ldap-user-manager
lldap
ldap-user-manager | lldap | |
---|---|---|
6 | 76 | |
455 | 3,499 | |
- | 3.7% | |
1.2 | 9.1 | |
13 days ago | 6 days ago | |
PHP | Rust | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ldap-user-manager
-
Beginner's Guide to Open LDAP?
https://github.com/wheelybird/ldap-user-manager Also if you decided to use it there is a setting to allow login via authelia headers.
-
Selfhoster - Scaling down
It works really nice for my usecase. I'm using it in combination with a LDAP database and Ldap-user-manager with this patch to make it work better with authelia: https://github.com/wheelybird/ldap-user-manager/pull/120
-
Keycloak users out there, how do you use Keycloak with apps that require LDAP?
I've grown quite tired of how painful it is to manage my LDAP server with multi-master replication. Currently I'm running osixia/openldap, with a wheelybird/ldap-user-manager frontend to manage users, all hosted on my Kubernetes cluster. Eventually, I'm looking to migrate to nitnelave/lldap
-
Which LDAP to pair with Authelia?
Personally i useOpenldap + Ldap-User-Manager-> Ldap User Manager should also soon work with authelia remote headers, so that you don't have to login twice. (https://github.com/wheelybird/ldap-user-manager/pull/102)
-
SSO for all the services?
The LDAP users and groups are managed with ldap-user-manager which makes the creation of users and groups a breeze.
-
Best identity management?
What about https://github.com/wheelybird/ldap-user-manager? The UI is clean and attractive.
lldap
-
Keycloak SSO with Docker Compose and Nginx
Good to hear, I think it'll make many users happy. For me, I've migrated back to Authelia. I moved to authentik because at the time Authelia had no user management. After all of authentik's sharp edges, I've found lldap[0], and was able to implement a pilot in a few hours. I haven't looked back, since everything was converted.
[0]: https://github.com/lldap/lldap
-
Ask HN: What apps have you created for your own use?
I wrote LLDAP (https://github.com/lldap/lldap) after struggling to install and configure openLdap on my homelab.
-
Anyone else using LLDAP and if so... (can it do TrueNAS & Linux User/Login authentication?)
I've recently installed and configured LLDAP (Lightweight LDAP) - More details here if you've never heard of it before: GitHub - lldap/lldap: Light LDAP implementation
- Lldap Release 0.5.0
-
🆕 Cosmos 0.8.0 - All in one secure Reverse-proxy, container manager and authentication provider has a brand new App Marketplace to share compose file! Also added home customization
I've an LLDAP instance running to make managing users easier.
- Simple AD for testing stuff in homelab?
-
LDAP resources/recommendations question
I'm trying to integrate LDAP into my small homelab but I'm extreme noobie in it. So far I've tried: 1. OpenLDAP - not so resource heavy but I found it difficult go get working correctly with NextCloud, Keycloak and Jellyfin. Maybe someone could recommend an easy to follow guide? 2. LLDAP - honestly it's almost prefect. Nice clean UI, great guides how to setup with everything I need, but it's a read-only LDAP, so I cannot create or manage users with Keycloak or NC, that's about the only downside and probably bugs me more than it should. 3. 389ds - has everything I need (and probably some more), super easy to setup with this guide but the elephant in the room is that it uses 700MiB of RAM (whereas LLDAP uses only 7-8MiB). That's a big difference which really makes me question whether I want to use this particular solution.
-
Keycloak – Open-Source Identity and Access Management Interview
Note that if you want to use KeyCloak for the OpenID but want to still have a LDAP source of truth, you can use LLDAP + KeyCloak together, with LLDAP as the source of truth and KeyCloak giving you the fancy features: https://github.com/lldap/lldap/blob/main/example_configs/key...
- 🆕 Cosmos 0.6.0 - All in one secure Reverse-proxy, container manager and authentication provider now supports OpenID! Guides available in the documentation on how to setup Nextcloud, Minio and Gitea easily from the UI.
-
How do you organize accounts and passwords in your self-hosted environment?
To be fair, their respective documentations (here and here) are pretty comprehensive.
What are some alternatives?
docker-openldap - OpenLDAP container image 🐳🌴
glauth - A lightweight LDAP server for development, home use, or CI
vouch-proxy - an SSO and OAuth / OIDC login solution for Nginx using the auth_request module
ntfy - Send push notifications to your phone or desktop using PUT/POST
bitwarden_rs - Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs [Moved to: https://github.com/dani-garcia/vaultwarden]
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
docker-nginx - Dockerized webserver with many customizable options
authentik - The authentication glue you need.
docker-fusiondirectory - Dockerized web based LDAP manager
PropertyWebBuilder - Create a fully featured real estate website on Rails in minutes! ⛺
docker-lemonldap - Dockerized authentication server with Single Sign On SAML, OpenID Connect, CAS, and Header support
pwm - pwm