Unverified Commit 763f23b2 authored by Liam Crilly's avatar Liam Crilly Committed by GitHub
Browse files

Security improvements

parent 5e5d5b1b
Loading
Loading
Loading
Loading
+23 −19
Original line number Diff line number Diff line
@@ -47,6 +47,7 @@ http {
            proxy_pass http://127.0.0.1:8888;

            proxy_pass_request_body off;
            proxy_pass_request_headers off;
            proxy_set_header Content-Length "";
            proxy_cache auth_cache;
            proxy_cache_valid 200 10m;
@@ -78,10 +79,10 @@ http {
            proxy_set_header X-Ldap-URL      "ldap://example.com";

            # (Optional) Establish a TLS-enabled LDAP session after binding to the
            # LDAP server. Set the value to "true: to enable.
            # LDAP server.
            # This is the 'proper' way to establish encrypted TLS connections, see
            # http://www.openldap.org/faq/data/cache/185.html
            proxy_set_header X-Ldap-Starttls ""; # Optional, do not comment
            #proxy_set_header X-Ldap-Starttls "true";

            # (Required) Set the Base DN, by replacing the value enclosed in
            # double quotes.
@@ -96,30 +97,33 @@ http {

            # (Required) The following directives set the cookie name and pass
            # it, respectively. They are required for cookie-based
            # authentication. Set to empty value if using HTTP basic
            # authentication (do not comment).
            # authentication. Comment them out if using HTTP basic
            # authentication.
            proxy_set_header X-CookieName "nginxauth";
            proxy_set_header Cookie nginxauth=$cookie_nginxauth;

            # (Optional) Uncomment if using HTTP basic authentication
            #proxy_set_header Authorization $http_authorization;

            # (Required if using Microsoft Active Directory as the LDAP server)
            # Set the LDAP template with "(sAMAccountName=%(username)s)"
            proxy_set_header X-Ldap-Template ""; # Optional, do not comment
            # Set the LDAP template by uncommenting the following directive.
            #proxy_set_header X-Ldap-Template "(sAMAccountName=%(username)s)";

            # (Set to "true"  if using Microsoft Active Directory and
            # (May be required if using Microsoft Active Directory and
            # getting "In order to perform this operation a successful bind
            # must be completed on the connection." errror)
            proxy_set_header X-Ldap-DisableReferrals ""; # Optional, do not comment

            # (Optional)
            # Set to "(sAMAccountName=%(username)s)" if using Microsoft Active
            # Directory as the LDAP server.
            # Set to "(cn=%(username)s)" if using OpenLDAP as the LDAP server,
            # which is the default set in nginx-ldap-auth-daemon.py.
            proxy_set_header X-Ldap-Template ""; # Optional, do not comment

            # (Optional) Set the realm name, e.g. "Restricted", which is the
            # default set in nginx-ldap-auth-daemon.py.
            proxy_set_header X-Ldap-Realm ""; # Optional, do not comment
            #proxy_set_header X-Ldap-DisableReferrals "true";

            # (Optional if using OpenLDAP as the LDAP server) Set the LDAP
            # template by uncommenting the following directive and replacing
            # '(cn=%(username)s)' which is the default set in
            # nginx-ldap-auth-daemon.py.
            #proxy_set_header X-Ldap-Template "(cn=%(username)s)";

            # (Optional) Set the realm name, by uncommenting the following
            # directive and replacing 'Restricted' which is the default set
            # in nginx-ldap-auth-daemon.py.
            #proxy_set_header X-Ldap-Realm    "Restricted";
        }
    }
}