We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Usecase: Connect Trino with existing company LDAP
Only a certain group of users from the LDAP is allowed to authenticate. Adding a searchfilter requieres specific LDAP properties. These include
As a workaround we created a config map and mounted this as podOverrides into the trino pod. We used configOverrides as well.
apiVersion: v1 kind: ConfigMap metadata: name: trino-ldap-config data: ldap-password-ldap-auth.properties: | ldap.allow-insecure=true ldap.group-auth-pattern=(&(uid\=${USER})) ldap.url=ldap\://my-host\:my-port ldap.user-base-dn=xx\=people,ou\=xxxxx,ou\=xxx,dc\=xxxxx,dc\=xxx password-authenticator.name=ldap ldap.user-bind-pattern=uid\=${USER},ou\=people,ou\=xxxxxx,ou\=xxx,dc\=xxxxxxx,dc\=xxx ldap.group-auth-pattern=(&(uid\=${USER})(memberOf\=cn\=xxxxx,ou\=xxxxxx,ou\=xxxxx,ou\=xxx,dc\=xxxxxxxx,dc\=xxx))
From the trino deployment:
configOverrides: config.properties: password-authenticator.config-files: /stackable/rwconfig/trino-users-password-file-auth.properties,/tmp/config/ldap-password-ldap-auth.properties podOverrides: spec: containers: - name: trino volumeMounts: - name: custom-ldap-config mountPath: /tmp/config/ldap-password-ldap-auth.properties subPath: ldap-password-ldap-auth.properties volumes: - name: custom-ldap-config configMap: name: trino-ldap-config
fyi: for the specific case we discovered that the bindCredentials is optional.
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Usecase:
Connect Trino with existing company LDAP
Only a certain group of users from the LDAP is allowed to authenticate. Adding a searchfilter requieres specific LDAP properties.
These include
As a workaround we created a config map and mounted this as podOverrides into the trino pod.
We used configOverrides as well.
From the trino deployment:
fyi: for the specific case we discovered that the bindCredentials is optional.
The text was updated successfully, but these errors were encountered: