mirror of
https://github.com/BookStackApp/BookStack.git
synced 2026-02-05 00:29:48 +03:00
LDAP only allow specific users? #781
Closed
opened 2026-02-04 22:16:06 +03:00 by OVERLORD
·
15 comments
No Branch/Tag Specified
development
l10n_development
further_theme_development
release
llm_only
vectors
v25-11
docker_env
drawio_rendering
user_permissions
ldap_host_failover
svg_image
prosemirror
captcha_example
fix/video-export
v25.12.3
v25.12.2
v25.12.1
v25.12
v25.11.6
v25.11.5
v25.11.4
v24.11.4
v25.11.3
v25.11.2
v25.11.1
v25.11
v25.07.3
v25.07.2
v25.07.1
v25.07
v25.05.2
v25.05.1
v25.05
v25.02.5
v25.02.4
v25.02.3
v25.02.2
v25.02.1
v25.02
v24.12.1
v24.12
v24.10.3
v24.10.2
v24.10.1
v24.10
v24.05.4
v24.05.3
v24.05.2
v24.05.1
v24.05
v24.02.3
v24.02.2
v24.02.1
v24.02
v23.12.3
v23.12.2
v23.12.1
v23.12
v23.10.4
v23.10.3
v23.10.2
v23.10.1
v23.10
v23.08.3
v23.08.2
v23.08.1
v23.08
v23.06.2
v23.06.1
v23.06
v23.05.2
v23.05.1
v23.05
v23.02.3
v23.02.2
v23.02.1
v23.02
v23.01.1
v23.01
v22.11.1
v22.11
v22.10.2
v22.10.1
v22.10
v22.09.1
v22.09
v22.07.3
v22.07.2
v22.07.1
v22.07
v22.06.2
v22.06.1
v22.06
v22.04.2
v22.04.1
v22.04
v22.03.1
v22.03
v22.02.3
v22.02.2
v22.02.1
v22.02
v21.12.5
v21.12.4
v21.12.3
v21.12.2
v21.12.1
v21.12
v21.11.3
v21.11.2
v21.11.1
v21.11
v21.10.3
v21.10.2
v21.10.1
v21.10
v21.08.6
v21.08.5
v21.08.4
v21.08.3
v21.08.2
v21.08.1
v21.08
v21.05.4
v21.05.3
v21.05.2
v21.05.1
v21.05
v21.04.6
v21.04.5
v21.04.4
v21.04.3
v21.04.2
v21.04.1
v21.04
v0.31.8
v0.31.7
v0.31.6
v0.31.5
v0.31.4
v0.31.3
v0.31.2
v0.31.1
v0.31.0
v0.30.7
v0.30.6
v0.30.5
v0.30.4
v0.30.3
v0.30.2
v0.30.1
v0.30.0
v0.29.3
v0.29.2
v0.29.1
v0.29.0
v0.28.3
v0.28.2
v0.28.1
v0.28.0
v0.27.5
v0.27.4
v0.27.3
v0.27.2
v0.27.1
v0.27
v0.26.4
v0.26.3
v0.26.2
v0.26.1
v0.26.0
v0.25.5
v0.25.4
v0.25.3
v0.25.2
v0.25.1
v0.25.0
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.2
v0.23.1
v0.23.0
v0.22.0
v0.21.0
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.0
v0.18.5
v0.18.4
v0.18.3
v0.18.2
v0.18.1
v0.18.0
v0.17.4
v0.17.3
v0.17.2
v0.17.1
v0.17.0
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.15.3
v0.15.2
v0.15.1
v0.15.0
v0.14.3
v0.14.2
v0.14.1
v0.14.0
v0.13.1
v0.13.0
v0.12.2
v0.12.1
v0.12.0
v0.11.2
v0.11.1
v0.11.0
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.2
v0.8.1
v0.8.0
v0.7.6
v0.7.5
v0.7.4
v0.7.3
0.7.2
v.0.7.1
v0.7.0
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.5.0
Labels
Clear labels
🎨 Design
📖 Docs Update
🐛 Bug
🐛 Bug
:cat2:🐈 Possible duplicate
💿 Database
☕ Open to discussion
💻 Front-End
🐕 Support
🚪 Authentication
🌍 Translations
🔌 API Task
🏭 Back-End
⛲ Upstream
🔨 Feature Request
🛠️ Enhancement
🛠️ Enhancement
🛠️ Enhancement
❤️ Happy feedback
🔒 Security
🔍 Pending Validation
💆 UX
📝 WYSIWYG Editor
🌔 Out of scope
🔩 API Request
:octocat: Admin/Meta
🖌️ View Customization
❓ Question
🚀 Priority
🛡️ Blocked
🚚 Export System
♿ A11y
🔧 Maintenance
> Markdown Editor
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/BookStack#781
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @pth0rn on GitHub (Aug 18, 2018).
So I've successfully configured LDAP and I can log in. Is there a way to configure BookStack to only allow logins from a list of specific users?
