jupyterhub-ldap-authenticator
LDAP Authenticator plugin for JupyterHub.
This project was written with Enterprise LDAP integration in mind and includes the
following features:
- Supports multiple LDAP servers and allows for configuration of
server_pool_strategy
- Uses single read-only LDAP connection per authentication request
- Verifies authenticating user exists in LDAP and is a member of
allowed_groups
before testing authentication - Supports using nested groups in
allowed_groups
list - Supports domain user home directory creation at login
This project was inspired by the ldapauthenticator project
Installation
Install with pip:
pip install jupyterhub-ldap-authenticator
Configuration
To enable LDAPAuthenticator, add the following line to the Jupyterhub config file and extend configuration with the parameters listed below.
c.JupyterHub.authenticator_class = 'ldapauthenticator.LDAPAuthenticator'
- LDAPAuthenticator.server_hosts
- List of Names, IPs, or the complete URLs in the scheme://hostname:hostport format of the server (required).
c.LDAPAuthenticator.server_hosts = ['ldaps://ldap1.example.com:636', 'ldaps://ldap2.example.com:636']
c.LDAPAuthenticator.server_hosts = ['ldap1.example.com', 'ldap2.example.com']
c.LDAPAuthenticator.server_hosts = ['10.0.0.1', '10.0.0.2']
- LDAPAuthenticator.server_port
- The port where the LDAP server is listening. Typically 389, for a cleartext connection, and 636 for a secured connection (defaults to None).
c.LDAPAuthenticator.server_port = 636
- LDAPAuthenticator.server_use_ssl
- Boolean specifying if the connection is on a secure port (defaults to False).
c.LDAPAuthenticator.server_use_ssl = True
- LDAPAuthenticator.server_connect_timeout
- Timeout in seconds permitted when establishing an ldap connection before raising an exception (defaults to None).
c.LDAPAuthenticator.server_connect_timeout = 10
- LDAPAuthenticator.server_receive_timeout
- Timeout in seconds permitted for responses from established ldap connections before raising an exception (defaults to None).
c.LDAPAuthenticator.server_receive_timeout = 10
- LDAPAuthenticator.server_pool_strategy
- Available Pool HA strategies (defaults to 'FIRST').
- FIRST: Gets the first server in the pool, if 'server_pool_active' is set to True gets the first available server.
- ROUND_ROBIN: Each time the connection is open the subsequent server in the pool is used. If 'server_pool_active' is set to True unavailable servers will be discarded.
- RANDOM: each time the connection is open a random server is chosen in the pool. If 'server_pool_active' is set to True unavailable servers will be discarded.
c.LDAPAuthenticator.server_pool_strategy = 'FIRST'
- LDAPAuthenticator.server_pool_active
- If True the ServerPool strategy will check for server availability. Set to Integer for maximum number of cycles to try before giving up (defaults to True).
c.LDAPAuthenticator.server_pool_active = True
c.LDAPAuthenticator.server_pool_active = 3
- LDAPAuthenticator.server_pool_exhaust
- If True, any inactive servers will be removed from the pool. If set to an Integer, this will be the number of seconds an unreachable server is considered offline. When this timeout expires the server is reinserted in the pool and checked again for availability (defaults to False).
c.LDAPAuthenticator.server_pool_exhaust = True
c.LDAPAuthenticator.server_pool_exhaust = 600
- LDAPAuthenticator.bind_user_dn
- The account of the user to log in for simple bind (defaults to None).
c.LDAPAuthenticator.bind_user_dn = 'uid=imauser,cn=users,cn=accounts,dc=example,dc=com'
c.LDAPAuthenticator.bind_user_dn = 'CN=imauser,CN=Users,DC=example,DC=com'
- LDAPAuthenticator.bind_user_password
- The password of the user for simple bind (defaults to None).
c.LDAPAuthenticator.bind_user_password = 'password'
- LDAPAuthenticator.user_search_base
- The location in the Directory Information Tree where the user search will start.
c.LDAPAuthenticator.user_search_base = 'cn=users,cn=accounts,dc=example,dc=com'
c.LDAPAuthenticator.user_search_base = 'CN=Users,DC=example,DC=com'
- LDAPAuthenticator.user_search_filter
- LDAP search filter to validate that the authenticating user exists within the organization. Search filters containing '{username}' will have that value substituted with the username of the authenticating user.
c.LDAPAuthenticator.user_search_filter = '(&(objectClass=person)(uid={username}))'
c.LDAPAuthenticator.user_search_filter = '(&(objectCategory=person)(objectClass=user)(sAMAccountName={username}))'
- LDAPAuthenticator.user_membership_attribute
- LDAP Attribute used to associate user group membership (defaults to 'memberOf').
c.LDAPAuthenticator.user_membership_attribute = 'memberOf'
- LDAPAuthenticator.group_search_base
- The location in the Directory Information Tree where the group search will start.
Search string containing '{group}' will be substituted with entries taken from
allowed_groups
c.LDAPAuthenticator.group_search_base = 'cn=groups,cn=accounts,dc=example,dc=com'
c.LDAPAuthenticator.group_search_base = 'CN=Groups,DC=example,DC=com'
- LDAPAuthenticator.group_search_filter
- LDAP search filter to return members of groups defined in the allowed_groups parameter. Search filters containing '{group}' will have that value substituted with the group dns provided in the allowed_groups parameter.
c.LDAPAuthenticator.group_search_filter = '(&(objectClass=ipausergroup)(memberOf={group}))'
c.LDAPAuthenticator.group_search_filter = '(&(objectClass=group)(memberOf={group}))'
- LDAPAuthenticator.allowed_groups
- List of LDAP group DNs that users must be a member of in order to be granted login. If left undefined or set to None, allowed_groups will be short-circuited and all users will be allowed (defaults to None).
c.LDAPAuthenticator.allowed_groups = ['cn=jupyterhub-users,cn=groups,cn=accounts,dc=example,dc=com']
- LDAPAuthenticator.allow_nested_groups
- Boolean allowing for recursive search of members within nested groups of
allowed_groups (defaults to False).
c.LDAPAuthenticator.allow_nested_groups = True
- LDAPAuthenticator.username_pattern
- Regular expression pattern that all valid usernames must match. If a username
does not match the pattern specified here, authentication will not be attempted.
