mirror of
https://github.com/ansible/awx.git
synced 2026-02-26 15:36:04 -03:30
Remove LDAP authentication (#15546)
Remove LDAP authentication from AWX
This commit is contained in:
committed by
jessicamack
parent
6dea7bfe17
commit
f22b192fb4
@@ -11,12 +11,11 @@ When a user wants to log into AWX, she can explicitly choose some of the support
|
||||
* Microsoft Azure Active Directory (AD) OAuth2
|
||||
|
||||
On the other hand, the other authentication methods use the same types of login info (username and password), but authenticate using external auth systems rather than AWX's own database. If some of these methods are enabled, AWX will try authenticating using the enabled methods *before AWX's own authentication method*. The order of precedence is:
|
||||
* LDAP
|
||||
* RADIUS
|
||||
* TACACS+
|
||||
* SAML
|
||||
|
||||
AWX will try authenticating against each enabled authentication method *in the specified order*, meaning if the same username and password is valid in multiple enabled auth methods (*e.g.*, both LDAP and TACACS+), AWX will only use the first positive match (in the above example, log a user in via LDAP and skip TACACS+).
|
||||
AWX will try authenticating against each enabled authentication method *in the specified order*, meaning if the same username and password is valid in multiple enabled auth methods (*e.g.*, both RADIUS and TACACS+), AWX will only use the first positive match (in the above example, log a user in via RADIUS and skip TACACS+).
|
||||
|
||||
## Notes:
|
||||
SAML users, RADIUS users and TACACS+ users are categorized as 'Enterprise' users. The following rules apply to Enterprise users:
|
||||
|
||||
@@ -1,68 +0,0 @@
|
||||
# LDAP
|
||||
The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network.
|
||||
|
||||
|
||||
# Configure LDAP Authentication
|
||||
|
||||
Please see the [AWX documentation](https://ansible.readthedocs.io/projects/awx/en/latest/administration/ldap_auth.html) for basic LDAP configuration.
|
||||
|
||||
LDAP Authentication provides duplicate sets of configuration fields for authentication with up to six different LDAP servers.
|
||||
The default set of configuration fields take the form `AUTH_LDAP_<field name>`. Configuration fields for additional LDAP servers are numbered `AUTH_LDAP_<n>_<field name>`.
|
||||
|
||||
|
||||
## Test Environment Setup
|
||||
|
||||
Please see `README.md` of this repository: https://github.com/ansible/deploy_ldap
|
||||
|
||||
|
||||
# Basic Setup for FreeIPA
|
||||
|
||||
LDAP Server URI (append if you have multiple LDAPs)
|
||||
`ldaps://{{serverip1}}:636`
|
||||
|
||||
LDAP BIND DN (How to create a bind account in [FreeIPA](https://www.freeipa.org/page/Creating_a_binddn_for_Foreman)
|
||||
`uid=awx-bind,cn=sysaccounts,cn=etc,dc=example,dc=com`
|
||||
|
||||
LDAP BIND PASSWORD
|
||||
`{{yourbindaccountpassword}}`
|
||||
|
||||
LDAP USER DN TEMPLATE
|
||||
`uid=%(user)s,cn=users,cn=accounts,dc=example,dc=com`
|
||||
|
||||
LDAP GROUP TYPE
|
||||
`NestedMemberDNGroupType`
|
||||
|
||||
LDAP GROUP SEARCH
|
||||
```
|
||||
[
|
||||
"cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"SCOPE_SUBTREE",
|
||||
"(objectClass=groupOfNames)"
|
||||
]
|
||||
```
|
||||
|
||||
LDAP USER ATTRIBUTE MAP
|
||||
```
|
||||
{
|
||||
"first_name": "givenName",
|
||||
"last_name": "sn",
|
||||
"email": "mail"
|
||||
}
|
||||
```
|
||||
|
||||
LDAP USER FLAGS BY GROUP
|
||||
```
|
||||
{
|
||||
"is_superuser": "cn={{superusergroupname}},cn=groups,cn=accounts,dc=example,dc=com"
|
||||
}
|
||||
```
|
||||
|
||||
LDAP ORGANIZATION MAP
|
||||
```
|
||||
{
|
||||
"{{yourorganizationname}}": {
|
||||
"admins": "cn={{admingroupname}},cn=groups,cn=accounts,dc=example,dc=com",
|
||||
"remove_admins": false
|
||||
}
|
||||
}
|
||||
```
|
||||
Reference in New Issue
Block a user