Home

Awesome

<h1 align="center">lldap - Light LDAP implementation for authentication</h1> <p align="center"> <i style="font-size:24px">LDAP made easy.</i> </p> <p align="center"> <a href="https://github.com/lldap/lldap/actions/workflows/rust.yml?query=branch%3Amain"> <img src="https://github.com/lldap/lldap/actions/workflows/rust.yml/badge.svg" alt="Build"/> </a> <a href="https://discord.gg/h5PEdRMNyP"> <img alt="Discord" src="https://img.shields.io/discord/898492935446876200?label=discord&logo=discord" /> </a> <a href="https://twitter.com/nitnelave1?ref_src=twsrc%5Etfw"> <img src="https://img.shields.io/twitter/follow/nitnelave1?style=social" alt="Twitter Follow"/> </a> <a href="https://github.com/rust-secure-code/safety-dance/"> <img src="https://img.shields.io/badge/unsafe-forbidden-success.svg" alt="Unsafe forbidden"/> </a> <a href="https://app.codecov.io/gh/lldap/lldap"> <img alt="Codecov" src="https://img.shields.io/codecov/c/github/lldap/lldap" /> </a> <br/> <a href="https://www.buymeacoffee.com/nitnelave" target="_blank"> <img src="https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png" alt="Buy Me A Coffee" style="height: 41px !important;width: 174px !important;box-shadow: 0px 3px 2px 0px rgba(190, 190, 190, 0.5) !important;-webkit-box-shadow: 0px 3px 2px 0px rgba(190, 190, 190, 0.5) !important;" > </a> </p>

About

This project is a lightweight authentication server that provides an opinionated, simplified LDAP interface for authentication. It integrates with many backends, from KeyCloak to Authelia to Nextcloud and more!

<img src="https://raw.githubusercontent.com/lldap/lldap/master/screenshot.png" alt="Screenshot of the user list page" width="50%" align="right" />

It comes with a frontend that makes user management easy, and allows users to edit their own details or reset their password by email.

The goal is not to provide a full LDAP server; if you're interested in that, check out OpenLDAP. This server is a user management system that is:

It mostly targets self-hosting servers, with open-source components like Nextcloud, Airsonic and so on that only support LDAP as a source of external authentication.

For more features (OAuth/OpenID support, reverse proxy, ...) you can install other components (KeyCloak, Authelia, ...) using this server as the source of truth for users, via LDAP.

By default, the data is stored in SQLite, but you can swap the backend with MySQL/MariaDB or PostgreSQL.

Installation

With Docker

The image is available at lldap/lldap. You should persist the /data folder, which contains your configuration and the SQLite database (you can remove this step if you use a different DB and configure with environment variables only).

Configure the server by copying the lldap_config.docker_template.toml to /data/lldap_config.toml and updating the configuration values (especially the jwt_secret and ldap_user_pass, unless you override them with env variables). Environment variables should be prefixed with LLDAP_ to override the configuration.

If the lldap_config.toml doesn't exist when starting up, LLDAP will use default one. The default admin password is password, you can change the password later using the web interface.

Secrets can also be set through a file. The filename should be specified by the variables LLDAP_JWT_SECRET_FILE or LLDAP_KEY_SEED_FILE, and the file contents are loaded into the respective configuration parameters. Note that _FILE variables take precedence.

Example for docker compose:

version: "3"

volumes:
  lldap_data:
    driver: local

services:
  lldap:
    image: lldap/lldap:stable
    ports:
      # For LDAP, not recommended to expose, see Usage section.
      #- "3890:3890"
      # For LDAPS (LDAP Over SSL), enable port if LLDAP_LDAPS_OPTIONS__ENABLED set true, look env below
      #- "6360:6360"
      # For the web front-end
      - "17170:17170"
    volumes:
      - "lldap_data:/data"
      # Alternatively, you can mount a local folder
      # - "./lldap_data:/data"
    environment:
      - UID=####
      - GID=####
      - TZ=####/####
      - LLDAP_JWT_SECRET=REPLACE_WITH_RANDOM
      - LLDAP_KEY_SEED=REPLACE_WITH_RANDOM
      - LLDAP_LDAP_BASE_DN=dc=example,dc=com
      # If using LDAPS, set enabled true and configure cert and key path
      # - LLDAP_LDAPS_OPTIONS__ENABLED=true
      # - LLDAP_LDAPS_OPTIONS__CERT_FILE=/path/to/certfile.crt
      # - LLDAP_LDAPS_OPTIONS__KEY_FILE=/path/to/keyfile.key
      # You can also set a different database:
      # - LLDAP_DATABASE_URL=mysql://mysql-user:password@mysql-server/my-database
      # - LLDAP_DATABASE_URL=postgres://postgres-user:password@postgres-server/my-database
      # If using SMTP, set the following variables
      # - LLDAP_SMTP_OPTIONS__ENABLE_PASSWORD_RESET=true
      # - LLDAP_SMTP_OPTIONS__SERVER=smtp.example.com
      # - LLDAP_SMTP_OPTIONS__PORT=465 # Check your smtp providor's documentation for this setting
      # - LLDAP_SMTP_OPTIONS__SMTP_ENCRYPTION=TLS # How the connection is encrypted, either "NONE" (no encryption, port 25), "TLS" (sometimes called SSL, port 465) or "STARTTLS" (sometimes called TLS, port 587).
      # - LLDAP_SMTP_OPTIONS__USER=no-reply@example.com # The SMTP user, usually your email address
      # - LLDAP_SMTP_OPTIONS__PASSWORD=PasswordGoesHere # The SMTP password
      # - LLDAP_SMTP_OPTIONS__FROM=no-reply <no-reply@example.com> # The header field, optional: how the sender appears in the email. The first is a free-form name, followed by an email between <>.
      # - LLDAP_SMTP_OPTIONS__TO=admin <admin@example.com> # Same for reply-to, optional.

Then the service will listen on two ports, one for LDAP and one for the web front-end.

With Kubernetes

See https://github.com/Evantage-WS/lldap-kubernetes for a LLDAP deployment for Kubernetes

You can bootstrap your lldap instance (users, groups) using bootstrap.sh. It can be run by Argo CD for managing users in git-opt way, or as a one-shot job.

From a package repository

Do not open issues in this repository for problems with third-party pre-built packages. Report issues downstream.

Depending on the distribution you use, it might be possible to install lldap from a package repository, officially supported by the distribution or community contributed.

Each package offers a systemd service lldap.service to (auto-)start and stop lldap.<br> When using the distributed packages, the default login is admin/password. You can change that from the web UI after starting the service.

