mirror of
https://github.com/lldap/lldap.git
synced 2024-11-25 09:06:03 +00:00
example_configs: Add example for Sonatype Nexus Repository Manager 3
This commit is contained in:
parent
733f990858
commit
98acd68f06
2 changed files with 57 additions and 0 deletions
|
@ -252,6 +252,7 @@ folder for help with:
|
||||||
- [KeyCloak](example_configs/keycloak.md)
|
- [KeyCloak](example_configs/keycloak.md)
|
||||||
- [Matrix](example_configs/matrix_synapse.yml)
|
- [Matrix](example_configs/matrix_synapse.yml)
|
||||||
- [Nextcloud](example_configs/nextcloud.md)
|
- [Nextcloud](example_configs/nextcloud.md)
|
||||||
|
- [Nexus](example_configs/nexus.md)
|
||||||
- [Organizr](example_configs/Organizr.md)
|
- [Organizr](example_configs/Organizr.md)
|
||||||
- [Portainer](example_configs/portainer.md)
|
- [Portainer](example_configs/portainer.md)
|
||||||
- [Rancher](example_configs/rancher.md)
|
- [Rancher](example_configs/rancher.md)
|
||||||
|
|
56
example_configs/nexus.md
Normal file
56
example_configs/nexus.md
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
# Configuration for Sonatype Nexus Repository Manager 3
|
||||||
|
In Nexus log in as an administrator, go to `Server Administration and configuration (gear icon)`
|
||||||
|
|
||||||
|
Select `LDAP` under the `Security` section
|
||||||
|
|
||||||
|
Click `Create connection`
|
||||||
|
|
||||||
|
* Host: A name for the connection e.g. lldap
|
||||||
|
* Type: ldap
|
||||||
|
* Host: Your lldap server's ip/hostname
|
||||||
|
* Port: Your lldap server's port (3890 by default)
|
||||||
|
* Base DN: `dc=example,dc=com`
|
||||||
|
* Authentication Method: Simple Authentication
|
||||||
|
* Username or DN: `uid=admin,ou=people,dc=example,dc=com` or preferably create a read only user in lldap with the lldap_strict_readonly group.
|
||||||
|
* Password: The password for the user specified above
|
||||||
|
|
||||||
|
Click `Verify connection` if successful click `Next`
|
||||||
|
|
||||||
|
* Select a template: Generic ldap server
|
||||||
|
* User Relative DN: `ou=people`
|
||||||
|
* User subtree: Leave unchecked
|
||||||
|
* Object class: person
|
||||||
|
* User Filter: Leave empty to allow all users to log in or `(memberOf=uid=nexus_users,ou=groups,dc=example,dc=com)` for a specific group
|
||||||
|
* Username Attribute: `uid`
|
||||||
|
* Real Name Attribute: `cn`
|
||||||
|
* Email Attribute: `mail`
|
||||||
|
* Password Attribute: Leave blank
|
||||||
|
* Check `Enable User Synchronization`
|
||||||
|
|
||||||
|
Test user login credentials with `Verify login`
|
||||||
|
|
||||||
|
## Set up group mapping as roles
|
||||||
|
|
||||||
|
Check `Map LDAP groups as roles`
|
||||||
|
|
||||||
|
* Group Type: `Static Groups`
|
||||||
|
* Group relative DN: `ou=groups`
|
||||||
|
* Group subtree: Leave unchecked
|
||||||
|
* Group object class: `groupOfUniqueNames`
|
||||||
|
* Group ID attribute: `cn`
|
||||||
|
* Group member attribute: `member`
|
||||||
|
* Group member format: `uid=${username},ou=people,dc=example,dc=com`
|
||||||
|
|
||||||
|
Check user mapping with `Verify user mapping`
|
||||||
|
|
||||||
|
## Map specific roles to groups
|
||||||
|
In Nexus log in as an administrator, go to `Server Administration and configuration (gear icon)`
|
||||||
|
Select `Roles` under the `Security` section
|
||||||
|
|
||||||
|
Click `Create Role`
|
||||||
|
|
||||||
|
* Role ID: e.g. nexus_admin (name in nexus)
|
||||||
|
* Role Name: e.g. nexus_admin (group in lldap)
|
||||||
|
* Add privileges/roles as needed e.g. under Roles add nx-admin to the "contained" list
|
||||||
|
|
||||||
|
Click `Save`
|
Loading…
Reference in a new issue