-
Updated
Jun 12, 2020 - Java
ldap-authentication
Here are 158 public repositories matching this topic...
-
Updated
May 10, 2020 - Java
-
Updated
May 20, 2020 - Python
Bug description
Unable to restrict access to users that are a member of specific groups in LDAP authenticated through Jupyterhub
Expected behaviour
Restricted access to members of the group specified in basedn
Actual behaviour
ldap users other than group members are able to access
How to reproduce
I am able to reproduce the issue at my end with the below steps.
1
If user tries to modify permissions of a group he does not have permission to modify, it gives error message " [object Object]" which is not very informational. Instead the message should be something like "You don't have permission to modify this group. Only members of group can modify this group".
Below is a screenshot of the current error.
 on
src/index.js
(+2 lines) and upd
-
Updated
Dec 28, 2019 - JavaScript
-
Updated
Jul 16, 2019 - HTML
-
Updated
May 21, 2020 - Swift
-
Updated
May 18, 2016
-
Updated
Oct 16, 2017 - C#
hardcoded NFS IP's
I thought I'd be able to just clone and make run
as the docs say - but it looks like (I've only just begun to dig) the nfs container (and jupyterhub-network
) don't have the IP addresses you've put in .env
- and so the hub container can't start.
Sadly, Docker Swarm's error reporting is about as unhelpful as possible - the only state info I can derive, is from
dow184@TOWER-SL:~/src/
-
Updated
May 19, 2020 - JavaScript
-
Updated
Jun 9, 2020 - Dockerfile
-
Updated
Jul 18, 2017 - Go
-
Updated
May 5, 2020 - PHP
-
Updated
Sep 7, 2018
-
Updated
May 5, 2020 - PHP
-
Updated
May 18, 2020 - JavaScript
-
Updated
Apr 8, 2020 - Python
Improve this page
Add a description, image, and links to the ldap-authentication topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ldap-authentication topic, visit your repo's landing page and select "manage topics."
Hi,
This is a request feature to use the OPA Agent instead of assertion parts of EAS.
With this we can use a common DSL language (rego) to create policies for authz.