The sources including the sample files used in this description can be found on GitHub.
The Docker image can be downloaded at Docker Hub.
The authentication proxy works with different LDAP servers like ApacheDS or OpenLDAP. It also works with Active Directory. So a container with a running LDAP server is expected. If you need information about creating a container with a test LDAP server please refer to h3nrik/nginx-ldap.
A running Docker registry container is required. Details about the Docker registry can be found at the official Docker registry project page.
You need a valid SSL certificate. It must be known by a trusted CA! No self-signed ones are allowed. Theoretically you could also use self-signed certificates. Therefore the Docker daemon need to be started with the --insecure-registry command line parameter. But this is not recommended.
If you plan to use an LDAP host that is not represented by a Docker container you might want to have a look at the Docker ambassador pattern.
Assuming your running Docker registry container is named registry and the LDAP container is named ldap. The following steps will add LDAP authentication to your registry.
The SSL certificate files must be copied into a local folder (e.g. /ssl/cert/path). It will be mounted as a volume into the proxy server later. The certificate file must be named docker-registry.crt and the private key file docker-registry.key.
Create an LDAP configuration file named ldap.conf. A sample-ldap.conf file is provided with the image sources. It could look like:
url ldap://ldap/dc=example,dc=com?samaccountname?sub?(objectClass=user); binddn email@example.com; binddn_passwd secretPassword; group_attribute uniquemember; group_attribute_is_dn on; require group 'cn=docker,ou=groups,dc=example,dc=com'; require valid_user; satisfy all;
Create a Docker container for the authentication proxy. The proxy container expects the registry container to be linked with the name docker-registry. The used NGINX web server configuration can be found in the config folder.
docker run --name registry-ldap-auth --link ldap:ldap --link registry:docker-registry -v /ssl/cert/path:/etc/ssl/docker:ro -v `pwd`/sample-ldap.conf:/etc/nginx/ldap.conf:ro -p 443:443 -p 5000:5000 -d felixbuenemann/registry-ldap-auth
This docker image contains compiled binaries for: