Public | Automated Build

Last pushed: a year ago
Short Description
Ldap authentication proxy for Nginx
Full Description


Reference implementation of method for authenticating users on behalf of servers proxied by NGINX or NGINX Plus


Note: For ease of reading, this document refers to NGINX Plus, but it also applies to open source NGINX. The prerequisite ngx_http_auth_request_module module is included both in NGINX Plus packages and prebuilt open source NGINX binaries.

The ngx-ldap-auth software is a reference implementation of a method for authenticating users who request protected resources from servers proxied by NGINX Plus. It includes a daemon (ldap-auth) that communicates with an authentication server, and a sample daemon that stands in for an actual back-end server during testing, by generating an authentication cookie based on the user’s credentials. The daemons are written in Python for use with a Lightweight Directory Access Protocol (LDAP) authentication server (OpenLDAP or Microsoft Windows Active Directory 2003 and 2012).

The ldap-auth daemon, which mediates between NGINX Plus and the LDAP server, is intended to serve as a model for "connector" daemons written in other languages, for different authentication systems, or both. NGINX, Inc. Professional Services is available to assist with such adaptations.

For a step-by-step description of the authentication process in the reference implementation, see How Authentication Works in the Reference Implementation in NGINX Plus and NGINX Can Authenticate Application Users.

Installation and Configuration

The NGINX Plus configuration file that is provided with the reference implementation configures all components other than the LDAP server (that is, NGINX Plus, the client, the ldap-auth daemon, and the back-end daemon) to run on the same host, which is adequate for testing purposes. The LDAP server can also run on that host during testing.

In an actual deployment, the back-end application and authentication server typically each run on a separate host, with NGINX Plus on a third host. The ldap-auth daemon does not consume many resources in most situations, so it can run on the NGINX Plus host or another host of your choice.

To install and configure the reference implementation, perform the following steps.

  1. Create a clone of the GitHub repository (nginx-ldap-auth).

  2. If NGINX Plus is not already running, install it according to the instructions for your operating system.

  3. If an LDAP authentication server is not already running, install and configure one. By default the ldap-auth daemon communicates with OpenLDAP, but can be configured to work with Active Directory.

    If you are using the LDAP server only to test the reference implementation, you can use the OpenLDAP server Docker image that is available on GitHub, or you can set up a server in a virtual environment using instructions such as How To Install and Configure a Basic LDAP Server on an Ubuntu 12.04 VPS.

  4. On the host where the ldap-auth daemon is to run, install the following additional software. We recommend using the versions that are distributed with the operating system, instead of downloading the software from an open source repository.

    • Python version 2. Version 3 is not supported.
    • The Python LDAP module, python-ldap (created by the open source project).
  5. Copy the following files from your repository clone to the indicated hosts:

    • nginx-ldap-auth.conf – NGINX Plus configuration file, which contains the minimal set of directives for testing the reference implementation. Install on the NGINX Plus host (in the /etc/nginx/conf.d directory if using the conventional configuration scheme). To avoid configuration conflicts, remember to move or rename any default configuration files installed with NGINX Plus.
    • – Python code for the ldap-auth daemon. Install on the host of your choice.
    • – Sample shell script for starting and stopping the daemon. Install on the same host as the ldap-auth daemon.
    • – Python code for the daemon that during testing stands in for a real back-end application server. Install on the host of your choice.
  6. Modify the NGINX Plus configuration file as described in Required Modifications to the NGINX Plus Configuration File below. For information about customizing your deployment, see Customization below. We recommend running the nginx -t command after making your changes to verify that the file is syntactically valid.

  7. Start NGINX Plus. If it is already running, run the following command to reload the configuration file:

    <pre>root# <strong>nginx -s reload</strong></pre>

  8. Run the following commands to start the ldap-auth daemon and the back-end daemon.

    <pre>root# <strong> start</strong>
    root# <strong>python</strong></pre>

  9. To test the reference implementation, use a web browser to access http://*nginx-server-address*:8081. Verify that the browser presents a login form. After you fill out the form and submit it, verify that the server returns the expected response to valid credentials. The sample back-end daemon returns this:

    <pre>Hello, world! Requested URL: <em>URL</em></pre>

<a name="docker">

Run as Docker container

Another option to run authentication daemon is Docker

  1. Install and run Docker daemon

  2. Run following commands to start the ldap-auth daemon in Docker container

    <pre># <strong>docker build -t nginx-ldap-auth .</strong>
    # <strong>docker run --name=nginx-ldap-auth --restart=always -d -p 8888:8888 nginx-ldap-auth</strong></pre>

  3. Modify the NGINX Plus configuration file as described in Required Modifications to the NGINX Plus Configuration File below.