Current I'm just using
LDAP_USER_FILTER=(&(sAMAccountName=${user}))in .env@derek-shnosh commented on GitHub (Aug 19, 2018):
Review the docs; https://www.bookstackapp.com/docs/admin/ldap-auth/
The LDAP Group Sync section at the bottom outlines what you're trying to accomplish.
I just did this last night and its working as documented...
.envfile;@pth0rn commented on GitHub (Aug 19, 2018):
Actually I’d like to have a specific list of users to filter, not by groups in ldap.
Something like
LDAP_USER_FILTER=(&(sAMAccountName=john || joe || mark)
@ssddanbrown commented on GitHub (Aug 19, 2018):
Hi @Vicvinegar0,
There's three ways I can see of doing this:
Let us know if that helps
@pth0rn commented on GitHub (Aug 19, 2018):
Perfect, I only have a small number of users who need to use the site and I don’t have access to make AD changes so 3 is what I was looking for.
Appreciate it
@ssddanbrown commented on GitHub (Aug 19, 2018):
@Vicvinegar0 Awesome, Thanks for replying, Will therefore close this issue.
@rag08 commented on GitHub (Jan 8, 2021):
I know this thread has been closed a little while now but I would ideally like to implement option 2 in to our setup. Using the example below appears to break syntax and BookStack fails to load. Using option 3 works, but I would prefer the scalability of using AD groups. I don't know if this is because we have spaces in our lookup path, but works ok on the LDAP_BASE_DN lookup.
LDAP_USER_FILTER=(&(sAMAccountName=${user})(memberOf="cn=BookStack,ou=Security Groups,ou=OU Name,dc=domain,dc=com"))Thanks
@ssddanbrown commented on GitHub (Jan 9, 2021):
Hi @rag08, Quotes and spaces can mess with the
.envvalues. Can you try something like:So wrap the entire value in quotes and escape any quotes you need in the string itself.
@rag08 commented on GitHub (Jan 11, 2021):
Thanks for the quick response @ssddanbrown. Unfortunately encapsulating the entire string in quotes still breaks with a syntax error. Do you know of any other workaround for this at all?
Or we may just have to go with one of your other two suggestions from above!
Thanks
@ssddanbrown commented on GitHub (Jan 12, 2021):
@rag08No problem, It should not break BookStack though, Are you escaping the inner quotes with back-slashes like in the example? Is this in a
.envor are you passing these to something like a docker container via other means?@rag08 commented on GitHub (Jan 12, 2021):
Yeah the inner quotes are escaped with back-slashes, but no joy unfortunately. BookStack will not load at all with this config.
LDAP_USER_FILTER="(&(sAMAccountname=${user})(memberOf=\"cn=BookStack,ou=Security Groups,ou=OU Name,dc=domain,dc=com\"))"This is all in the .env file.
Thanks
@ssddanbrown commented on GitHub (Jan 12, 2021):
@rag08 very odd, What operating system are you on out of interest?
That exact line in my .env file does not prevent loading. Does it prevent all page loads? What do you see? A blank white screen or an error message or something else?
@rag08 commented on GitHub (Jan 13, 2021):
Ok so it looks like I am getting somewhere. BookStack is now loading with that line in the config (not sure what was going on there, service restart seemed to sort that).
When trying to login with a user that is a member of the required security group, it gives the "These credentials do not match our records" error. Is there anything else I need to change in the .env file for this? Or is it maybe a filter issue?
@ssddanbrown commented on GitHub (Jan 13, 2021):
@rag08 Generally that would indicate either the filter is matching no results or the password is incorrect.
I think setting
LDAP_DUMP_USER_DETAILS=truemay dump a user, if found at all, before the password is checked if you wanted to double check what part is failing.@jdolny commented on GitHub (Oct 22, 2021):
I experienced the same issues stated above and the following worked for me. Note, quotes should go around the entire filter but should not be included in the memberof=
LDAP_USER_FILTER="(&(sAMAccountname=${user})(memberOf=cn=BookStack,ou=Security Groups,ou=OU Name,dc=domain,dc=com))"Putting quotes around the member of would allow the page to load but could not login
@NewbAdmin commented on GitHub (Jan 28, 2024):
I know this is an old issue, but I'm running through Active Directory integration now and thought I would contribute some additional useful information. You can make role management easier with the following filter (specific values will obviously be different for your environment):
LDAP_USER_FILTER="(&(sAMAccountName=${user})(memberOf:1.2.840.113556.1.4.1941:=cn=BookStack Users,cn=Users,dc=example,dc=com))"By adding :1.2.840.113556.1.4.1941: to the LDAP filter, BookStack can check nested groups. This is useful when you sync BookStack roles to AD groups because you can store multiple roles within a single 'BookStack Users' group.
Here are some examples:
Of course, you could also just add an OR statement to the filter and explicitly name each group with something like
(|(group_one)(group_two)(group_three)), but this looks much cleaner and you won't have to go back and edit the filter in .env every time you add a new role.