mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #727] [FEATURE] Allow logging in with email instead of username #262
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#262
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Cherryblue on GitHub (Nov 1, 2023).
Original GitHub issue: https://github.com/lldap/lldap/issues/727
Originally assigned to: @Copilot on GitHub.
Steps to reproduce :
If email is defined, and is already used for creating the email token, why not allow its use to connect ?
We should expect having the same behavior for connection form and forgotten your password form.
Or at least, signaling to the user that using an email address for login is not accepted.
@thielj commented on GitHub (Sep 4, 2025):
This is normally implemented on the LDAP client side, by searching both the username and the email. Authelia for example uses these defaults for LLDAP: "(&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))"
github.com/authelia/authelia@6601a20748/internal/configuration/schema/authentication.go (L350)@nitnelave commented on GitHub (Sep 4, 2025):
@thielj I think @Cherryblue means in LLDAP's web UI, not through LDAP.
@nitnelave commented on GitHub (Sep 4, 2025):
We need to modify the backend, when receiving a login request, try to interpret it as a username and fallback to an email if there are no matches.