
Debug logs may contain more detailed information about the error. You may also inspect the Rancher logs to help pinpointing the problem cause. If you are experiencing issues while testing the connection to the OpenLDAP server, first double-check the credentials entered for the service account as well as the search base configuration.
#BEST UI BROWSER FOR LDAP PASSWORD#
You will still be able to login using the locally configured admin account and password in case of a disruption of LDAP services.


The OpenLDAP user pertaining to the credentials entered in this step will be mapped to the local principal account and assigned administrator privileges in Rancher. Authentication with OpenLDAP will be enabled implicitly if the test is successful. Once you have completed the configuration, proceed by testing the connection to the OpenLDAP server. The Configure an OpenLDAP server form will be displayed. From the Global view, navigate to Security > Authentication.Log into the Rancher UI using the initial local admin account.For help filling out each field, refer to the configuration reference.īefore you proceed with the configuration, please familiarise yourself with the concepts of External Authentication Configuration and Principal Users. Configure OpenLDAP in Rancher Ĭonfigure the settings for the OpenLDAP server, groups and users. You will have to paste in this certificate during the configuration so that Rancher is able to validate the certificate chain. If the certificate used by the OpenLDAP server is self-signed or not from a recognised certificate authority, make sure have at hand the CA certificate (concatenated with any intermediate certificates) in PEM format. It is recommended to not use an administrator account or personal account for this purpose and instead create a dedicated account in OpenLDAP with read-only access to users and groups under the configured search base (see below).

Rancher must be configured with a LDAP bind account (aka service account) to search and retrieve LDAP entries pertaining to users and groups that should have access. This allows Rancher admins to control access to clusters and projects based on users and groups managed externally in the organisation's central user repository, while allowing end-users to authenticate with their LDAP credentials when logging in to the Rancher UI. If your organization uses LDAP for user authentication, you can configure Rancher to communicate with an OpenLDAP server to authenticate users.
