Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(DIO-2621) Make LDAP encryption configurable #459

Merged
merged 1 commit into from
Sep 15, 2021
Merged

Conversation

genebean
Copy link
Contributor

Prior to this, the encryption settings for LDAP auth were hard coded to start_tls on port 389 with TLSv1. These are still the defaults, as insecure as they are, so as to not break existing users. This change facilitates replacing the defaults so that simple_tls over port 636 via TLS1.2 can be used.

@genebean genebean force-pushed the fix_ldap_auth branch 10 times, most recently from 0c54fb9 to 91014a3 Compare September 14, 2021 20:26
@genebean genebean marked this pull request as ready for review September 14, 2021 20:29
@genebean genebean requested a review from a team as a code owner September 14, 2021 20:29
@genebean genebean force-pushed the fix_ldap_auth branch 2 times, most recently from ffaa8ef to c95116d Compare September 14, 2021 20:34
Prior to this, the encryption settings for LDAP auth were hard coded to
start_tls on port 389 with TLSv1. These are still the defaults, as
insecure as they are, so as to not break existing users. This change
facilitates replacing the defaults so that simple_tls over port 636 via
TLS1.2 can be used.
@genebean
Copy link
Contributor Author

Deployed to test and validated that using the config below allows for successful token retrieval:

:auth:
  provider: 'ldap'
  :ldap:
    host: 'ldap.example.com'
    port: 636
    encryption:
      :method: :simple_tls
      :tls_options:

@genebean genebean merged commit 1c1f551 into master Sep 15, 2021
@genebean genebean deleted the fix_ldap_auth branch September 15, 2021 13:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants