mirror of
				https://github.com/nitnelave/lldap.git
				synced 2023-04-12 14:25:13 +00:00 
			
		
		
		
	example_configs,nexus: Add example for Sonatype Nexus Repository Manager 3
This commit is contained in:
		
							parent
							
								
									733f990858
								
							
						
					
					
						commit
						67c56b060f
					
				@ -252,6 +252,7 @@ folder for help with:
 | 
				
			|||||||
- [KeyCloak](example_configs/keycloak.md)
 | 
					- [KeyCloak](example_configs/keycloak.md)
 | 
				
			||||||
- [Matrix](example_configs/matrix_synapse.yml)
 | 
					- [Matrix](example_configs/matrix_synapse.yml)
 | 
				
			||||||
- [Nextcloud](example_configs/nextcloud.md)
 | 
					- [Nextcloud](example_configs/nextcloud.md)
 | 
				
			||||||
 | 
					- [Nexus](example_configs/nexus.md)
 | 
				
			||||||
- [Organizr](example_configs/Organizr.md)
 | 
					- [Organizr](example_configs/Organizr.md)
 | 
				
			||||||
- [Portainer](example_configs/portainer.md)
 | 
					- [Portainer](example_configs/portainer.md)
 | 
				
			||||||
- [Rancher](example_configs/rancher.md)
 | 
					- [Rancher](example_configs/rancher.md)
 | 
				
			||||||
 | 
				
			|||||||
							
								
								
									
										56
									
								
								example_configs/nexus.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								example_configs/nexus.md
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,56 @@
 | 
				
			|||||||
 | 
					# Configuration for Sonatype Nexus Repository Manager 3
 | 
				
			||||||
 | 
					In Nexus log in as an administrator, go to `Server Administration and configuration (gear icon)` 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Select `LDAP` under the `Security` section
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Click `Create connection`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Host: A name for the connection e.g. lldap
 | 
				
			||||||
 | 
					* Type: ldap
 | 
				
			||||||
 | 
					* Host: Your lldap server's ip/hostname
 | 
				
			||||||
 | 
					* Port: Your lldap server's port (3890 by default)
 | 
				
			||||||
 | 
					* Base DN: `dc=example,dc=com`
 | 
				
			||||||
 | 
					* Authentication Method: Simple Authentication
 | 
				
			||||||
 | 
					* Username or DN: `uid=admin,ou=people,dc=example,dc=com` or preferably create a read only user in lldap with the lldap_strict_readonly group. 
 | 
				
			||||||
 | 
					* Password: The password for the user specified above
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Click `Verify connection` if successful click `Next`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Select a template: Generic ldap server
 | 
				
			||||||
 | 
					* User Relative DN: `ou=people`
 | 
				
			||||||
 | 
					* User subtree: Leave unchecked
 | 
				
			||||||
 | 
					* Object class: person
 | 
				
			||||||
 | 
					* User Filter:  Leave empty to allow all users to log in or `(memberOf=uid=nexus_users,ou=groups,dc=example,dc=com)` for a specific group
 | 
				
			||||||
 | 
					* Username Attribute: `uid`
 | 
				
			||||||
 | 
					* Real Name Attribute: `cn`
 | 
				
			||||||
 | 
					* Email Attribute: `mail`
 | 
				
			||||||
 | 
					* Password Attribute: Leave blank 
 | 
				
			||||||
 | 
					* Check `Enable User Synchronization`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Test user login credentials with `Verify login` 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Set up group mapping as roles
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Check `Map LDAP groups as roles`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Group Type: `Static Groups`
 | 
				
			||||||
 | 
					* Group relative DN: `ou=groups`
 | 
				
			||||||
 | 
					* Group subtree: Leave unchecked
 | 
				
			||||||
 | 
					* Group object class: `groupOfUniqueNames`
 | 
				
			||||||
 | 
					* Group ID attribute: `cn`
 | 
				
			||||||
 | 
					* Group member attribute: `member`
 | 
				
			||||||
 | 
					* Group member format: `uid=${username},ou=people,dc=example,dc=com`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Check user mapping with `Verify user mapping`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					## Map specific roles to groups
 | 
				
			||||||
 | 
					In Nexus log in as an administrator, go to `Server Administration and configuration (gear icon)`
 | 
				
			||||||
 | 
					Select `Roles` under the `Security` section
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Click `Create Role`
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Role ID: e.g. nexus_admin (name in nexus)
 | 
				
			||||||
 | 
					* Role Name: e.g. nexus_admin (group in lldap)
 | 
				
			||||||
 | 
					* Add privileges/roles as needed e.g. under Roles add nx-admin to the "contained" list
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Click `Save`
 | 
				
			||||||
		Loading…
	
		Reference in New Issue
	
	Block a user