Skip to Content

LDAP

Authentication Setup

  1. Add the following helm values to your helm values.yml file:
authProvider: provider: ldap ldap: server: <LDAP-SERVER> bindUserName: <BIND-USER-NAME> bindUserPassword: <BIND-USER-PASSWORD> baseDN: <BASE-DN> # e.g. ou=scaleops,dc=example,dc=com

Group Setup

Add the following configuration to your values.yaml file:

authProvider: authorization: enabled: true ldap: server: <LDAP-SERVER> baseDN: <BASE-DN> bindUserName: <BIND-USER> bindUserPassword: <BIND-PASSWORD> defaultAdminGroups: - <GROUP-NAME> # eg. cn=admins,ou=scaleops,dc=example,dc=org defaultOperatorGroups: - <GROUP-NAME> # Optional - eg. cn=operators,ou=scaleops,dc=example,dc=org defaultViewerGroups: - <GROUP-NAME> # Optional - eg. cn=viewers,ou=scaleops,dc=example,dc=org

Advanced Configuration

Configuration with LDAPS

authProvider: provider: ldap ldap: server: ldaps://ldap.example.com port: 636 # Optional insecureSkipVerify: true # Optional, defaults to false bindUserName: uid=scaleops,ou=scaleops,dc=example,dc=com bindUserPassword: <BIND-USER-PASSWORD> baseDN: ou=scaleops,dc=example,dc=com userBindAttributes: # Optional, Attributes for username to be searched by upon login - sAMAccountName groupBindAttributes: # Optional, Attributes for user's group to be searched by upon login - dn

Additional configuration options for LDAP integrations:

authProvider: provider: ldap ldap: server: ldap://ldap.example.com port: 389 # Optional insecureSkipVerify: true # Optional, defaults to false bindUserName: uid=scaleops,ou=scaleops,dc=example,dc=com bindUserPassword: <BIND-USER-PASSWORD> baseDN: ou=scaleops,dc=example,dc=com userBindAttributes: # Optional, Attributes for username to be searched by upon login - sAMAccountName groupBindAttributes: # Optional, Attributes for user's group to be searched by upon login - dn