Current Wednesday:
- Gitlab Server: Centos 6.5
- Active Directory: Windows Server 2008 R2
Can anyone check these dummy settings for Ldap authentication in Gitlab 7.1.1?
gitlab_rails['ldap_enabled'] = true gitlab_rails['ldap_host'] = 'myserver.dom.com.net' gitlab_rails['ldap_port'] = 389 gitlab_rails['ldap_uid'] = 'sAMAccountName' gitlab_rails['ldap_method'] = 'plain'
What ldap_bind_dn must be installed for Gitlab to work (equivalent to user account)?
What ldap_password should be set for gitlab to work?
I followed the suggestions from @metaDiego and @heinglandreas. Both were on the right track. Therefore, I changed the settings in the lines:
Decision
gitlab_rails['ldap_bind_dn'] = 'CN=the_allowed_user_for_access_ldap,OU=Users,DC=dom,DC=com,DC=net' gitlab_rails['ldap_password'] = 'the_password_of_allowed_user'
ldap_bind_dn may vary depending on the structure of AD and the current level at which the authorized user is located.
My AD company does not allow anonymous Ldap requests. Therefore, the addition of these parameters was mandatory.
Find help from domain administrators to get these options.
Githlabhq useful article on Github
If gitlab_rails['ldap_allow_username_or_email_login'] = true , the login user can be in the email format or only a domain user.

source share