Go to file
2020-06-17 13:27:13 +02:00
radicale_auth_ldap server list logging added 2020-06-17 13:27:13 +02:00
test Fix #1: Test for LDAPInvalidCredentialsResult 2017-12-03 20:33:05 +01:00
.gitignore Add gitignore 2017-08-04 18:54:02 +02:00
README.md multiple ldap servers can be defined in ldap_url 2020-06-15 16:13:37 +02:00
setup.py Removed the upper version bound of LDAP version 2020-03-10 09:05:57 +01:00

What is this?

This is an authentication plugin for Radicale 2. It adds an LDAP authentication backend which can be used for authenticating users against an LDAP server.

How to configure

You will need to set a few options inside your radicale config file. Example:

[auth]
type = radicale_auth_ldap

# LDAP server URL, with protocol and port (multiple servers can be separated by spaces)
ldap_url = ldap://ldap:389

# LDAP base path
ldap_base = ou=Users,dc=TESTDOMAIN

# LDAP login attribute
ldap_attribute = uid

# LDAP filter string
# placed as X in a query of the form (&(...)X)
# example: (objectCategory=Person)(objectClass=User)(memberOf=cn=calenderusers,ou=users,dc=example,dc=org)
ldap_filter = (objectClass=person)

# LDAP dn for initial login, used if LDAP server does not allow anonymous searches
# Leave empty if searches are anonymous
ldap_binddn = cn=admin,dc=TESTDOMAIN

# LDAP password for initial login, used with ldap_binddn
ldap_password = verysecurepassword

# LDAP scope of the search
ldap_scope = LEVEL

# LDAP extended option
# If the server is samba, ldap_support_extended is should be no
ldap_support_extended = yes