Commit c779a352 authored by Drew Blessing's avatar Drew Blessing Committed by Drew Blessing

Add Kerberos and LDAP mapping documentation

The new configuration option `simple_ldap_linking_allowed_realms'
allows custom Kerberos realms to be specified for linking LDAP
identities.
parent c9e47f34
......@@ -114,6 +114,40 @@ Taken together, these rules mean that linking will only work if your users'
Kerberos usernames are of the form `foo@AD.EXAMPLE.COM` and their
LDAP Distinguished Names look like `sAMAccountName=foo,dc=ad,dc=example,dc=com`.
### Custom allowed realms
[Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/9962) in GitLab 13.5.
You can configure custom allowed realms when
the user's Kerberos realm doesn't match the domain from the user's LDAP DN. The
configuration value must specify all domains that users may be expected to
have. Any other domains will be ignored and an LDAP identity will not be linked.
**For Omnibus installations**
1. Edit `/etc/gitlab/gitlab.rb`:
```ruby
gitlab_rails['kerberos_simple_ldap_linking_allowed_realms'] = ['example.com','kerberos.example.com']
```
1. Save the file and [reconfigure](../administration/restart_gitlab.md#omnibus-gitlab-reconfigure)
GitLab for the changes to take effect.
---
**For installations from source**
1. Edit `config/gitlab.yml`:
```yaml
kerberos:
simple_ldap_linking_allowed_realms: ['example.com','kerberos.example.com']
```
1. Save the file and [restart](../administration/restart_gitlab.md#installations-from-source)
GitLab for the changes to take effect.
## HTTP Git access
A linked Kerberos account enables you to `git pull` and `git push` using your
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment