profile
viewpoint

wheelybird/ldap-user-manager 113

A PHP web-based interface for LDAP user account management and self-service password change.

wheelybird/openvpn-server-ldap-otp 64

A dockerised OpenVPN server using LDAP for authentication, with optional 2FA via Google Authenticator

wheelybird/dev-consul-vault 0

Run single instances of Consult and Vault as containers with persistent data and self-signed certificates.

wheelybird/openvpn-client 0

An OpenVPN client container

wheelybird/templater 0

A very basic templating engine, ideal for use with Docker Swarm

startedwheelybird/ldap-user-manager

started time in a day

startedwheelybird/ldap-user-manager

started time in 4 days

startedwheelybird/ldap-user-manager

started time in 6 days

fork OpenAdministration/ldap-user-manager

A PHP web-based interface for LDAP user account management and self-service password change.

fork in 6 days

startedwheelybird/ldap-user-manager

started time in 7 days

fork luiscruzcwb/ldap-user-manager

A PHP web-based interface for LDAP user account management and self-service password change.

fork in 16 days

startedwheelybird/ldap-user-manager

started time in 17 days

startedwheelybird/ldap-user-manager

started time in 20 days

startedwheelybird/ldap-user-manager

started time in 21 days

startedwheelybird/ldap-user-manager

started time in 21 days

issue closedwheelybird/ldap-user-manager

Pass-Through authentication with SASL

Hello,

I would love to use ldap-user-manager but I need to setup pass-through authentication to another LDAP server. What I usually do is set the userPassword attribute of a user to "{SASL}username" to that openldap will use SASL for this user, and thus delegate the authentication to another server. Is there any way I can do that with ldap-user-manager ?

Thanks.

closed time in 22 days

insatomcat

startedwheelybird/ldap-user-manager

started time in 22 days

startedwheelybird/ldap-user-manager

started time in 23 days

startedwheelybird/ldap-user-manager

started time in 24 days

issue openedwheelybird/ldap-user-manager

ARM support

Hello, I would like to request ARM support to be able to run this image on raspberry pi.

created time in 25 days

fork insatomcat/ldap-user-manager

A PHP web-based interface for LDAP user account management and self-service password change.

fork in a month

startedwheelybird/ldap-user-manager

started time in a month

issue commentwheelybird/ldap-user-manager

Pass-Through authentication with SASL

Thanks it's fine now. I still have to play with sasl and the osixia/openldap image.

In the meantine, may I suggest 2 improvements that would help with my use case:

  • Even if PASSWORD_HASH could stay as the default hashing algorithm, it'd be great to be able to choose the algorithm for each user (with a dropdown list like phpldapadmin has). That way I could choose for each user whether I want sasl (in which case CLEAR is fine) or if want to set a real passwd (in which case CLEAR is a really bad idea).
  • for typing a SASL userPassword, the "confirmation" and the "secret" typing is a little problem. A feature to either select a "secret" typing (with a necessary confirm textbox), or a "non secret" (show password) typing (with no confirmation textbox) would be great.

Thanks

insatomcat

comment created time in a month

issue commentwheelybird/ldap-user-manager

Pass-Through authentication with SASL

Thanks. Even with the PASSWORD_HASH=CLEAR option, I can still see the passwords stored with SSHA. Something I'm doing wrong?

insatomcat

comment created time in a month

issue openedwheelybird/ldap-user-manager

Pass-Through authentication with SASL

Hello,

I would love to use ldap-user-manager but I need to setup pass-through authentication to another LDAP server. What I usually do is set the userPassword attribute of a user to "{SASL}username" to that openldap will use SASL for this user, and thus delegate the authentication to another server. Is there any way I can do that with ldap-user-manager ?

Thanks.

created time in a month

fork MarcelHeckel/ldap-user-manager

A PHP web-based interface for LDAP user account management and self-service password change.

fork in a month

startedwheelybird/openvpn-server-ldap-otp

started time in a month

startedwheelybird/ldap-user-manager

started time in a month

startedwheelybird/ldap-user-manager

started time in a month

startedwheelybird/ldap-user-manager

started time in a month

startedwheelybird/ldap-user-manager

started time in a month

issue openedwheelybird/ldap-user-manager

Fails to open ldap after creation

My Compose File: version: '2' services: ldapwebui: image: wheelybird/ldap-user-manager:latest ports: - "1380:80/tcp" - "13443:443/tcp" volumes: - ldapwebvar:/var environment: - SERVER_HOSTNAME=myapp.penguinzmedia.group - LDAP_URI=ldap://localhost:389 - LDAP_ADMIN_BIND_PWD=redacted - MAIL_DOMAIN=penguinzmedia.group - LDAP_DOMAIN=penguinzmedia.group - LDAP_ADMIN_BIND_DN=cn=admin,dc=penguinzmedia,dc=group - LDAP_ADMINS_GROUP=cn=admins,ou=groups,dc=penguinzmedia,dc=group - LDAP_BASE_DN=dc=penguinzmedia,dc=group - LDAP_REQUIRE_STARTTLS=false volumes: ldapwebvar: driver: local Docker Version: Docker version 19.03.13, build 4484c46d9d Docker Host Version: Distributor ID: Ubuntu Description: Ubuntu 18.04.5 LTS Release: 18.04 Codename: bionic docker-compose version 1.17.1, build unknown

Error thrown by webpage: ` Warning: preg_grep() expects parameter 2 to be array, null given in /opt/ldap_user_manager/includes/ldap_functions.inc.php on line 452

Warning: Cannot modify header information - headers already sent by (output started at /opt/ldap_user_manager/includes/ldap_functions.inc.php:452) in /opt/ldap_user_manager/log_in/index.php on line 27`

created time in 2 months

startedwheelybird/ldap-user-manager

started time in 2 months

startedwheelybird/ldap-user-manager

started time in 2 months

pull request commentwheelybird/openvpn-server-ldap-otp

fixed openVPN connection with openLDAP support

Hi. Aside from the refactoring of the scripts, could you tell me what this is actually fixing?

I tried to use the Docker image to connect to another Docker container running openLDAP for authentication. This was not functional. So I forked the current master branch and started debugging the scripts. I found some issues and fixed them. Also, I refactured the scripts for a better readaility, e.g. used correct options for "test" or sorted variable definitions. The current pull request is operational now. Please feel free to test the changes - or reject the pull request. I just wanted to share my work with your great repo.

knieselpriem

comment created time in 2 months

more