli/AzureAD-LDAP-wrapper. I have not tested it yet, and it's less secure. Here's my two cents, if you have a limited group of users where the $115/mo is too expensive, use local accounts. If it's a more significant user group, eat the $115/mo, it's necessary.
- Synology LDAP Wrapper - Safe?
What are some alternatives?
ldap-user-manager - A PHP web-based interface for LDAP user account management and self-service password change.
azure-functions-apim-aad-auth - Code for Restrict Azure Functions to API Management with Terraform blog post
docker-phpLDAPadmin - phpLDAPadmin container image 🐳🌴
external-auth-server - easy auth for reverse proxies
tigase-xmpp-server-docker - (M) Official Docker project for Tigase XMPP Server
react-aad - A React wrapper for Azure AD using the Microsoft Authentication Library (MSAL). The easiest way to integrate AzureAD with your React for authentication.
Mailspring-Libre - (archived) Mailspring Libre build – aiming at removing Mailspring's dependecy on a central server
LDAP Account Manager (LAM) - LDAP Account Manager
PostgresApp - The easiest way to get started with PostgreSQL on the Mac
OpenRecord - Make ORMs great again!
docker - docker image of Monica
IntuneDriveMapping - Generate PowerShell scripts to map network drives on Intune managed Windows 10 devices