8000 AAP-40199 improvements to LDAP configuration content by dcdacosta · Pull Request #3370 · ansible/aap-docs · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

AAP-40199 improvements to LDAP configuration content #3370

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
May 1, 2025

Conversation

dcdacosta
Copy link
Contributor

This PR implements requested improvements to the LDAP configuration content to add more field explanations and examples.

@dcdacosta dcdacosta added Ready for review This PR needs review and approval by members of the docs team 2.5 Content applies to AAP 2.5 Needs backport to 2.5 Changes still need to be applied to the AAP 2.5 branch labels Apr 30, 2025
If this setting has a value it will be used instead of the *LDAP User Search* setting.
====
+
. *LDAP Start TLS* is disabled by default. To enable TLS when the LDAP connection is not using SSL, set the switch to *On*. StartTLS allows your LDAP connection to be upgraded from an unencrypted connection to a secure connection using Transport Layer Security (TLS). To enable StartTLS when the LDAP connection is not using SSL, set the switch to *On*.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the last sentence in this line repeats the second sentence in this line (although one is for TLS and one is for StartTLS). Let me know if I'm wrong though.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch, this is fixed now.

* `PosixUIDGroupType`
. Select a group type from the *LDAP Group Type* list.
+
The group type defines the class name of the group, which manages the groups associated with users in your LDAP directory and is returned by the search specified in Step 14 of this procedure. The group type, along with group parameters and the group search, is used to find and assign groups to users during log in, and can also be evaluated during the mapping process. The following table lists the available group types, along with their descriptions and the necessary parameters for each. By default, LDAP groups will be mapped to Django groups by taking the first value of the cn attribute. You can specify a different attribute with `name_attr`. For example, `name_attr='cn'`.
Copy link
Contributor
@hherbly hherbly May 1, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Based on the rich diff view, I don't see a step 14 in this procedure--they appear to only go up to 12. I could be wrong though so I'd double check.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Those steps are there it's just some of them are contained in a snippet file because they're common steps across all authentication types.

8000
| `NestedGroupOfUniqueNamesType` | Handles the `groupOfUniqueNames` object class. Equivalent to `NestedMemberDNGroupType('uniqueMember')`. | `name_attr='cn'`
| `NestedActiveDirectoryGroupType` | Handles the Active Directory groups. Equivalent to `NestedMemberDNGroupType('member')`. | `name_attr='cn'`
| `NestedOrganizationalRoleGroupType` | Handles the `organizationalRole` object class. Equivalent to `NestedMemberDNGroupType('roleOccupant')`. | `name_attr='cn'`
|===
+
[NOTE]
====
The group types that are supported by {PlatformNameShort} use the underlying link:https://django-auth-ldap.readthedocs.io/en/latest/reference.html#django_auth_ldap.config.LDAPGroupType[django-auth-ldap library]. To specify the parameters for the selected group type, see Step 13 of this procedure.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see a step 13.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It should be Step 14 which has been fixed. Some steps are contained within snippet files.

Copy link
Contributor
@hherbly hherbly left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@hherbly hherbly merged commit c147188 into ansible:main May 1, 2025
dcdacosta added a commit to dcdacosta/aap-docs that referenced this pull request May 1, 2025
* AAP-40199 improvements to LDAP configuration content

* AAP-40199 - minor grammar and formatting fixes

* AAP-40199 - include peer review suggestions
hherbly pushed a commit that referenced this pull request May 1, 2025
* AAP-40199 improvements to LDAP configuration content

* AAP-40199 - minor grammar and formatting fixes

* AAP-40199 - include peer review suggestions
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
2.5 Content applies to AAP 2.5 Needs backport to 2.5 Changes still need to be applied to the AAP 2.5 branch Ready for review This PR needs review and approval by members of the docs team
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants
0