Skip to content

Commit 95e6a36

Browse files
author
docs-action
committed
1 parent 02a65dd commit 95e6a36

File tree

3 files changed

+12
-10
lines changed

3 files changed

+12
-10
lines changed

assets/js/search-data.json

+3-3
Original file line numberDiff line numberDiff line change
@@ -4145,7 +4145,7 @@
41454145
},"592": {
41464146
"doc": "Single Sign On (SSO)",
41474147
"title": "LDAP",
4148-
"content": "Fluffy is incharge of providing LDAP authentication for lakeFS Enterprise. The authentication works by querying the LDAP server for user information and authenticating the user based on the provided credentials. Important: An administrative bind user must be configured. It should have search permissions for the LDAP server that will be used to query the LDAP server for user information. For Helm: set the following attributes in the Helm chart values, for lakeFS lakefsConfig.* and fluffyConfig.* for fluffy. No Helm: If not using Helm use the YAML below to directly update the configuration file for each service. lakeFS Configuration: . | Replace auth.remote_authenticator.enabled with true | Replace auth.remote_authenticator.endpoint with the fluffy authentication server URL combined with the api/v1/ldap/login suffix (e.g http://lakefs.company.com/api/v1/ldap/login) | . fluffy Configuration: . See Fluffy configuration reference. | Repalce auth.ldap.remote_authenticator.server_endpoint with your LDAP server endpoint (e.g ldaps://ldap.ldap-address.com:636) | Replace auth.ldap.remote_authenticator.bind_dn with the LDAP bind user/permissions to query your LDAP server. | Replace auth.ldap.remote_authenticator.user_base_dn with the user base to search users in. | . lakeFS Server Configuration file: . $lakefs run -c ./lakefs.yaml . # Important: make sure to include the rest of your lakeFS Configuration here! auth: remote_authenticator: enabled: true endpoint: http://<Fluffy URL>:<Fluffy http port>/api/v1/ldap/login default_user_group: \"Developers\" # Value needs to correspond with an existing group in lakeFS ui_config: logout_url: /logout login_cookie_names: - internal_auth_session . Fluffy Configuration file: . $fluffy run -c ./fluffy.yaml . logging: format: \"json\" level: \"INFO\" audit_log_level: \"INFO\" output: \"=\" installation: fixed_id: fluffy-authenticator auth: post_login_redirect_url: / ldap: server_endpoint: 'ldaps://ldap.company.com:636' bind_dn: uid=<bind-user-name>,ou=<some-ou>,o=<org-id>,dc=<company>,dc=com bind_password: '<ldap pwd>' username_attribute: uid user_base_dn: ou=<some-ou>,o=<org-id>,dc=<company>,dc=com user_filter: (objectClass=inetOrgPerson) connection_timeout_seconds: 15 request_timeout_seconds: 7 . ",
4148+
"content": "Fluffy is incharge of providing LDAP authentication for lakeFS Enterprise. The authentication works by querying the LDAP server for user information and authenticating the user based on the provided credentials. Important: An administrative bind user must be configured. It should have search permissions for the LDAP server that will be used to query the LDAP server for user information. For Helm: set the following attributes in the Helm chart values, for lakeFS lakefsConfig.* and fluffyConfig.* for fluffy. No Helm: If not using Helm use the YAML below to directly update the configuration file for each service. lakeFS Configuration: . | Replace auth.remote_authenticator.enabled with true | Replace auth.remote_authenticator.endpoint with the fluffy authentication server URL combined with the api/v1/ldap/login suffix (e.g http://lakefs.company.com/api/v1/ldap/login) | . fluffy Configuration: . See Fluffy configuration reference. | Replace auth.ldap.remote_authenticator.server_endpoint with your LDAP server endpoint (e.g ldaps://ldap.ldap-address.com:636) | Replace auth.ldap.remote_authenticator.bind_dn with the LDAP bind user/permissions to query your LDAP server. | Replace auth.ldap.remote_authenticator.user_base_dn with the user base to search users in. | . lakeFS Server Configuration file: . $lakefs run -c ./lakefs.yaml . # Important: make sure to include the rest of your lakeFS Configuration here! auth: remote_authenticator: enabled: true endpoint: http://<Fluffy URL>:<Fluffy http port>/api/v1/ldap/login default_user_group: \"Developers\" # Value needs to correspond with an existing group in lakeFS ui_config: logout_url: /logout login_cookie_names: - internal_auth_session . Fluffy Configuration file: . $fluffy run -c ./fluffy.yaml . logging: format: \"json\" level: \"INFO\" audit_log_level: \"INFO\" output: \"=\" installation: fixed_id: fluffy-authenticator auth: post_login_redirect_url: / ldap: server_endpoint: 'ldaps://ldap.company.com:636' bind_dn: uid=<bind-user-name>,ou=<some-ou>,o=<org-id>,dc=<company>,dc=com bind_password: '<ldap pwd>' username_attribute: uid user_base_dn: ou=<some-ou>,o=<org-id>,dc=<company>,dc=com user_filter: (objectClass=inetOrgPerson) connection_timeout_seconds: 15 request_timeout_seconds: 7 . ",
41494149
"url": "/security/sso.html#ldap",
41504150

