Skip to content

Commit fb2e3de

Browse files
authored
Merge pull request #5571 from influxdata/gw-ldaps-docs
docs: LDAPS and LDAP Client Certificate Docs
2 parents 687f197 + 111faf9 commit fb2e3de

File tree

1 file changed

+37
-27
lines changed
  • content/enterprise_influxdb/v1/administration/configure/security

1 file changed

+37
-27
lines changed

content/enterprise_influxdb/v1/administration/configure/security/ldap.md

Lines changed: 37 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -157,10 +157,7 @@ The DN of an LDAP entry is similar to a file path on a file system.
157157
enabled = true
158158
159159
[[servers]]
160-
enabled = true
161-
162-
[[servers]]
163-
host = "<LDAPserver>"
160+
host = "ldap.example.com"
164161
port = 389
165162
166163
# Security mode for LDAP connection to this server.
@@ -194,54 +191,67 @@ enabled = true
194191
client-tls-certificate = "/var/run/secrets/ldapClient.pem"
195192
client-tls-private-key = "/var/run/secrets/ldapClient.key"
196193
194+
# Client certificates to present to the LDAP server are supported with
195+
# "client-tls-certificate" and "client-tls-private-key" configurations.
196+
# These are paths to the X.509 client certificate and corresponding private
197+
# key, respectively. If "client-tls-certificate" is set but
198+
# "client-tls-private-key" is not, then "client-tls-certificate" is assumed
199+
# to bundle both the certificate and private key.
200+
# The LDAP server may request and require valid client certificates
201+
# even when InfluxDB is configured with an insecure TLS mode that ignores
202+
# LDAP server certificate errors.
203+
# Not all LDAP servers will request a client certificate. It is not
204+
# necessary to set "client-tls-certificate" and "client-tls-private-key"
205+
# if the LDAP server does not require client certificates.
206+
client-tls-certificate = "/var/run/secrets/ldapClient.pem"
207+
client-tls-private-key = "/var/run/secrets/ldapClient.key"
208+
197209
# Credentials to use when searching for a user or group.
198210
bind-dn = "cn=read-only-admin,dc=example,dc=com"
199-
bind-password = "password"
211+
bind-password = "read-only-admin's password"
200212
201213
# Base DNs to use when applying the search-filter to discover an LDAP user.
202214
search-base-dns = [
203215
"dc=example,dc=com",
204216
]
205217
206218
# LDAP filter to discover a user's DN.
207-
# %s will be replaced with the provided username.
208-
search-filter = "(uid=%s)"
209-
# On Active Directory you might use "(sAMAccountName=%s)".
219+
# %%s will be replaced with the provided username.
220+
search-filter = "(uid=%%s)"
221+
# On Active Directory you might use "(sAMAccountName=%%s)".
210222
211223
# Base DNs to use when searching for groups.
212-
group-search-base-dns = ["dc=example,dc=com"]
224+
group-search-base-dns = ["ou=groups,dc=example,dc=com"]
213225
214226
# LDAP filter to identify groups that a user belongs to.
215-
# %s will be replaced with the user's DN.
216-
group-membership-search-filter = "(&(objectClass=groupOfUniqueNames)(uniqueMember=%s))"
217-
# On Active Directory you might use "(&(objectClass=group)(member=%s))".
227+
# %%s will be replaced with the user's DN.
228+
group-membership-search-filter = "(&(objectClass=groupOfUniqueNames)(uniqueMember=%%s))"
229+
# On Active Directory you might use "(&(objectClass=group)(member=%%s))".
218230
219231
# Attribute to use to determine the "group" in the group-mappings section.
220232
group-attribute = "ou"
221233
# On Active Directory you might use "cn".
222234
223-
# LDAP filter to search for a group with a particular name.
224-
# This is used when warming the cache to load group membership.
225-
group-search-filter = "(&(objectClass=groupOfUniqueNames)(cn=%s))"
226-
# On Active Directory you might use "(&(objectClass=group)(cn=%s))".
235+
# LDAP filter to search for groups during cache warming.
236+
# %%s will be replaced with the "group" value in the group-mappings section.
237+
group-search-filter = "(&(objectClass=groupOfUniqueNames)(ou=%%s))"
227238
228-
# Attribute of a group that contains the DNs of the group's members.
239+
# Attribute on group objects indicating membership.
240+
# Used during cache warming, should be same as part of the group-membership-search-filter.
229241
group-member-attribute = "uniqueMember"
230-
# On Active Directory you might use "member".
231242
232-
# Create an administrator role in InfluxDB and then log in as a member of the admin LDAP group. Only members of a group with the administrator role can complete admin tasks.
233-
# For example, if tesla is the only member of the `italians` group, you must log in as tesla/password.
234-
admin-groups = ["italians"]
243+
# Groups whose members have admin privileges on the influxdb servers.
244+
admin-groups = ["influx-admins"]
235245
236-
# These two roles would have to be created by hand if you want these LDAP group memberships to do anything.
246+
# Mappings of LDAP groups to Influx roles.
247+
# All Influx roles need to be manually created to take effect.
237248
[[servers.group-mappings]]
238-
group = "mathematicians"
239-
role = "arithmetic"
249+
group = "app-developers"
250+
role = "app-metrics-rw"
240251
241252
[[servers.group-mappings]]
242-
group = "scientists"
243-
role = "laboratory"
244-
253+
group = "web-support"
254+
role = "web-traffic-ro"
245255
```
246256
{{% /truncate %}}
247257

0 commit comments

Comments
 (0)