Releases: ahaenggli/AzureAD-LDAP-wrapper
Releases · ahaenggli/AzureAD-LDAP-wrapper
v1.4.0
Added
- entry point for customizable schema modifications
Changed
- Changed the "sambaDomainName" attribute to be in upper case to respect the standard configuration of samba configs. (thx @DreydenGys)
v1.3.1
v1.3.0
Added/Fixed
- more schema data to avoid errors in DSM 7.0
(ldap schema data was extracted from syno directory server) - sambaDomainName is now part of the ldap schema information
Changed
- merge ldap entries with matching entryUUIDs
- removed subschemaSubentry and hasSubordinates values from ldap entries
- all groups cn are now in lowercase
Security
- npm dependencies updated
v1.2.0
v1.1.0
Added
- limit the time a cached sambaNTPassword hash can be used with env var
LDAP_SAMBANTPWD_MAXCACHETIME
- entryUID and osx-attributes for ldap entries
- "rename" user if another with same entryUID exists
- LDAPS (LDAP over SSL) support
Changed
- the docker image is now using tini (nodejs is not running as PID 1 anymore)
- always log 30 minutes refresh info (to be sure it's still running)
v1.0.2
v1.0.1
v1.0.0
Added
- new environment variable to allow login from cached sambaNTPassword
LDAP_ALLOWCACHEDLOGINONFAILURE
, default: true
if set to true and the login is failed, the login is retried against the sambaNTPassword, except the error says "wrong credentials".
(useful for unstable internet connection) - this CHANGELOG file
Changed
- README file (more samples, map-folder)
- errors are always logged
- allow multiple bind-user (ex. ldapsearch1|mysecret||searchy2|othersecret)
Fixed
- load existing db on startup-error (ex. unstable internet connection)
Security
- sambaNTPassword can only be accessed from defined LDAP_BINDUSER and on accessing your own entries (userA can only access userA-sambaNTPassword, LDAP_BINDUSER-user can access all sambaNTPasswords)
v0.2.0-beta
wording, naming and case insensitive