Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
DBRepo
Manage
Activity
Members
Labels
Plan
External wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Package registry
Model registry
Operate
Terraform modules
Analyze
Contributor analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
FAIR Data Austria DB Repository
DBRepo
Merge requests
!299
Dev
Code
Review changes
Check out branch
Download
Patches
Plain diff
Expand sidebar
Merged
Dev
dev
into
master
Overview
0
Commits
42
Pipelines
0
Changes
199
Merged
Dev
Martin Weise
requested to merge
dev
into
master
Jul 9, 2024
Overview
0
Commits
42
Pipelines
0
Changes
199
0
0
Merge request reports
Compare
master
master (base)
and
latest version
latest version
70f797fb
42 commits,
Jul 9, 2024
199 files
+
8375
−
4032
Inline
Compare changes
Side-by-side
Inline
Show whitespace changes
Show one file at a time
Files
199
.docs/api/identity-service.md
+
10
−
4
View file @ 70f797fb
Edit in single-file editor
Open in Web IDE
Show full file
@@ -12,10 +12,13 @@ author: Martin Weise
## Overview
This service holds the user identities which we simply call identities in the following. It is integrated into the
[
Auth Service
](
../auth-service
)
through an LDAP federation, allowing any identity to authenticate through the Auth
Service. The LDAP protocol is not used for authentication. You can use your own identity provider, e.g. Active
Directory.
This optional service holds the user identities which we simply call identities in the following. It is integrated into
the
[
Auth Service
](
../auth-service
)
through an LDAP federation, allowing any identity to authenticate through the Auth
Service. The LDAP protocol is not used for authentication.
The Identity Service can be optionally replaced with your existing LDAP solution. Your LDAP solution should store
users using the RFC 2798
[
`InetOrgPerson`
](
https://datatracker.ietf.org/doc/html/rfc2798
)
schema which is standard
to most LDAP solutions.
## Identities
@@ -23,6 +26,9 @@ Any identity is identified by its `entryUUID` by default in the Auth Service. No
the Auth Service) may assign a different UUID to a user. DBRepo
**always**
uses the UUID provided through the Identity
Service.
The field
`uid`
is the username and is used for bind/unbind operations. The fields
`cn`
and
`sn`
are ignored by the
Auth Service and can be empty
`""`
.
## Limitations
*
Limited support for scaling in Kubernetes, see the
Loading