You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: assets/js/search-data.json
+3-3
Original file line number
Diff line number
Diff line change
@@ -4145,7 +4145,7 @@
4145
4145
},"592": {
4146
4146
"doc": "Single Sign On (SSO)",
4147
4147
"title": "LDAP",
4148
-
"content": "Fluffy is incharge of providing LDAP authentication for lakeFS Enterprise. The authentication works by querying the LDAP server for user information and authenticating the user based on the provided credentials. Important: An administrative bind user must be configured. It should have search permissions for the LDAP server that will be used to query the LDAP server for user information. For Helm: set the following attributes in the Helm chart values, for lakeFS lakefsConfig.* and fluffyConfig.* for fluffy. No Helm: If not using Helm use the YAML below to directly update the configuration file for each service. lakeFS Configuration: . | Replace auth.remote_authenticator.enabled with true | Replace auth.remote_authenticator.endpoint with the fluffy authentication server URL combined with the api/v1/ldap/login suffix (e.g http://lakefs.company.com/api/v1/ldap/login) | . fluffy Configuration: . See Fluffy configuration reference. | Repalce auth.ldap.remote_authenticator.server_endpoint with your LDAP server endpoint (e.g ldaps://ldap.ldap-address.com:636) | Replace auth.ldap.remote_authenticator.bind_dn with the LDAP bind user/permissions to query your LDAP server. | Replace auth.ldap.remote_authenticator.user_base_dn with the user base to search users in. | . lakeFS Server Configuration file: . $lakefs run -c ./lakefs.yaml . # Important: make sure to include the rest of your lakeFS Configuration here! auth: remote_authenticator: enabled: true endpoint: http://<Fluffy URL>:<Fluffy http port>/api/v1/ldap/login default_user_group: \"Developers\" # Value needs to correspond with an existing group in lakeFS ui_config: logout_url: /logout login_cookie_names: - internal_auth_session . Fluffy Configuration file: . $fluffy run -c ./fluffy.yaml . logging: format: \"json\" level: \"INFO\" audit_log_level: \"INFO\" output: \"=\" installation: fixed_id: fluffy-authenticator auth: post_login_redirect_url: / ldap: server_endpoint: 'ldaps://ldap.company.com:636' bind_dn: uid=<bind-user-name>,ou=<some-ou>,o=<org-id>,dc=<company>,dc=com bind_password: '<ldap pwd>' username_attribute: uid user_base_dn: ou=<some-ou>,o=<org-id>,dc=<company>,dc=com user_filter: (objectClass=inetOrgPerson) connection_timeout_seconds: 15 request_timeout_seconds: 7 . ",
4148
+
"content": "Fluffy is incharge of providing LDAP authentication for lakeFS Enterprise. The authentication works by querying the LDAP server for user information and authenticating the user based on the provided credentials. Important: An administrative bind user must be configured. It should have search permissions for the LDAP server that will be used to query the LDAP server for user information. For Helm: set the following attributes in the Helm chart values, for lakeFS lakefsConfig.* and fluffyConfig.* for fluffy. No Helm: If not using Helm use the YAML below to directly update the configuration file for each service. lakeFS Configuration: . | Replace auth.remote_authenticator.enabled with true | Replace auth.remote_authenticator.endpoint with the fluffy authentication server URL combined with the api/v1/ldap/login suffix (e.g http://lakefs.company.com/api/v1/ldap/login) | . fluffy Configuration: . See Fluffy configuration reference. | Replace auth.ldap.remote_authenticator.server_endpoint with your LDAP server endpoint (e.g ldaps://ldap.ldap-address.com:636) | Replace auth.ldap.remote_authenticator.bind_dn with the LDAP bind user/permissions to query your LDAP server. | Replace auth.ldap.remote_authenticator.user_base_dn with the user base to search users in. | . lakeFS Server Configuration file: . $lakefs run -c ./lakefs.yaml . # Important: make sure to include the rest of your lakeFS Configuration here! auth: remote_authenticator: enabled: true endpoint: http://<Fluffy URL>:<Fluffy http port>/api/v1/ldap/login default_user_group: \"Developers\" # Value needs to correspond with an existing group in lakeFS ui_config: logout_url: /logout login_cookie_names: - internal_auth_session . Fluffy Configuration file: . $fluffy run -c ./fluffy.yaml . logging: format: \"json\" level: \"INFO\" audit_log_level: \"INFO\" output: \"=\" installation: fixed_id: fluffy-authenticator auth: post_login_redirect_url: / ldap: server_endpoint: 'ldaps://ldap.company.com:636' bind_dn: uid=<bind-user-name>,ou=<some-ou>,o=<org-id>,dc=<company>,dc=com bind_password: '<ldap pwd>' username_attribute: uid user_base_dn: ou=<some-ou>,o=<org-id>,dc=<company>,dc=com user_filter: (objectClass=inetOrgPerson) connection_timeout_seconds: 15 request_timeout_seconds: 7 . ",
