Authentication server for Docker Registry V2 with LDAP
Authentication Server for Registry v2 with ldap
Will provide tokens on basis of LDAP authentification.
LDAP authentification will be done by binding to ldap with the username and password provided.
This plugin is oriented to AD so the username will be matched to SamAccountName and a default domain is required.
The set of rules will be evaluated and the resultant actions for the scope will be returned.
Rules can be set on users or on groups.
# cert and key will be generated if file are not present
jwscert: /etc/registry-token-ldap/cert.crt
jwskey: /etc/registry-token-ldap/cert.key
# issuer must match registry config
issuer: "auth.registry.local"
# ldap server to use
ldapserver: ad.contoso.com
# base to search for users
ldapbase: "DC=contoso,DC=com"
# domain to automaticaly add to auth request
defaultdomain: CONTOSO
# rules to provide access (cumulative)
rules:
# Admin can do all
- group: "AdminGroup"
match: ".+"
actions: [ "push", "pull" ]
# Users can do all on their repo
- match: "${user}/.+"
actions: [ "push", "pull" ]
# Everybody can pull
- match: ".+"
actions: [ "pull" ]
optional config:
# port to listen to (default "5001")
port: 5500
# path to listen to (default "token")
path: auth
# use secure tls for ldap (default: "insecure")
LDAPTls: secure
# attriute to find users (default: "sAMAccountName")
LDAPAttribute: mail
# certificate to auth ca
LDAPCa: /etc/ldapca.crt
See license