Security News
Oracle Drags Its Feet in the JavaScript Trademark Dispute
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
= LDAP Fluff
Provides multiple implementations of LDAP queries for various backends
Supports Active Directory, FreeIPA and posix-style LDAP
== Installation
Now available in the rubygems.org repo, https://rubygems.org/gems/ldap_fluff
$ gem install ldap_fluff
== Rails Application Configuration
You'll have to configure the gem a little bit to get it hooked into your LDAP server.
It exposes these methods: authenticate?(username, password) returns true if the username & password combo bind correctly
group_list(uid) returns the set of LDAP groups a user belongs to in a string list
user_list(gid) returns the set of users that belong to an LDAP group
is_in_groups?(uid, grouplist) returns true if the user provided is in all of the groups listed in grouplist
valid_user?(uid) returns true if the user provided exists
valid_group?(uid) returns true if the group provided exists
find_user(uid) returns the LDAP entry of the user if found, nil if not found
find_group(gid) returns the LDAP entry of the group if found, nil if not found
These methods are handy for using LDAP for both authentication and authorization.
This gem integrates with warden/devise quite nicely.
Your global configuration must provide information about your LDAP host to function properly.
host: # ip address or hostname port: # port encryption: # blank, :simple_tls, or :start_tls base_dn: # base DN for LDAP auth, eg dc=redhat,dc=com group_base: # base DN for your LDAP groups, eg ou=Groups,dc=redhat,dc=com use_netgroups: # false by default, use true if you want to use netgroup triples, # supported only for server type :free_ipa and :posix server_type: # type of server. default == :posix. :active_directory, :posix, :free_ipa ad_domain: # domain for your users if using active directory, eg redhat.com service_user: # service account for authenticating LDAP calls. required unless you enable anon service_pass: # service password for authenticating LDAP calls. required unless you enable anon anon_queries: # false by default, true if you don't want to use the service user instrumentation_service: # nil by default, an object that supports the ActiveSupport::Notifications API
You can pass these arguments as a hash to LdapFluff to get a valid LdapFluff object.
ldap_config = { :host => "freeipa.localdomain", :port => 389, :encryption => nil, :base_dn => "DC=mydomain,DC=com", :group_base => "DC=groups,DC=mydomain,DC=com", :attr_login => "uid", :server_type => :free_ipa, :service_user => "admin", :search_filter => "(objectClass=*)", :service_pass => "mypass", :anon_queries => false }
fluff = LdapFluff.new(ldap_config) fluff.valid_user?("admin") # returns true
=== TLS support
ldap_fluff fully supports simple_tls and start_tls encryption, but most likely you'll need to add your server's CAs to the local bundle. on a Red Hat style system, it's probably something like this:
$ cat ldap_server_ca.crt >> /etc/pki/tls/certs/ca-bundle.crt
=== A note on ActiveDirectory
ldap_fluff does not support searching/binding global catalogs
service_user (formatted as "ad_domain/username") and service_pass OR anon_queries are required for AD support
Group membership searches will use "msds-memberOfTransitive" where possible, and will fall back to a recursive lookup
=== A note on FreeIPA
ldap_fluff appends cn=groups,cn=accounts to the beginning of all BIND calls. You do not need to include this in your base_dn string
=== Instrumentation
Both net-ldap and ldap_fluff support instrumentation of API calls, which can help debug performance issues or to find what LDAP queries are being made.
The :instrumentation_service item in the configuration should support an equivalent API to ActiveSupport::Notifications. ldap_fluff will use this and also pass it to net-ldap.
When using Rails, pass :instrumentation_service => ActiveSupport::Notifications
and then subscribe to, and
optionally log events (e.g. https://gist.github.com/mnutt/566725).
== Contributing
Feel free to file PR against our github repository.
== License
ldap_fluff is licensed under the GPLv2. Please read LICENSE for more information.
FAQs
Unknown package
We found that ldap_fluff demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.
Security News
The Linux Foundation is warning open source developers that compliance with global sanctions is mandatory, highlighting legal risks and restrictions on contributions.
Security News
Maven Central now validates Sigstore signatures, making it easier for developers to verify the provenance of Java packages.