Our new LDAP Repository does not have a readonly user. Read access is performed without doing a bind first. So a flag (--search-ldap) was needed to trigger a search of the user DN in LDAP without providing a --bind-dn flag. I also added a flag (--ldap-cacert) for providing a (chain of) certificate(s) to verify the LDAP server's identity.
There are additional changes: A Dockerfile for building an image including the LDAP plugin, and a small Makefile change allowing to set a different Docker Repo. These changes would make my life easier, but they are not really important to me.
Our new LDAP Repository does not have a readonly user. Read access is performed without doing a bind first. So a flag (--search-ldap) was needed to trigger a search of the user DN in LDAP without providing a --bind-dn flag. I also added a flag (--ldap-cacert) for providing a (chain of) certificate(s) to verify the LDAP server's identity.
There are additional changes: A Dockerfile for building an image including the LDAP plugin, and a small Makefile change allowing to set a different Docker Repo. These changes would make my life easier, but they are not really important to me.
Best regards,
Matthias