Configuring LDAP
This guide provides instructions for configuring an (Lightweight Directory Access Protocol) LDAP registry in HCL Digital Experience (DX) Compose. This covers how to integrate an LDAP server with the WebEngine container using Helm.
LDAP configuration in the values.yaml
Refer to the following sample snippet to configure the DX WebEngine server to use an LDAP server with basic configuration settings.
configuration:
webEngine:
ldap:
host: "ldap.example.com"
port: 389
suffix: "dc=example,dc=com"
serverType: "Custom"
id: "dx_ldap"
type: "other"
bindUser: 'dx_user'
bindPassword: 'p0rtal4u'
customLdapSecret: "customLdapSecret"
Replace the values for the following parameters with the values of the LDAP server:
hostportbaseDNbindDNbindPassword
LDAP configuration parameters
In the sample configuration, the following parameters are used:
host: The LDAP server hostname. Only used if LDAP type isother.port: The LDAP server port. Only used if LDAP type isother.suffix: Base Distinguished Name for LDAP searches (also known asbaseDN).serverType: The type of LDAP server. AcceptsCustom.id: The LDAP configuration ID. Only used if LDAP type isother.type: The type determines which type of LDAP to use. Acceptsnone,dx, orother.none: No LDAP configuration.dx: For OpenLDAP server. You can also adjust the image version withimages > tags > openLdap.other: For other LDAP servers.bindUser: User used to connect to LDAP. Only used if LDAP type isother.bindPassword: Password used to connect to LDAP. Only used if LDAP type isother.customLdapSecret: The name of the secret that contains the bind user and password. This is used to store the bind user and password in a secret. Only used if LDAP type isother.
Note
Provide either customLdapSecret or bindUser and bindPassword. If both are provided, the LDAP Bind User and Password from the secret will be used.
Creating a secret
To create a secret, run the following command:
kubectl create secret generic CUSTOM_SECRET_NAME --from-literal=bindUser=CUSTOM_BIND_USER --from-literal=bindPassword=CUSTOM_BIND_PASSWORD --namespace=NAME_SERVER
Replace CUSTOM_SECRET_NAME, CUSTOM_BIND_USER, CUSTOM_BIND_PASSWORD, and NAME_SERVER with the actual values.
For example:
kubectl create secret generic custom-web-engine-secret --from-literal=bindUser=dx_user --from-literal=bindPassword=p0rtal4u --namespace=dxns
LDAP configuration using overrides (advanced configuration)
Advanced configuration settings for LDAP can be done using configuration overrides. For information on how to configure LDAP using configuration overrides, refer to DX Compose configuration changes using overrides.