Important: This documentation covers Yarn 1 (Classic).
For Yarn 2+ docs and migration guide, see yarnpkg.com.

Package detail

passport-ldapauth

vesse148kMIT3.0.1TypeScript support: included

LDAP authentication strategy for Passport

ldap, passport, authentication, ldapauth

readme

passport-ldapauth

Build Status npm Sponsored by Wakeone

Passport authentication strategy against LDAP / AD server. This module is a Passport strategy wrapper for ldapauth-fork.

This module lets you authenticate using LDAP or AD in your Node.js applications. By plugging into Passport, LDAP authentication can be integrated into any framework that supports Connect-style middleware.

Install

npm install passport-ldapauth

Usage

Configure strategy

var LdapStrategy = require('passport-ldapauth');

passport.use(new LdapStrategy({
    server: {
      url: 'ldap://localhost:389',
      ...
    }
  }));
  • server: LDAP settings. These are passed directly to ldapauth-fork. See its documentation for all available options.
    • url: e.g. ldap://localhost:389
    • bindDN: e.g. cn='root'
    • bindCredentials: Password for bindDN
    • searchBase: e.g. o=users,o=example.com
    • searchFilter: LDAP search filter, e.g. (uid={{username}}). Use literal {{username}} to have the given username used in the search.
    • searchAttributes: Optional array of attributes to fetch from LDAP server, e.g. ['displayName', 'mail']. Defaults to undefined, i.e. fetch all attributes
    • tlsOptions: Optional object with options accepted by Node.js tls module.
  • usernameField: Field name where the username is found, defaults to username
  • passwordField: Field name where the password is found, defaults to password
  • credentialsLookup: Optional, synchronous function that provides the login credentials from req. See below for more.
  • missingCredentialsStatus: Returned HTTP status code when credentials could not be found in the request. Defaults to 400
  • handleErrorsAsFailures: When true, unknown errors and ldapjs emitted errors are handled as authentication failures instead of errors (default: false).
  • failureErrorCallback: Optional, synchronous function that is called with the received error when handleErrorsAsFailures is enabled.
  • passReqToCallback: When true, req is the first argument to the verify callback (default: false):

      passport.use(new LdapStrategy(..., function(req, user, done) {
          ...
          done(null, user);
        }
      ));

Note: you can pass a function instead of an object as options, see the example below

Authenticate requests

Use passport.authenticate(), specifying the 'ldapauth' strategy, to authenticate requests.

authenticate() options

In addition to default authentication options the following flash message options are available for passport.authenticate():

  • badRequestMessage: missing username/password (default: 'Missing credentials')
  • invalidCredentials: InvalidCredentialsError and /no such user/i LDAP errors (default: 'Invalid username/password')
  • noSuchObject: NoSuchObjectError LDAP errors (default: 'Bad search base')
  • userNotFound: LDAP returns no error but also no user (default: 'Invalid username/password')
  • constraintViolation: user account is locked (default: 'Exceeded password retry limit, account locked')

And for Microsoft AD messages, these flash message options can also be used (used instead of invalidCredentials if matching error code is found):

  • invalidLogonHours: not being allowed to login at this current time (default: 'Not Permitted to login at this time')
  • invalidWorkstation: not being allowed to login from this current location (default: 'Not permited to logon at this workstation')
  • passwordExpired: expired password (default: 'Password expired')
  • accountDisabled: disabled account (default: 'Account disabled')
  • accountExpired: expired account (default: 'Account expired')
  • passwordMustChange: password change (default: 'User must reset password')
  • accountLockedOut: locked out account (default: 'User account locked')

Express example

var express      = require('express'),
    passport     = require('passport'),
    bodyParser   = require('body-parser'),
    LdapStrategy = require('passport-ldapauth');

var OPTS = {
  server: {
    url: 'ldap://localhost:389',
    bindDN: 'cn=root',
    bindCredentials: 'secret',
    searchBase: 'ou=passport-ldapauth',
    searchFilter: '(uid={{username}})'
  }
};

var app = express();

passport.use(new LdapStrategy(OPTS));

app.use(bodyParser.json());
app.use(bodyParser.urlencoded({extended: false}));
app.use(passport.initialize());

app.post('/login', passport.authenticate('ldapauth', {session: false}), function(req, res) {
  res.send({status: 'ok'});
});

app.listen(8080);

Active Directory over SSL example

Simple example config for connecting over ldaps:// to a server requiring some internal CA certificate (often the case in corporations using Windows AD).

var fs = require('fs');

var opts = {
  server: {
    url: 'ldaps://ad.corporate.com:636',
    bindDN: 'cn=non-person,ou=system,dc=corp,dc=corporate,dc=com',
    bindCredentials: 'secret',
    searchBase: 'dc=corp,dc=corporate,dc=com',
    searchFilter: '(&(objectcategory=person)(objectclass=user)(|(samaccountname={{username}})(mail={{username}})))',
    searchAttributes: ['displayName', 'mail'],
    tlsOptions: {
      ca: [
        fs.readFileSync('/path/to/root_ca_cert.crt')
      ]
    }
  }
};
...