<details> <summary><b>Arch Linux</b></summary> <br> Arch Linux offers unofficial support through the <a href="https://wiki.archlinux.org/title/Arch_User_Repository">Arch User Repository (AUR)</a>.<br> The package descriptions can be used <a href="https://wiki.archlinux.org/title/Arch_User_Repository#Getting_started">to create and install packages</a>.<br><br> Support: <a href="https://github.com/lldap/lldap/discussions/1044">Discussions</a><br> Package repository: <a href="https://aur.archlinux.org/packages">Arch User Repository</a><br><br> <table> <tr> <td>Package name</td> <td>Maintainer</td> <td>Description</td> </tr> <tr> <td><a href="https://aur.archlinux.org/packages/lldap">lldap</a></td> <td><a href="https://github.com/Zepmann">@Zepmann</a></td> <td>Builds the latest stable version.</td> </tr> <tr> <td><a href="https://aur.archlinux.org/packages/lldap-bin">lldap-bin</a></td> <td><a href="https://github.com/Zepmann">@Zepmann</a></td> <td>Uses the latest pre-compiled binaries from the <a href="https://github.com/lldap/lldap/releases">releases in this repository</a>.<br> This package is recommended if you want to run LLDAP on a system with limited resources.</td> </tr> <tr> <td><a href="https://aur.archlinux.org/packages/lldap-git">lldap-git</a></td> <td></td> <td>Builds the latest main branch code.</td> </tr> </table> LLDAP configuration file: /etc/lldap.toml<br> </details> <details> <summary><b>Debian</b></summary> <br> Unofficial Debian support is offered through the <a href="https://build.opensuse.org/">openSUSE Build Service</a>.<br><br> Maintainer: <a href="https://github.com/Masgalor">@Masgalor</a><br> Support: <a href="https://codeberg.org/Masgalor/LLDAP-Packaging/issues">Codeberg</a>, <a href="https://github.com/lldap/lldap/discussions">Discussions</a><br> Package repository: <a href="https://software.opensuse.org//download.html?project=home%3AMasgalor%3ALLDAP&package=lldap">SUSE openBuildService</a><br> <table> <tr> <td>Available packages:</td> <td>lldap</td> <td>Light LDAP server for authentication.</td> </tr> <tr> <td></td> <td>lldap-extras</td> <td>Meta-Package for LLDAP and its tools and extensions.</td> </tr> <tr> <td></td> <td>lldap-migration-tool</td> <td>CLI migration tool to go from OpenLDAP to LLDAP.</td> </tr> <tr> <td></td> <td>lldap-set-password</td> <td>CLI tool to set a user password in LLDAP.</td> </tr> <tr> <td></td> <td>lldap-cli</td> <td>LLDAP-CLI is an unofficial command line interface for LLDAP.</td> </tr> </table> LLDPA configuration file: /etc/lldap/lldap_config.toml<br> </details> <details> <summary><b>CentOS</b></summary> <br> Unofficial CentOS support is offered through the <a href="https://build.opensuse.org/">openSUSE Build Service</a>.<br><br> Maintainer: <a href="https://github.com/Masgalor">@Masgalor</a><br> Support: <a href="https://codeberg.org/Masgalor/LLDAP-Packaging/issues">Codeberg</a>, <a href="https://github.com/lldap/lldap/discussions">Discussions</a><br> Package repository: <a href="https://software.opensuse.org//download.html?project=home%3AMasgalor%3ALLDAP&package=lldap">SUSE openBuildService</a><br> <table> <tr> <td>Available packages:</td> <td>lldap</td> <td>Light LDAP server for authentication.</td> </tr> <tr> <td></td> <td>lldap-extras</td> <td>Meta-Package for LLDAP and its tools and extensions.</td> </tr> <tr> <td></td> <td>lldap-migration-tool</td> <td>CLI migration tool to go from OpenLDAP to LLDAP.</td> </tr> <tr> <td></td> <td>lldap-set-password</td> <td>CLI tool to set a user password in LLDAP.</td> </tr> <tr> <td></td> <td>lldap-cli</td> <td>LLDAP-CLI is an unofficial command line interface for LLDAP.</td> </tr> </table> LLDPA configuration file: /etc/lldap/lldap_config.toml<br> </details> <details> <summary><b>Fedora</b></summary> <br> Unofficial Fedora support is offered through the <a href="https://build.opensuse.org/">openSUSE Build Service</a>.<br><br> Maintainer: <a href="https://github.com/Masgalor">@Masgalor</a><br> Support: <a href="https://codeberg.org/Masgalor/LLDAP-Packaging/issues">Codeberg</a>, <a href="https://github.com/lldap/lldap/discussions">Discussions</a><br> Package repository: <a href="https://software.opensuse.org//download.html?project=home%3AMasgalor%3ALLDAP&package=lldap">SUSE openBuildService</a><br> <table> <tr> <td>Available packages:</td> <td>lldap</td> <td>Light LDAP server for authentication.</td> </tr> <tr> <td></td> <td>lldap-extras</td> <td>Meta-Package for LLDAP and its tools and extensions.</td> </tr> <tr> <td></td> <td>lldap-migration-tool</td> <td>CLI migration tool to go from OpenLDAP to LLDAP.</td> </tr> <tr> <td></td> <td>lldap-set-password</td> <td>CLI tool to set a user password in LLDAP.</td> </tr> <tr> <td></td> <td>lldap-cli</td> <td>LLDAP-CLI is an unofficial command line interface for LLDAP.</td> </tr> </table> LLDPA configuration file: /etc/lldap/lldap_config.toml<br> </details> <details> <summary><b>OpenSUSE</b></summary> <br> Unofficial OpenSUSE support is offered through the <a href="https://build.opensuse.org/">openSUSE Build Service</a>.<br><br> Maintainer: <a href="https://github.com/Masgalor">@Masgalor</a><br> Support: <a href="https://codeberg.org/Masgalor/LLDAP-Packaging/issues">Codeberg</a>, <a href="https://github.com/lldap/lldap/discussions">Discussions</a><br> Package repository: <a href="https://software.opensuse.org//download.html?project=home%3AMasgalor%3ALLDAP&package=lldap">SUSE openBuildService</a><br> <table> <tr> <td>Available packages:</td> <td>lldap</td> <td>Light LDAP server for authentication.</td> </tr> <tr> <td></td> <td>lldap-extras</td> <td>Meta-Package for LLDAP and its tools and extensions.</td> </tr> <tr> <td></td> <td>lldap-migration-tool</td> <td>CLI migration tool to go from OpenLDAP to LLDAP.</td> </tr> <tr> <td></td> <td>lldap-set-password</td> <td>CLI tool to set a user password in LLDAP.</td> </tr> <tr> <td></td> <td>lldap-cli</td> <td>LLDAP-CLI is an unofficial command line interface for LLDAP.</td> </tr> </table> LLDPA configuration file: /etc/lldap/lldap_config.toml<br> </details> <details> <summary><b>Ubuntu</b></summary> <br> Unofficial Ubuntu support is offered through the <a href="https://build.opensuse.org/">openSUSE Build Service</a>.<br><br> Maintainer: <a href="https://github.com/Masgalor">@Masgalor</a><br> Support: <a href="https://codeberg.org/Masgalor/LLDAP-Packaging/issues">Codeberg</a>, <a href="https://github.com/lldap/lldap/discussions">Discussions</a><br> Package repository: <a href="https://software.opensuse.org//download.html?project=home%3AMasgalor%3ALLDAP&package=lldap">SUSE openBuildService</a><br> <table> <tr> <td>Available packages:</td> <td>lldap</td> <td>Light LDAP server for authentication.</td> </tr> <tr> <td></td> <td>lldap-extras</td> <td>Meta-Package for LLDAP and its tools and extensions.</td> </tr> <tr> <td></td> <td>lldap-migration-tool</td> <td>CLI migration tool to go from OpenLDAP to LLDAP.</td> </tr> <tr> <td></td> <td>lldap-set-password</td> <td>CLI tool to set a user password in LLDAP.</td> </tr> <tr> <td></td> <td>lldap-cli</td> <td>LLDAP-CLI is an unofficial command line interface for LLDAP.</td> </tr> </table> LLDPA configuration file: /etc/lldap/lldap_config.toml<br> </details>

With FreeBSD

You can also install it as a rc.d service in FreeBSD, see FreeBSD-install.md.

The rc.d script file rc.d_lldap.

From source

Backend

To compile the project, you'll need:

Then you can compile the server (and the migration tool if you want):

cargo build --release -p lldap -p lldap_migration_tool

The resulting binaries will be in ./target/release/. Alternatively, you can just run cargo run -- run to run the server.

Frontend

To bring up the server, you'll need to compile the frontend. In addition to cargo, you'll need WASM-pack, which can be installed by running cargo install wasm-pack.

Then you can build the frontend files with

./app/build.sh

(you'll need to run this after every front-end change to update the WASM package served).

The default config is in src/infra/configuration.rs, but you can override it by creating an lldap_config.toml, setting environment variables or passing arguments to cargo run. Have a look at the docker template: lldap_config.docker_template.toml.

You can also install it as a systemd service, see lldap.service.

Cross-compilation

Docker images are provided for AMD64, ARM64 and ARM/V7.

If you want to cross-compile yourself, you can do so by installing cross:

cargo install cross
cross build --target=armv7-unknown-linux-musleabihf -p lldap --release
./app/build.sh

(Replace armv7-unknown-linux-musleabihf with the correct Rust target for your device.)

You can then get the compiled server binary in target/armv7-unknown-linux-musleabihf/release/lldap and the various needed files (index.html, main.js, pkg folder) in the app folder. Copy them to the Raspberry Pi (or other target), with the folder structure maintained (app files in an app folder next to the binary).

Usage

The simplest way to use LLDAP is through the web front-end. There you can create users, set passwords, add them to groups and so on. Users can also connect to the web UI and change their information, or request a password reset link (if you configured the SMTP client).

You can create and manage custom attributes through the Web UI, or through the community-contributed CLI frontend ( Zepmann/lldap-cli). This is necessary for some service integrations.

The bootstrap.sh script can enforce a list of users/groups/attributes from a given file, reflecting it on the server.

