Skip to content

Commit a1c0111

Browse files
committed
📝 Mention that LDAP_BIND_PASSWORD is now irrelevant
1 parent 03bf70c commit a1c0111

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,10 +163,11 @@ If `LDAP_BIND_DN` is not specified or blank, an anonymous bind is attempted.
163163

164164
It is recommended to limit the service account and only allow it to read and search the LDAP structure (no write or other LDAP access). The credentials should also not be used for any other account on the network. This minimizes the damage in cases of a successful LDAP injection or if you ever accidentially give someone access to the configuration file (e.g. by committing it into version control or having misconfigured permissions). Use a suitably strong, ideally randomly generated password.
165165

166-
You can also use the credentials supplied by the user to bind to LDAP (eliminating the need for a dedicated LDAP service account). To do so, do the following two things:
166+
You can also use the credentials supplied by the user to bind to LDAP (eliminating the need for a dedicated LDAP service account). To do so, do the following three things:
167167

168168
1. Set `LDAP_BIND_WITH_USER_PROVIDED_CREDENTIALS = True`
169169
2. Insert the placeholder `<username>` inside `LDAP_BIND_DN`, e.g. like this: `"CN=<username>,OU=DevTeam,DC=example,DC=com"`.
170+
3. Remove `LDAP_BIND_PASSWORD` (it will not be used)
170171

171172
Taiga will then determine the LDAP bind user by replacing `<username>` with the user-specified username, and bind using the user-specified password.
172173

0 commit comments

Comments
 (0)