credentialsLookup

A synchronous function that receives the req object and returns an objec with keys username and password (or name and pass) can be provided. Note, that when this is provided the default lookup is not performed. This can be used to eg. enable basic auth header support:

var basicAuth = require('basic-auth');
var ldapOpts = {
  server: { ... },
  credentialsLookup: basicAuth
}

Asynchronous configuration retrieval

Instead of providing a static configuration object, you can pass a function as options that will take care of fetching the configuration. It will be called with the req object and a callback function having the standard (err, result) signature. Notice that the provided function will be called on every authenticate request.

var getLDAPConfiguration = function(req, callback) {
  // Fetching things from database or whatever
  process.nextTick(function() {
    var opts = {
      server: {
        url: 'ldap://localhost:389',
        bindDN: 'cn=root',
        bindCredentials: 'secret',
        searchBase: 'ou=passport-ldapauth',
        searchFilter: '(uid={{username}})'
      }
    };

    callback(null, opts);
  });
};

var LdapStrategy = require('passport-ldapauth');

passport.use(new LdapStrategy(getLDAPConfiguration,
  function(user, done) {
    ...
    return done(null, user);
  }
));

ldapsearch

ldapsearch is a great command line tool for testing your config. The user search query performed in the Express example above when user logging in has uid john is the same as the following ldapsearch call:

ldapsearch \
  -H ldap://localhost:389 \
  -x \
  -D cn=root \
  -w secret \
  -b ou=passport-ldapauth \
  "(uid=john)"

If the query does not return expected user the configuration is likely incorrect.

License

MIT

passport-ldapauth has been partially sponsored by Wakeone Ltd.

changelog

Changes

  • v3.0.0
    • Update ldapauth-fork to v5 which upgrade ldapjs to v2
  • v2.1.4
    • Allow any version of @types/node
  • v2.1.3
    • #86 Allow configuring missing credentials response status.
  • v2.1.2
    • #80 Run error handler only once since the a new LdapAuth instance is created for every authenticate request.
  • v2.1.1
    • Bump deps
  • v2.1.0
    • #77 Add noSuchObject error message
  • v2.0.0
    • ldapauth-fork major version update now uses Bunyan logger
    • Added TypeScript type definitions
  • v1.0.0
    • ldapauth-fork is now an event emitter. Emitted errors will cause authentication error.
    • #38 Added option to handle erros as failures with handleErrorsAsFailures. Additionally a synchronous failureErrorCallback function that receives the error as argument can be provided.
  • v0.6.0
    • Added option credentialsLookup that can be used eg. to add Basic Auth header parsing support.
  • v0.5.0
    • Updated deps. ldapauth-fork update changes bind credentials handling to work better with falsy values needed in anonymous bind.
  • v0.4.0
    • Updated ldapauth-fork which updates ldapjs to 1.0.0
  • v0.3.1
    • #35 - Show more specific error messages from Microsoft AD login errors if identified.
  • v0.3.0
    • #10 - Add support for fetching groups. While this is really coming from ldapauth-fork, updated the minor version of this library as well to draw attention to new features.
  • v0.2.6
    • #24 - Pass req to options function, enables request specific LDAP configuration.
  • v0.2.5
    • #21 - Handle constraintViolationError as a login failure instead of an error.
  • v0.2.4
  • v0.2.3
    • Documentation using the same keys as ldapjs (bindDn and bindCredentials)
  • v0.2.2
    • Allow configuring flash messages when calling passport.authenticate()
    • Return HTTP 400 when username or password is missing
  • v0.2.1
    • Passport as peerDependency, prevents version incompatibility
  • v0.2.0
    • #8 - Possibility to provide a callback function instead of options object to constructor (contributed by Linagora)
    • Update Passport dependency to 0.2.0
    • Get rid of var self = this;
  • v0.1.2
    • #6 - Handle NoSuchObjectError as login failure.
  • v0.1.1
    • Documentation changes due to renaming git repository of ldapauth-fork
  • v0.1.0
    • Use ldapauth-fork instead of ldapauth
      • ldapjs upgraded to 0.6.3
      • New options including tlsOptions
    • Refactored tests
  • v0.0.6 (14 July 2013)
    • Fixes #1
    • Updated devDependencies
  • v0.0.5 (16 April 2013)
    • Create LDAP client on every request to prevent socket being closed due to inactivity.
  • v0.0.4 (14 April 2013)
    • Fixed passport-ldapauth version range.
  • v0.0.3 (14 April 2013)
    • Initial release.