To manage the user, group and membership lifecycle in an infrastructure-as-code scenario you can use the unofficial LLDAP terraform provider in the terraform registry.

LLDAP is also very scriptable, through its GraphQL API. See the Scripting docs for more info.

Recommended architecture

If you are using containers, a sample architecture could look like this:

Client configuration

Compatible services

Most services that can use LDAP as an authentication provider should work out of the box. For new services, it's possible that they require a bit of tweaking on LLDAP's side to make things work. In that case, just create an issue with the relevant details (logs of the service, LLDAP logs with verbose=true in the config).

General configuration guide

To configure the services that will talk to LLDAP, here are the values:

Testing group membership through memberOf is supported, so you can have a filter like: (memberOf=cn=admins,ou=groups,dc=example,dc=com).

The administrator group for LLDAP is lldap_admin: anyone in this group has admin rights in the Web UI. Most LDAP integrations should instead use a user in the lldap_strict_readonly or lldap_password_manager group, to avoid granting full administration access to many services.

Integration with OS's

Integration with Linux accounts is possible, through PAM and nslcd. See PAM configuration guide.

Integration with Windows (e.g. Samba) is WIP.

Sample client configurations

Some specific clients have been tested to work and come with sample configuration files, or guides. See the example_configs folder for help with:

Incompatible services

Though we try to be maximally compatible, not every feature is supported; LLDAP is not a fully-featured LDAP server, intentionally so.

LDAP browsing tools are generally not supported, though they could be. If you need to use one but it behaves weirdly, please file a bug.

Some services use features that are not implemented, or require specific attributes. You can try to create those attributes (see custom attributes in the Usage section).

Finally, some services require password hashes so they can validate themselves the user's password without contacting LLDAP. This is not and will not be supported, it's incompatible with our password hashing scheme (a zero-knowledge proof). Furthermore, it's generally not recommended in terms of security, since it duplicates the places from which a password hash could leak.

In that category, the most prominent is Synology. It is, to date, the only service that seems definitely incompatible with LLDAP.

Migrating from SQLite

If you started with an SQLite database and would like to migrate to MySQL/MariaDB or PostgreSQL, check out the DB migration docs.

Comparisons with other services

vs OpenLDAP

OpenLDAP is a monster of a service that implements all of LDAP and all of its extensions, plus some of its own. That said, if you need all that flexibility, it might be what you need! Note that installation can be a bit painful (figuring out how to use slapd) and people have mixed experiences following tutorials online. If you don't configure it properly, you might end up storing passwords in clear, so a breach of your server would reveal all the stored passwords!

OpenLDAP doesn't come with a UI: if you want a web interface, you'll have to install one (not that many look nice) and configure it.

LLDAP is much simpler to setup, has a much smaller image (10x smaller, 20x if you add PhpLdapAdmin), and comes packed with its own purpose-built web UI. However, it's not as flexible as OpenLDAP.

vs FreeIPA

FreeIPA is the one-stop shop for identity management: LDAP, Kerberos, NTP, DNS, Samba, you name it, it has it. In addition to user management, it also does security policies, single sign-on, certificate management, linux account management and so on.

If you need all of that, go for it! Keep in mind that a more complex system is more complex to maintain, though.

LLDAP is much lighter to run (<10 MB RAM including the DB), easier to configure (no messing around with DNS or security policies) and simpler to use. It also comes conveniently packed in a docker container.

vs Kanidm

Kanidm is an up-and-coming Rust identity management platform, covering all your bases: OAuth, Linux accounts, SSH keys, Radius, WebAuthn. It comes with a (read-only) LDAPS server.

It's fairly easy to install and does much more; but their LDAP server is read-only, and by having more moving parts it is inherently more complex. If you don't need to modify the users through LDAP and you're planning on installing something like KeyCloak to provide modern identity protocols, check out Kanidm.

I can't log in!

If you just set up the server, can get to the login page but the password you set isn't working, try the following:

Contributions

Contributions are welcome! Just fork and open a PR. Or just file a bug.

We don't have a code of conduct, just be respectful and remember that it's just normal people doing this for free on their free time.

Make sure that you run cargo fmt from the root before creating the PR. And if you change the GraphQL interface, you'll need to regenerate the schema by running ./export_schema.sh.

Join our Discord server if you have any questions!