xsrv
lldap
Our great sponsors
xsrv | lldap | |
---|---|---|
24 | 76 | |
290 | 3,473 | |
- | 5.5% | |
9.7 | 9.2 | |
5 days ago | 7 days ago | |
Jinja | Rust | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
xsrv
- Graylog upgrade from 2 to 5 version
- Using Apache2 as a reverse proxy on a live server?
-
Do you have an LDAP server setup?
Yes, OpenLDAP installed from this ansible role
-
Logrotate appreciation
It's dead easy to use TCP/SSL instead of UDP to forward logs. Example rsyslog config
-
Simple way to centralize my server logs?
I use rsyslog for that since it's the default in Debian. Configuring forwarding is very simple, a single file in /etc/rsyslog.d/forwarding.conf [1]. Note that this setup uses TLS to encrypt messages so you need to create the relevant certificates (I use self-signed certs). Unencrypted TCP or UDP is simpler, but less secure.
-
How to create and use VMs in a headless Linux server from the command line
preseed.cfg contains a few basic options needed to setup the OS [1]
-
Best openldap + samba file server approach
I do this with https://github.com/nodiscc/xsrv/tree/master/roles/openldap + https://github.com/nodiscc/xsrv/tree/master/roles/samba. It's just a standalone samba server + LDAP auth for users, no DC or anything like that, so I'm not sure this is what you're looking for.
- YUnoHost alternative?
-
Beginner's Guide to Open LDAP?
This ansible role (check the tasks/ directory) gives a good breakdown of what is needed to setup a basic LDAP server and authentication service
-
Samba shares without managing a DC
I use samba in standalone mode with or without LDAP auth https://github.com/nodiscc/xsrv/tree/master/roles/samba
lldap
-
Keycloak SSO with Docker Compose and Nginx
Good to hear, I think it'll make many users happy. For me, I've migrated back to Authelia. I moved to authentik because at the time Authelia had no user management. After all of authentik's sharp edges, I've found lldap[0], and was able to implement a pilot in a few hours. I haven't looked back, since everything was converted.
[0]: https://github.com/lldap/lldap
-
Ask HN: What apps have you created for your own use?
I wrote LLDAP (https://github.com/lldap/lldap) after struggling to install and configure openLdap on my homelab.
-
Anyone else using LLDAP and if so... (can it do TrueNAS & Linux User/Login authentication?)
I've recently installed and configured LLDAP (Lightweight LDAP) - More details here if you've never heard of it before: GitHub - lldap/lldap: Light LDAP implementation
- Lldap Release 0.5.0
-
🆕 Cosmos 0.8.0 - All in one secure Reverse-proxy, container manager and authentication provider has a brand new App Marketplace to share compose file! Also added home customization
I've an LLDAP instance running to make managing users easier.
- Simple AD for testing stuff in homelab?
-
LDAP resources/recommendations question
I'm trying to integrate LDAP into my small homelab but I'm extreme noobie in it. So far I've tried: 1. OpenLDAP - not so resource heavy but I found it difficult go get working correctly with NextCloud, Keycloak and Jellyfin. Maybe someone could recommend an easy to follow guide? 2. LLDAP - honestly it's almost prefect. Nice clean UI, great guides how to setup with everything I need, but it's a read-only LDAP, so I cannot create or manage users with Keycloak or NC, that's about the only downside and probably bugs me more than it should. 3. 389ds - has everything I need (and probably some more), super easy to setup with this guide but the elephant in the room is that it uses 700MiB of RAM (whereas LLDAP uses only 7-8MiB). That's a big difference which really makes me question whether I want to use this particular solution.
-
Keycloak – Open-Source Identity and Access Management Interview
Note that if you want to use KeyCloak for the OpenID but want to still have a LDAP source of truth, you can use LLDAP + KeyCloak together, with LLDAP as the source of truth and KeyCloak giving you the fancy features: https://github.com/lldap/lldap/blob/main/example_configs/key...
- 🆕 Cosmos 0.6.0 - All in one secure Reverse-proxy, container manager and authentication provider now supports OpenID! Guides available in the documentation on how to setup Nextcloud, Minio and Gitea easily from the UI.
-
How do you organize accounts and passwords in your self-hosted environment?
To be fair, their respective documentations (here and here) are pretty comprehensive.
What are some alternatives?
vouch-proxy - an SSO and OAuth / OIDC login solution for Nginx using the auth_request module
glauth - A lightweight LDAP server for development, home use, or CI
Yacht - A web interface for managing docker containers with an emphasis on templating to provide 1 click deployments. Think of it like a decentralized app store for servers that anyone can make packages for.
ntfy - Send push notifications to your phone or desktop using PUT/POST
Ansible-NAS - Build a full-featured home server or NAS replacement with an Ubuntu box and this playbook.
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
budibase - Budibase is an open-source low code platform that helps you build internal tools in minutes 🚀
authentik - The authentication glue you need.
HomelabOS
PropertyWebBuilder - Create a fully featured real estate website on Rails in minutes! ⛺
VestaCP - VESTA Control Panel
pwm - pwm