matrix-docker-ansible-deploy/docs/configuring-playbook-ldap-auth.md
spatterlight beb40134b7
Add support for backup LDAP servers (#2650)
* Update homeserver.yaml.j2

* Update configuring-playbook-ldap-auth.md

* Update homeserver.yaml.j2
2023-04-19 08:52:03 +03:00

1.9 KiB

Setting up the LDAP authentication password provider module (optional, advanced)

The playbook can install and configure the matrix-synapse-ldap3 LDAP Auth password provider for you.

See that project's documentation to learn what it does and why it might be useful to you.

If you decide that you'd like to let this playbook install it for you, you need some configuration like this:

matrix_synapse_ext_password_provider_ldap_enabled: true
matrix_synapse_ext_password_provider_ldap_uri: 
  - "ldap://ldap-01.mydomain.tld:389"
  - "ldap://ldap-02.mydomain.tld:389"
matrix_synapse_ext_password_provider_ldap_start_tls: true
matrix_synapse_ext_password_provider_ldap_base: "ou=users,dc=example,dc=com"
matrix_synapse_ext_password_provider_ldap_attributes_uid: "uid"
matrix_synapse_ext_password_provider_ldap_attributes_mail: "mail"
matrix_synapse_ext_password_provider_ldap_attributes_name: "cn"
matrix_synapse_ext_password_provider_ldap_bind_dn: ""
matrix_synapse_ext_password_provider_ldap_bind_password: ""
matrix_synapse_ext_password_provider_ldap_filter: ""

Authenticating only using a password provider

If you wish for users to authenticate only against configured password providers (like this one), without consulting Synapse's local database, feel free to disable it:

matrix_synapse_password_config_localdb_enabled: false

Using ma1sd Identity Server for authentication

If you wish to use the ma1sd Identity Server for LDAP authentication instead of matrix-synapse-ldap3 consult Adjusting ma1sd Identity Server configuration.

Handling user registration

If you wish for users to also be able to make new registrations against LDAP, you may also wish to set up the ldap-registration-proxy.