Authenticator

Local

Example Usage

authenticatorType: local
authenticatorOpts:
  users:
    foouser: $2a$10$zsvMZ7nEYo4jJJxgb5FpH.izPH37LsuLBXPbuKH4MPF4sihFSG6bW
    baruser: $2a$10$srGqC9g46xaRXbueLk5kDuSuDM6h2EpC.MTRiVaij6s/jcsKQ6LHu

Options

  • users - Map of users and bcrypt hashed passwords (you can hash passwords via “signmykey hash” command) (required)

LDAP

Example Usage

authenticatorType: ldap
authenticatorOpts:
  ldapAddr: localhost
  ldapPort: 3893
  ldapTLS: False
  ldapTLSVerify: False
  ldapBindUser: "cn=serviceuser,ou=svcaccts,dc=glauth,dc=com"
  ldapBindPassword: "mysecret" 
  ldapBase: "dc=glauth,dc=com"
  ldapSearch: "(cn=%s)"

Options

  • ldapAddr - Address of LDAP server (required)
  • ldapPort - Port of LDAP server
  • ldapTLS - Enable/disable SSL/TLS connection
  • ldapTLSVerify - Enable/disable verification of SSL/TLS certificate
  • ldapBindUser - LDAP bind user
  • ldapBindPassword - LDAP bind password
  • ldapBase - LDAP search base
  • ldapSearch - LDAP search string to find user

OIDC ROPC

Example Usage

authenticatorType: oidcropc
authenticatorOpts:
  oidcTokenEndpoint: "https://idp.my.corp/auth/realms/mycorp/protocol/openid-connect/token"
  oidcClientID: "signmykey"
  oidcClientSecret: "93fac2d9-bd8f-453a-9ece-e2c430f0ee04"

Options

  • oidcTokenEndpoint - OpenID Connect token Endpoint (required)
  • oidcClientID - OpenID Connect Client ID (required)
  • oidcClientSecret - OpenID Connect Client Secret (required)