41514151
"relUrl": "/security/sso.html#ldap"
@@ -4166,7 +4166,7 @@
41664166
},"595": {
41674167
"doc": "Standalone Garbage Collection",
41684168
"title": "Table of contents",
4169-
"content": ". | What is Standalone GC? | Limitations | Installation . | Step 1: Obtain Dockerhub token | Step 2: Login to Dockerhub with this token | Step 3: Download the docker image | . | Setup . | Permissions | Credentials | Using S3-compatible clients | Configuration | . | How to Run Standalone GC? . | Command line reference | Get the List of Objects Marked for Deletion | Delete marked objects | . | Lab tests | . ",
4169+
"content": ". | What is Standalone GC? | Limitations | Installation . | Step 1: Obtain DockerHub token | Step 2: Login to DockerHub with this token | Step 3: Download the docker image | . | Setup . | Permissions | Credentials | Using S3-compatible clients | Configuration | . | How to Run Standalone GC? . | Command line reference | Get the List of Objects Marked for Deletion | Delete marked objects | . | Lab tests | . ",
41704170
"url": "/howto/garbage-collection/standalone-gc.html#table-of-contents",
41714171

41724172
"relUrl": "/howto/garbage-collection/standalone-gc.html#table-of-contents"
@@ -4187,7 +4187,7 @@
41874187
},"598": {
41884188
"doc": "Standalone Garbage Collection",
41894189
"title": "Installation",
4190-
"content": "Step 1: Obtain Dockerhub token . lakeFS Enterprise customers . Contact your account manager to verify that Standalone GC is included in your license. Then use your dockerhub token for the externallakefs user. New to lakeFS Enterprise . Please contact us to get trial access to Standalone GC. Step 2: Login to Dockerhub with this token . docker login -u <token> . Step 3: Download the docker image . Download the image from the lakefs-sgc repository: . docker pull treeverse/lakefs-sgc:<tag> . ",
4190+
"content": "Step 1: Obtain DockerHub token . lakeFS Enterprise customers . Contact your account manager to verify that Standalone GC is included in your license. Then use your dockerhub token for the externallakefs user. New to lakeFS Enterprise . Please contact us to get trial access to Standalone GC. Step 2: Login to DockerHub with this token . docker login -u <token> . Step 3: Download the docker image . Download the treeverse/lakefs-sgc image from Docker Hub: . docker pull treeverse/lakefs-sgc:<tag> . ",
41914191
"url": "/howto/garbage-collection/standalone-gc.html#installation",
41924192

41934193
"relUrl": "/howto/garbage-collection/standalone-gc.html#installation"

howto/garbage-collection/standalone-gc.html

+7-5
Original file line numberDiff line numberDiff line change
@@ -588,8 +588,8 @@ <h2 class="no_toc text-delta" id="table-of-contents">
588588
<li><a href="#what-is-standalone-gc" id="markdown-toc-what-is-standalone-gc">What is Standalone GC?</a></li>
589589
<li><a href="#limitations" id="markdown-toc-limitations">Limitations</a></li>
590590
<li><a href="#installation" id="markdown-toc-installation">Installation</a> <ol>
591-
<li><a href="#step-1-obtain-dockerhub-token" id="markdown-toc-step-1-obtain-dockerhub-token">Step 1: Obtain Dockerhub token</a></li>
592-
<li><a href="#step-2-login-to-dockerhub-with-this-token" id="markdown-toc-step-2-login-to-dockerhub-with-this-token">Step 2: Login to Dockerhub with this token</a></li>
591+
<li><a href="#step-1-obtain-dockerhub-token" id="markdown-toc-step-1-obtain-dockerhub-token">Step 1: Obtain DockerHub token</a></li>
592+
<li><a href="#step-2-login-to-dockerhub-with-this-token" id="markdown-toc-step-2-login-to-dockerhub-with-this-token">Step 2: Login to DockerHub with this token</a></li>
593593
<li><a href="#step-3-download-the-docker-image" id="markdown-toc-step-3-download-the-docker-image">Step 3: Download the docker image</a></li>
594594
</ol>
595595
</li>
@@ -647,7 +647,7 @@ <h2 id="installation">
647647
<h3 id="step-1-obtain-dockerhub-token">
648648

649649

650-
<a href="#step-1-obtain-dockerhub-token" class="anchor-heading"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 1: Obtain Dockerhub token
650+
<a href="#step-1-obtain-dockerhub-token" class="anchor-heading"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 1: Obtain DockerHub token
651651

652652

653653
</h3>
@@ -676,7 +676,7 @@ <h4 id="new-to-lakefs-enterprise">
676676
<h3 id="step-2-login-to-dockerhub-with-this-token">
677677

678678

679-
<a href="#step-2-login-to-dockerhub-with-this-token" class="anchor-heading"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 2: Login to Dockerhub with this token
679+
<a href="#step-2-login-to-dockerhub-with-this-token" class="anchor-heading"><svg viewBox="0 0 16 16" aria-hidden="true"><use xlink:href="#svg-link"></use></svg></a> Step 2: Login to DockerHub with this token
680680

681681

682682
</h3>
@@ -693,7 +693,8 @@ <h3 id="step-3-download-the-docker-image">
693693
</h3>
694694

695695

696-
<p>Download the image from the <a href="https://hub.docker.com/repository/docker/treeverse/lakefs-sgc/general">lakefs-sgc</a> repository:</p>
696+
<p>Download the <code class="language-plaintext highlighter-rouge">treeverse/lakefs-sgc</code> image from Docker Hub:</p>
697+
697698
<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>docker pull treeverse/lakefs-sgc:&lt;tag&gt;
698699
</code></pre></div></div>
699700
<h2 id="setup">
@@ -724,6 +725,7 @@ <h4 id="storage-permissions">
724725

725726

726727
<p>The minimum required permissions for AWS or S3-compatible storage are:</p>
728+
727729
<div class="language-json highlighter-rouge"><div class="highlight"><pre class="highlight"><code><span class="p">{</span><span class="w">
728730
</span><span class="nl">"Version"</span><span class="p">:</span><span class="w"> </span><span class="s2">"2012-10-17"</span><span class="p">,</span><span class="w">
729731
</span><span class="nl">"Statement"</span><span class="p">:</span><span class="w"> </span><span class="p">[</span><span class="w">

security/sso.html

+2-2
Original file line numberDiff line numberDiff line change
@@ -954,7 +954,7 @@ <h2 id="ldap">
954954
<p>See <a href="/enterprise/configuration.html#fluffy-server-configuration">Fluffy configuration</a> reference.</p>
955955

956956
<ol>
957-
<li>Repalce <code class="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.server_endpoint</code> with your LDAP server endpoint (e.g <code class="language-plaintext highlighter-rouge">ldaps://ldap.ldap-address.com:636</code>)</li>
957+
<li>Replace <code class="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.server_endpoint</code> with your LDAP server endpoint (e.g <code class="language-plaintext highlighter-rouge">ldaps://ldap.ldap-address.com:636</code>)</li>
958958
<li>Replace <code class="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.bind_dn</code> with the LDAP bind user/permissions to query your LDAP server.</li>
959959
<li>Replace <code class="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.user_base_dn</code> with the user base to search users in.</li>
960960
</ol>
@@ -1026,7 +1026,7 @@ <h3 id="authentication-issues">
10261026
</h3>
10271027

10281028

1029-
<p>Auth issues (e.g. user not found, invalid credentials) can be debugged with the <a href="https://www.unix.com/man-page/osx/1/ldapwhoami">ldapwhoami</a> CLI tool.</p>
1029+
<p>Auth issues (e.g. user not found, invalid credentials) can be debugged with the <code class="language-plaintext highlighter-rouge">ldapwhoami</code> CLI tool.</p>
10301030

10311031
<p>The Examples are based on the fluffy config above:</p>
10321032

0 commit comments

Comments
 (0)