LDAP plugin which implements the GoCD Authorization Plugin endpoint.
To build the jar, run ./gradlew clean test assemble
These plugins require GoCD version v17.5 or above.
- From GoCD
17.5.0
onwards the plugin comes bundled along with server, hence a separate installation is not required.
The plugin uses JNDI and ApacheDs ldap client for the authentication. Defaults to ApacheDs client
. In order to use JNDI
client use system property use.jndi.ldap.client=true
while starting the GoCD server.
The plugin requires necessary configurations to connect to LDAP/AD. The configuration can be added by adding a Authorization Configuration by visting the Authorization Configuration page under Admin > Security.
Alternatively, the configuration can be added directly to the config.xml
using the <authConfig>
configuration.
-
Example Configuration
<security> <authConfigs> <authConfig id="profile-id" pluginId="cd.go.authentication.ldap"> <property> <key>Url</key> <value>ldap://ldap-server-url</value> </property> <property> <key>ManagerDN</key> <value>cn=go,ou=Teams,dc=corporate,dc=example,dc=com</value> </property> <property> <key>Password</key> <value>secret</value> </property> <property> <key>SearchBases</key> <value>ou=Teams,dc=corporate,dc=example,dc=com</value> </property> <property> <key>UserLoginFilter</key> <value>(sAMAccountName={0})</value> </property> <property> <key>UserSearchFilter</key> <value>(|(sAMAccountName=*{0}*)(uid=*{0}*)(cn=*{0}*)(mail=*{0}*)(otherMailbox=*{0}*))</value> </property> <property> <key>DisplayNameAttribute</key> <value>displayName</value> </property> <property> <key>EmailAttribute</key> <value>mail</value> </property> </authConfig> </authConfigs> </security>
-
Url (Mandatory) : Specify your ldap server URL. The plugin does not support configuring certificates for connecting to LDAP server over SSL, a workaround for this issue involves importing the certificates directly into java's cacerts.
<property> <key>Url</key> <value>ldap://ldap-server-url:1234</value> </property>
if you are trying to configure ldaps then use the url as:
```xml
<property>
<key>Url</key>
<value>ldaps://ldap-server-url:1234</value>
</property>
```
-
ManagerDN (Optional): The LDAP/AD manager user's DN, used to connect to the LDAP/AD server.
<property> <key>ManagerDN</key> <value>uid=admin,ou=system,dc=example,dc=com</value> </property>
-
Password (Mandatory if
ManagerDN
provided): The LDAP/AD manager password, used to connect to the LDAP/AD server. Required only if a ManagerDN is specified. -
SearchBases (Mandatory): This field defines the location in the directory from which the LDAP search begins. You can provide multiple search bases. If multiple search bases are configured the plugin would look for the user in each search base sequentially until the user is found.
Single search base:
<property> <key>SearchBases</key> <value>ou=users,ou=system</value> </property>
Multiple search base
<property> <key>SearchBases</key> <value> ou=users,ou=system ou=employee,ou=system </value> </property>
-
UserLoginFilter (Mandatory): It is an LDAP search filter used during authentication to lookup for a user entry matching the given expression.
In the following example the filter would search for a username matching the
sAMAccountName
attribute.<property> <key>UserLoginFilter</key> <value>(sAMAccountName={0})</value> </property>
-
UserSearchFilter (Optional): It is an LDAP search filter used to lookup for users matching a given search term. This is an optional configuration, the default filter used is
(|(sAMAccountName=*{0}*)(uid=*{0}*)(cn=*{0}*)(mail=*{0}*)(otherMailbox=*{0}*))
.<property> <key>UserSearchFilter</key> <value>(|(sAMAccountName=*{0}*)(uid=*{0}*))</value> </property>
-
DisplayNameAttribute (Optional): Value of this attribute is mapped to GoCD User displayname, default attribute used is
cn
.<property> <key>DisplayNameAttribute</key> <value>displayName</value> </property>
-
EmailAttribute (Optional): Value of this attribute is mapped to GoCD User mail, default value used is
mail
.<property> <key>EmailAttribute</key> <value>mail</value> </property>
Note: The plugin allows having multiple configurations to connect to different LDAP/AD servers
<authConfig id="second-profile-id" pluginId="cd.go.authentication.ldap">
...
</authConfig>
For a given Authorization Configuration verify if the plugin can connect to the LDAP/AD server. The Authorization Configuration page under Admin > Security gives an option to verify connection.
Edit the file wrapper-properties.conf
on your GoCD server and add the following options. The location of the wrapper-properties.conf
can be found in the installation documentation of the GoCD server.
# We recommend that you begin with the index `100` and increment the index for each system property
wrapper.java.additional.105=-Dplugin.cd.go.authentication.ldap.log.level=debug
For this to work it's extremely important that there are no other entries with the same index number for wrapper.java.additional
. E.g. with the docker version in the docker-entrypoint.sh is a line that adds an item for wrapper.java.additional.100
but only after boot time.
If you're running with GoCD server 19.6 and above on docker using one of the supported GoCD server images, set the environment variable GOCD_SERVER_JVM_OPTIONS
:
docker run -e "GOCD_SERVER_JVM_OPTIONS=-Dplugin.cd.go.authentication.ldap.log.level=debug" ...
-
On Linux:
Enabling debug level logging can help you troubleshoot an issue with this plugin. To enable debug level logs, edit the file
/etc/default/go-server
(for Linux) to add:export GO_SERVER_SYSTEM_PROPERTIES="$GO_SERVER_SYSTEM_PROPERTIES -Dplugin.cd.go.authentication.ldap.log.level=debug"
If you're running the server via
./server.sh
script:$ GO_SERVER_SYSTEM_PROPERTIES="-Dplugin.cd.go.authentication.ldap.log.level=debug" ./server.sh
-
On windows:
Edit the file
config/wrapper-properties.conf
inside the GoCD Server installation directory (typicallyC:\Program Files\Go Server
):# config/wrapper-properties.conf # since the last "wrapper.java.additional" index is 15, we use the next available index. wrapper.java.additional.16=-Dplugin.cd.go.authentication.ldap.log.level=debug
- A must change would be to now specify a fully qualified ManagerDN instead of just username.
- The user search base specified should return unique result for the given username.
Copyright 2022 Thoughtworks, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.