4149
4149
"url": "/security/sso.html#ldap",
4150
4150
4151
4151
"relUrl": "/security/sso.html#ldap"
@@ -4166,7 +4166,7 @@
4166
4166
},"595": {
4167
4167
"doc": "Standalone Garbage Collection",
4168
4168
"title": "Table of contents",
4169
-
"content": ". | What is Standalone GC? | Limitations | Installation . | Step 1: Obtain Dockerhub token | Step 2: Login to Dockerhub with this token | Step 3: Download the docker image | . | Setup . | Permissions | Credentials | Using S3-compatible clients | Configuration | . | How to Run Standalone GC? . | Command line reference | Get the List of Objects Marked for Deletion | Delete marked objects | . | Lab tests | . ",
4169
+
"content": ". | What is Standalone GC? | Limitations | Installation . | Step 1: Obtain DockerHub token | Step 2: Login to DockerHub with this token | Step 3: Download the docker image | . | Setup . | Permissions | Credentials | Using S3-compatible clients | Configuration | . | How to Run Standalone GC? . | Command line reference | Get the List of Objects Marked for Deletion | Delete marked objects | . | Lab tests | . ",
"content": "Step 1: Obtain Dockerhub token . lakeFS Enterprise customers . Contact your account manager to verify that Standalone GC is included in your license. Then use your dockerhub token for the externallakefs user. New to lakeFS Enterprise . Please contact us to get trial access to Standalone GC. Step 2: Login to Dockerhub with this token . docker login -u <token> . Step 3: Download the docker image . Download the image from the lakefs-sgc repository: . docker pull treeverse/lakefs-sgc:<tag> . ",
4190
+
"content": "Step 1: Obtain DockerHub token . lakeFS Enterprise customers . Contact your account manager to verify that Standalone GC is included in your license. Then use your dockerhub token for the externallakefs user. New to lakeFS Enterprise . Please contact us to get trial access to Standalone GC. Step 2: Login to DockerHub with this token . docker login -u <token> . Step 3: Download the docker image . Download the treeverse/lakefs-sgc image from Docker Hub: . docker pull treeverse/lakefs-sgc:<tag> . ",
<li><ahref="#step-2-login-to-dockerhub-with-this-token" id="markdown-toc-step-2-login-to-dockerhub-with-this-token">Step 2: Login to Dockerhub with this token</a></li>
<li><ahref="#step-2-login-to-dockerhub-with-this-token" id="markdown-toc-step-2-login-to-dockerhub-with-this-token">Step 2: Login to DockerHub with this token</a></li>
593
593
<li><ahref="#step-3-download-the-docker-image" id="markdown-toc-step-3-download-the-docker-image">Step 3: Download the docker image</a></li>
<ahref="#step-2-login-to-dockerhub-with-this-token" class="anchor-heading"><svgviewBox="0 0 16 16" aria-hidden="true"><usexlink:href="#svg-link"></use></svg></a> Step 2: Login to Dockerhub with this token
679
+
<ahref="#step-2-login-to-dockerhub-with-this-token" class="anchor-heading"><svgviewBox="0 0 16 16" aria-hidden="true"><usexlink:href="#svg-link"></use></svg></a> Step 2: Login to DockerHub with this token
<li>Repalce<codeclass="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.server_endpoint</code> with your LDAP server endpoint (e.g <codeclass="language-plaintext highlighter-rouge">ldaps://ldap.ldap-address.com:636</code>)</li>
957
+
<li>Replace<codeclass="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.server_endpoint</code> with your LDAP server endpoint (e.g <codeclass="language-plaintext highlighter-rouge">ldaps://ldap.ldap-address.com:636</code>)</li>
958
958
<li>Replace <codeclass="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.bind_dn</code> with the LDAP bind user/permissions to query your LDAP server.</li>
959
959
<li>Replace <codeclass="language-plaintext highlighter-rouge">auth.ldap.remote_authenticator.user_base_dn</code> with the user base to search users in.</li>
<p>Auth issues (e.g. user not found, invalid credentials) can be debugged with the <ahref="https://www.unix.com/man-page/osx/1/ldapwhoami">ldapwhoami</a> CLI tool.</p>
1029
+
<p>Auth issues (e.g. user not found, invalid credentials) can be debugged with the <codeclass="language-plaintext highlighter-rouge">ldapwhoami</code> CLI tool.</p>
1030
1030
1031
1031
<p>The Examples are based on the fluffy config above:</p>
0 commit comments