Commit graph

10 commits

Author SHA1 Message Date
Moto Ishizawa
eb0c312734 connector: add emailClaim setting to OIDC Connector
Add emailCiam setting to OIDC Connector for supporting an ID token
that does not contain the email claim.
2016-08-12 10:45:47 +09:00
Jeremy Whitlock
27b80cbca8 connector: add uaa connector
This commit adds support for dex to authenticate users from a
CloudFoundry User Account and Authentication (UAA) Server.

Fixes: #538
2016-08-10 16:04:39 -06:00
Nicanor Gutierrez
dace4b2d25 Fix typo in dexctl parameter 2016-08-10 12:37:55 +02:00
Eric Chiang
40c1ade816 Documentation: update connector callback documentation to use issuer URL 2016-07-26 11:21:54 -07:00
Eric Chiang
607d9920d8 Documentation: document "groups" scope and LDAP implementation 2016-07-19 11:23:05 -07:00
Eric Chiang
5a78e89807 clean up LDAP connector
* Remove some unlikely to be used fields to help configurability.
  * Combined "serverHost" and "serverPort" into "host"
  * Remove "timeout" (just default to 30 seconds).
  * Remove "maxIdleConn" will add it back if users feel the need
    to control the number of cached connections.
  * Remove "trustedEmailProvider" (just always trust).
  * Remove "skipCertVerification" you can't make this connector
    ingore TLS errors.
* Fix configs that don't search before bind (previously broken).
* Add more examples to Documentation
* Refactor LDAPPool Acquire() and Put() into a Do() function which
  always does the flow correctly.
* Added more comments and renamed some functions.
* Moved methods on LDAPIdentityProvider to the LDAPConnector
2016-06-28 15:01:39 -07:00
Frode Nordahl
e531dd6be5 Implement connection pooling for LDAP connections
Fixes #309
2016-06-03 11:04:58 +02:00
Frode Nordahl
4d970d5fc4 connector: add LDAP connector
Authentication is performed by binding to the configured LDAP server using
the user supplied credentials. Successfull bind equals authenticated user.

Optionally the connector can be configured to search before authentication.
The entryDN found will be used to bind to the LDAP server.

This feature must be enabled to get supplementary information from the
directory (ID, Name, Email). This feature can also be used to limit access
to the service.

Example use case: Allow your users to log in with e-mail address instead of
the identification string in your DNs (typically username).

To make re-use of HTTP form handling code from the Local connector possible:
- Implemented IdentityProvider interface
- Moved the re-used functions to login_local.go

Fixes #119
2016-02-11 18:30:16 +01:00
Eric Chiang
3415a79e22 Documentation: add docs for github and bitbucket connectors 2015-12-08 10:21:52 -08:00
Bobby Rullo
5f42f5a4b4 Documentation: document connectors format. 2015-11-02 19:45:40 -08:00