LDAP Single Sign-On (SSO)
To configure SSO for LDAP in Codefresh, you need to first create a user on your LDAP server who has permissions to search other users. Usually,
this user is an LDAP admin.
Make sure also that you know the scope of the search, that is, where users to search for are located in the LDAP hierarchy.
- In the Codefresh UI, go to Single Sign-On.
- Select + Add Single Sign-On, LDAP, and then Next.
- Enter the following:
- Client Name: For auto-generation, leave empty. Codefresh generates the client name once you save the settings.
- Display Name: Any meaningful name for this integration.
- Password: The password of the user defined in Distinguished name that will be used to search other users.
- LDAP Server URL: Codefresh supports both
ldap
andldaps
protocols. Forldaps
, you also need a certificate. - Distinguished name: The username to be used to search other users in LDAP notation (combination of
cn
,ou
,dc
). - Search base: The search-user scope in LDAP notation.
- Search filter: The attribute by which the user will be searched on the LDAP server. By default, set to
uid
. For the Azure LDAP server, set this field tosAMAccountName
. - Certificate: The security certificate of the LDAP server for
ldaps
only. Paste the value directly on the field. Do not convert to base64 or any other encoding by hand. Leave the field empty if you useldap
.
- Select + Add. LDAP users can log in to Codefresh.
Each user who logs in to Codefresh must:
- Have a defined email address on the LDAP server
- Use the same email address as defined on the LDAP server
- Use as login information, the LDAP email, password, and
cn
value of username