-
Notifications
You must be signed in to change notification settings - Fork 0
/
docker-compose.yml
64 lines (62 loc) · 2.34 KB
/
docker-compose.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
version: "3"
services:
ldapauthd:
image: g0dscookie/ldapauthd
networks:
- internal
ports:
- 80:80
environment:
# Loglevel the daemon should run on.
#- LDAPAUTHD_LOGLEVEL=INFO
# User the daemon should be run with.
#- LDAPAUTHD_USER=nobody
# IP address the daemon should listen on.
#- LDAPAUTHD_IP=0.0.0.0
# Port the daemon should listen on.
#- LDAPAUTHD_PORT=80
# String to set in WWW-Authenticate
#- LDAPAUTHD_REALM=Authorization required
# Choose session storage backend. Available: memcached
#- LDAPAUTHD_SESSION_STORAGE=memcached
# Key prefix to avoid collisions inside memcache when running multiple ldapauthd instances
#- LDAPAUTHD_SESSION_PREFIX=
# Set domain for your session cookie.
#- LDAPAUTHD_SESSION_DOMAIN=
# Host address of your session storage.
#- LDAPAUTHD_SESSION_HOST=sessiondb:11211
# Maximum TTL for sessions in seconds.
#- LDAPAUTHD_SESSION_TTL=900
# https://ldap3.readthedocs.io/logging.html#logging-detail-level
#- LDAP_LOGLEVEL=ERROR
# Attributes to get from ldap and report to client
#- LDAP_ATTRIBUTES={"cn": "X-Forwarded-FullName", "mail": "X-Forwarded-Email", "sAMAccountName": "X-Forwarded-User"}
# The header name where the associated role should be stored
#- LDAP_ROLEHEADER=X-Forwarded-Role
# Allow specific users. Will be matched with given username
#- LDAP_ALLOWEDUSERS=
# Allow specific groups. Will be matched with full group dn
#- LDAP_ALLOWEDGROUPS=
# Base DN every search request will be based on.
#- LDAP_BASEDN=ou=Company,dc=example,dc=org
# Bind user to use for querying your ldap server.
#- LDAP_BINDDN=cn=bind user,dc=example,dc=org
# Bind users password.
# This can also be a path to a plain text file
#- LDAP_BINDPW=password
# Comma seperated list of ldap backend names.
#- LDAP_BACKENDS=dc01
# Hostname of your domain controller.
#- LDAP_DC01_HOST=dc01.example.org
# Port on your domain controller to connect to.
#- LDAP_DC01_PORT=636
# Use SSL for ldap connection.
#- LDAP_DC01_SSL=True
# Verify remote SSL certificate.
#- LDAP_DC01_SSL_VALIDATE=True
sessiondb:
image: memcached
networks:
- internal
networks:
internal: