Hazelcast supports authentication and authorization against Lightweight Directory Access Protocol (LDAP) servers. You can use Operator to configure Management Center to use an LDAP server.
For more information about using LDAP in the Management Center, see the Management Center documentation.
Set up the LDAP security provider
You can configure either LDAP or LDAP over TLS (or LDAPS).
For LDAP, configure the securityProvider.ldap section in the Management Center CR.
For LDAP over TLS:
-
Create a secret that contains the certificate and key. Operator will set up a TrustStore and KeyStore automatically.
-
Configure the
securityProvider.ldap.tlssection in the Management Center CR.
Use the following fields to configure the LDAP security provider:
| Field | Description |
|---|---|
|
URL of your LDAP server, including schema (ldap://) and port. |
|
Configuration for TLS:
|
|
Name of the secret that contains |
|
DN to be used for searching users. |
|
DN to be used for searching groups. |
|
Members of these groups and nested groups have administrator privileges on Management Center. |
|
Members of these groups and nested groups have read and write privileges on Management Center. |
|
Members of these groups and nested groups have read only access to Management Center. |
|
Members of these groups and nested groups have access to view metrics only on Management Center. |
|
LDAP search filter expression for users. |
|
LDAP search filter expression for groups. |
Example Management Center LDAP configuration
The following example shows how to create a Secret for the LDAP credentials:
kubectl create secret generic ldap-credentials --from-literal=username="cn=admin,dc=example,dc=org" --from-literal=password="adminpassword"
kubectl get secret ldap-credentials -o=yaml
apiVersion: v1
data:
password: YWRtaW5wYXNzd29yZA==
username: Y249YWRtaW4sZGM9ZXhhbXBsZSxkYz1vcmc=
kind: Secret
metadata:
creationTimestamp: "2023-10-11T10:51:37Z"
name: ldap-credentials
namespace: default
resourceVersion: "59391"
uid: 299e5d42-4c72-4877-9a99-c6ffa3c68d07
type: Opaque
The following example shows how to create a secret for LDAP over TLS:
kubectl create secret tls mc-ldap-secret --cert=ca.crt --key=ca.keykgp
The following is an example configuration for the LDAP security provider:
apiVersion: hazelcast.com/v1alpha1
kind: ManagementCenter
metadata:
name: managementcenter
spec:
repository: "hazelcast/management-center"
licenseKeySecretName: hazelcast-license-key
securityProvider:
ldap:
credentialsSecretName: ldap-credentials
groupDN: ou=groups,dc=example,dc=org
groupSearchFilter: member={0}
nestedGroupSearch: false
url: ldap://ldap-server-url:1389
userDN: ou=groups,dc=example,dc=org
userGroups:
- users
metricsOnlyGroups:
- metrics
adminGroups:
- admins
readonlyUserGroups:
- readers
userSearchFilter: cn={0}
The following is an example configuration for the LDAP over TLS security provider:
apiVersion: hazelcast.com/v1alpha1
kind: ManagementCenter
metadata:
name: managementcenter
spec:
repository: 'hazelcast/management-center'
licenseKeySecretName: hazelcast-license-key
securityProvider:
ldap:
tls:
secretName: mc-ldap-secret
startTLS: true
credentialsSecretName: ldap-credentials
groupDN: ou=users,dc=example,dc=org
groupSearchFilter: member={0}
nestedGroupSearch: false
url: ldap://198.51.100.200:1389
userDN: ou=users,dc=example,dc=org
userGroups:
- readers
metricsOnlyGroups:
- readers
adminGroups:
- readers
readonlyUserGroups:
- readers
userSearchFilter: cn={0}