<a name="required-mods">

Required Modifications to the NGINX Plus Configuration File


Modify the nginx-ldap-auth.conf file, by changing values as appropriate for your deployment for the terms shown in bold font in the following configuration.

For detailed instructions, see Configuring the Reference Implementation in the NGINX Plus and NGINX Can Authenticate Application Users blog post. The nginx-ldap-auth.conf file includes detailed instructions (in comments not shown here) for setting the proxy-set-header directives; for information about other directives, see the NGINX reference documentation.

<pre>http {
proxy_cache_path <strong>cache/</strong> keys_zone=<strong>auth_cache</strong>:<strong>10m</strong>;

upstream backend {
server <strong></strong>:9000;

server {
listen <strong></strong>:8081;

location = /auth-proxy {
proxy_pass http://<strong></strong>:8888;
proxy_cache <strong>auth_cache</strong>; # Must match the name in the proxy_cache_path directive above
proxy_cache_valid 200 403 <strong>10m</strong>;

# URL and port for connecting to the LDAP server
proxy_set_header X-Ldap-URL "<strong>ldaps</strong>://<strong></strong>:<strong>636</strong>";

# Base DN
proxy_set_header X-Ldap-BaseDN "<strong>cn=Users,dc=test,dc=local</strong>";

# Bind DN
proxy_set_header X-Ldap-BindDN "<strong>cn=root,dc=test,dc=local</strong>";

# Bind password
proxy_set_header X-Ldap-BindPass "<strong>secret</strong>";

If the authentication server runs Active Directory rather than OpenLDAP, uncomment the following directive as shown:

proxy_set_header X-Ldap-Template "(SAMAccountName=%(username)s)";

The reference implementation uses cookie-based authentication. If you are using HTTP basic authentication instead, comment out the following directives as shown:

<pre><strong>#</strong>proxy_set_header X-CookieName "nginxauth";
<strong>#</strong>proxy_set_header Cookie nginxauth=$cookie_nginxauth;</pre>



The nginx-ldap-auth.conf file enables caching of both data and credentials. To disable caching, comment out the four proxy_cache* directives as shown:

<pre>http {
<strong>#</strong>proxy_cache_path cache/ keys_zone=auth_cache:10m;
server {
location = /auth-proxy {
<strong>#</strong>proxy_cache auth_cache;
# note that cookie is added to cache key
<strong>#</strong>proxy_cache_key "$http_authorization$cookie_nginxauth";
<strong>#</strong>proxy_cache_valid 200 403 10m;

Optional LDAP Parameters

If you want to change the value for the template parameter that the ldap-auth daemon passes to the OpenLDAP server by default, uncomment the following directive as shown, and change the value:

<pre>proxy_set_header X-Ldap-Template "<strong>(cn=%(username)s)</strong>";</pre>

If you want to change the realm name from the default value (Restricted), uncomment and change the following directive:

<pre>proxy_set_header X-Ldap-Realm "<strong>Restricted</strong>";</pre>

Authentication Server

To modify the ldap-auth daemon to communicate with a different (non-LDAP) type of authentication server, write a new authentication-handler class to replace LDAPAuthHandler in the script.


The auth daemon was tested against default configurations of the following LDAP servers:

  • OpenLDAP</li>
  • Microsoft Windows Server Active Directory 2003</li>
  • Microsoft Windows Server Active Directory 2012</li>


The back-end daemon uses Base64 encoding on the username and password in the cookie. Base64 is a very weak form of scrambling, rendering the credentials vulnerable to extraction and misuse. We strongly recommend using a more sophisticated algorithm in your actual back-end application.


The reference implementation is subject to the same 2-clause BSD license as the open source NGINX software.

Docker Pull Command
Source Repository

Comments (0)