mirror of
https://github.com/docker-mailserver/docker-mailserver.git
synced 2025-08-01 08:34:50 +02:00
chore: Adapt ENABLE_LDAP=1
to ACCOUNT_PROVISIONER=LDAP
(#3507)
- Deprecation startup script check is kept for `ENABLE_LDAP=1` but adjusted to emit an error instead. It can be dropped in a future release. Just a precaution for those who mistakenly update (_possibly via automation_) without checking the release notes, an error log is somewhat helpful, although it could alternatively panic? - Docs updated to remove the `ENABLE_LDAP=1` usage - ENV docs updated to reference a maintained LDAP image. - Changelog includes the breaking change, and slight revision to prior release mention of deprecation.
This commit is contained in:
parent
351ef2afa1
commit
9446fa9b9a
6 changed files with 12 additions and 20 deletions
|
@ -34,7 +34,6 @@ Those variables contain the LDAP lookup filters for postfix, using `%s` as the p
|
|||
A really simple `LDAP_QUERY_FILTER` configuration, using only the _user filter_ and allowing only `admin@*` to spoof any sender addresses.
|
||||
|
||||
```yaml
|
||||
- ENABLE_LDAP=1 # with the :edge tag, use ACCOUNT_PROVISIONER
|
||||
- LDAP_START_TLS=yes
|
||||
- ACCOUNT_PROVISIONER=LDAP
|
||||
- LDAP_SERVER_HOST=ldap.example.org
|
||||
|
@ -215,7 +214,6 @@ The changes on the configurations necessary to work with Active Directory (**onl
|
|||
- ENABLE_POSTGREY=1
|
||||
|
||||
# >>> Postfix LDAP Integration
|
||||
- ENABLE_LDAP=1 # with the :edge tag, use ACCOUNT_PROVISIONER
|
||||
- ACCOUNT_PROVISIONER=LDAP
|
||||
- LDAP_SERVER_HOST=ldap.example.org
|
||||
- LDAP_BIND_DN=cn=admin,ou=users,dc=example,dc=org
|
||||
|
@ -284,7 +282,6 @@ The changes on the configurations necessary to work with Active Directory (**onl
|
|||
# <<< SASL Authentication
|
||||
|
||||
# >>> Postfix Ldap Integration
|
||||
- ENABLE_LDAP=1 # with the :edge tag, use ACCOUNT_PROVISIONER
|
||||
- ACCOUNT_PROVISIONER=LDAP
|
||||
- LDAP_SERVER_HOST=<yourLdapContainer/yourLdapServer>
|
||||
- LDAP_SEARCH_BASE=dc=mydomain,dc=loc
|
||||
|
|
|
@ -49,7 +49,7 @@ User provisioning via OIDC is planned for the future, see [this tracking issue](
|
|||
- OIDC => use OIDC authentication (**not yet implemented**)
|
||||
- FILE => use local files (this is used as the default)
|
||||
|
||||
A second container for the ldap service is necessary (e.g. [docker-openldap](https://github.com/osixia/docker-openldap))
|
||||
A second container for the ldap service is necessary (e.g. [`bitnami/openldap`](https://hub.docker.com/r/bitnami/openldap/)).
|
||||
|
||||
##### PERMIT_DOCKER
|
||||
|
||||
|
@ -584,9 +584,7 @@ Enable or disable `getmail`.
|
|||
|
||||
#### LDAP
|
||||
|
||||
##### ENABLE_LDAP
|
||||
|
||||
Deprecated. See [`ACCOUNT_PROVISIONER`](#account_provisioner).
|
||||
|
||||
##### LDAP_START_TLS
|
||||
|
||||
|
|
|
@ -30,7 +30,6 @@ We can create aliases with `./setup.sh`, like this:
|
|||
If you want to send emails from outside the mail server you have to authenticate somehow (with a username and password). One way of doing it is described in [this discussion][github-issue-1247]. However if there are many user accounts, it is better to use authentication with LDAP. The settings for this on `mailserver.env` are:
|
||||
|
||||
```env
|
||||
ENABLE_LDAP=1 # with the :edge tag, use ACCOUNT_PROVISIONER
|
||||
ACCOUNT_PROVISIONER=LDAP
|
||||
LDAP_START_TLS=yes
|
||||
LDAP_SERVER_HOST=ldap.example.org
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue