An LDAP server that allows you to connect your legacy applications with Auth0 using the LDAP protocol.
- Bind
- Search (on email address only)
In the config.json
file set the following values:
AUTH0_DOMAIN
: Your Auth0 domain (fabrikam.auth0.com)AUTH0_CLIENT_ID
: Auth0 client ID with permission to request client-credentials grants, password grants and to interact with the Management APIAUTH0_CLIENT_SECRET
: Client secret corresponding to the client IDLDAP_PORT
: Port on which the LDAP server will listenLDAP_ADMIN_USER
: The DN of the user that is allowed to do a search. Format:CN=ADMIN_EMAIL_ADDRESS,OU=AUTH0_CONNECTION_NAME
(eg:[email protected],OU=Username-Password-Authentication
)LDAPS_CERTIFICATE
: The certificate chain to use for LDAPS. Must be X509 PEM-encoded, seecert
argument here.LDAPS_KEY
: Private key corresponding to the configured certificate to use for LDAPS. Must be PEM-encoded, seekey
argument in the above link.
Install Node.js 5+, then start the server:
npm install
node index
This will start the LDAP server and allow users to bind and search.
The examples/test-client.js script is a small sample that shows the supported features like bind
and search
:
node test-client.js
Bind success.
Searching for: {
"filter": "([email protected])",
"scope": "sub",
"attributes": [
"dn",
"sn",
"cn"
]
}
Found: {"dn":"[email protected], ou=Username-Password-Authentication","controls":[],"cn":"[email protected]"}
Found: {"dn":"[email protected], ou=google-oauth2","controls":[],"cn":"[email protected]"}
Search Done. Status: 0
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
This project is licensed under the MIT license. See the LICENSE file for more info.