If not set, allow any username (defaults to None).
c.LDAPAuthenticator.username_pattern = '[a-zA-Z0-9_.][a-zA-Z0-9_.-]{0,252}[a-zA-Z0-9_.$-]?'
c.LDAPAuthenticator.username_pattern = '[a-zA-Z0-9_.][a-zA-Z0-9_.-]{8,20}[a-zA-Z0-9_.$-]?'
- LDAPAuthenticator.create_user_home_dir
- Boolean allowing for user home directory to be created at login
c.LDAPAuthenticator.create_user_home_dir = True
- LDAPAuthenticator.create_user_home_dir_cmd
- Command used when creating a userhome directory as a list of strings. The
username will be appended as the final argument. Defaults
to `mkhomedir_helper` on linux systems.
c.LDAPAuthenticator.create_user_home_dir_cmd = ['mkhomedir_helper']
Examples
FreeIPA Integration
c.JupyterHub.authenticator_class = 'ldapauthenticator.LDAPAuthenticator'
c.LDAPAuthenticator.server_hosts = ['ldaps://ldap1.example.com:636', 'ldaps://ldap2.example.com:636']
c.LDAPAuthenticator.bind_user_dn = 'uid=imauser,cn=users,cn=accounts,dc=example,dc=com'
c.LDAPAuthenticator.bind_user_password = 'imapassword'
c.LDAPAuthenticator.user_search_base = 'cn=users,cn=accounts,dc=example,dc=com'
c.LDAPAuthenticator.user_search_filter = '(&(objectClass=person)(uid={username}))'
c.LDAPAuthenticator.user_membership_attribute = 'memberOf'
c.LDAPAuthenticator.group_search_base = 'cn=groups,cn=accounts,dc=example,dc=com'
c.LDAPAuthenticator.group_search_filter = '(&(objectClass=ipausergroup)(memberOf={group}))'
c.LDAPAuthenticator.allowed_groups = ['cn=jupyterhub-users,cn=groups,cn=accounts,dc=example,dc=com']
c.LDAPAuthenticator.allow_nested_groups = True
c.LDAPAuthenticator.username_pattern = '[a-zA-Z0-9_.][a-zA-Z0-9_.-]{0,252}[a-zA-Z0-9_.$-]?'
c.LDAPAuthenticator.create_user_home_dir = True
c.LDAPAuthenticator.create_user_home_dir_cmd = ['mkhomedir_helper']
Active Directory Integration
c.JupyterHub.authenticator_class = 'ldapauthenticator.LDAPAuthenticator'
c.LDAPAuthenticator.server_hosts = ['ldaps://ldap1.example.com:636', 'ldaps://ldap2.example.com:636']
c.LDAPAuthenticator.bind_user_dn = 'CN=imauser,CN=Users,DC=example,DC=com'
c.LDAPAuthenticator.bind_user_password = 'imapassword'
c.LDAPAuthenticator.user_search_base = 'CN=Users,DC=example,DC=com'
c.LDAPAuthenticator.user_search_filter = '(&(objectCategory=person)(objectClass=user)(sAMAccountName={username}))
c.LDAPAuthenticator.user_membership_attribute = 'memberOf'
c.LDAPAuthenticator.group_search_base = 'CN=Groups,DC=example,DC=com'
c.LDAPAuthenticator.group_search_filter = '(&(objectClass=group)(memberOf={group}))'
c.LDAPAuthenticator.allowed_groups = ['CN=jupyterhub-users,CN=Groups,DC=example,DC=com']
c.LDAPAuthenticator.allow_nested_groups = True
c.LDAPAuthenticator.username_pattern = '[a-zA-Z0-9_.][a-zA-Z0-9_.-]{8,20}[a-zA-Z0-9_.$-]?'
c.LDAPAuthenticator.create_user_home_dir = True
c.LDAPAuthenticator.create_user_home_dir_cmd = ['mkhomedir_helper']
OpenLDAP Integration
Because OpenLDAP does not natively support the memberOf attribute in their user objects, the allowed_groups
scoping has been short-circuited in the following example:
c.JupyterHub.authenticator_class = 'ldapauthenticator.LDAPAuthenticator'
c.LDAPAuthenticator.server_hosts = ['ldaps://ldap1.example.com:636', 'ldaps://ldap2.example.com:636']
c.LDAPAuthenticator.bind_user_dn = 'uid=imauser,ou=People,dc=example,dc=com'
c.LDAPAuthenticator.bind_user_password = 'imapassword'
c.LDAPAuthenticator.user_search_base = 'ou=People,dc=example,dc=com'
c.LDAPAuthenticator.user_search_filter = '(&(objectClass=posixAccount)(uid={username}))'
c.LDAPAuthenticator.username_pattern = '[a-zA-Z0-9_.][a-zA-Z0-9_.-]{0,252}[a-zA-Z0-9_.$-]?'
c.LDAPAuthenticator.create_user_home_dir = True
c.LDAPAuthenticator.create_user_home_dir_cmd = ['mkhomedir_helper']