[GH-ISSUE #813] [FEATURE REQUEST] Add support for https #292

Open
opened 2026-02-27 08:16:26 +03:00 by kerem · 5 comments
Owner

Originally created by @ykhemani on GitHub (Jan 23, 2024).
Original GitHub issue: https://github.com/lldap/lldap/issues/813

Motivation
Allow secure (https) communication for the web interface to lldap so that communication between the browser and lldap isn't in plaintext.

Describe the solution you'd like

  • Add support for environment variable to add enable https (LLDAP_HTTPS_OPTIONS__ENABLED). Default to false. Set to true to enable https.
  • Add support for environment variable to set https private key file (LLDAP_HTTPS_OPTIONS__KEY_FILE).
  • Add support for environment variable to set https cert file ( LLDAP_HTTPS_OPTIONS__CERT_FILE). Can contain just the certificate or the cert and cert chain.
  • Add support for environment variable to set https CA cert file ( LLDAP_HTTPS_OPTIONS__CA_CERT_FILE). Can contain the CA cert.

Describe alternatives you've considered
You could use a reverse proxy and have it terminate TLS. The connection from the reverse proxy to lldap would still be clear text, of course.

Originally created by @ykhemani on GitHub (Jan 23, 2024). Original GitHub issue: https://github.com/lldap/lldap/issues/813 **Motivation** Allow secure (https) communication for the web interface to lldap so that communication between the browser and lldap isn't in plaintext. **Describe the solution you'd like** * Add support for environment variable to add enable https (LLDAP_HTTPS_OPTIONS__ENABLED). Default to false. Set to true to enable https. * Add support for environment variable to set https private key file (LLDAP_HTTPS_OPTIONS__KEY_FILE). * Add support for environment variable to set https cert file ( LLDAP_HTTPS_OPTIONS__CERT_FILE). Can contain just the certificate or the cert and cert chain. * Add support for environment variable to set https CA cert file ( LLDAP_HTTPS_OPTIONS__CA_CERT_FILE). Can contain the CA cert. **Describe alternatives you've considered** You could use a reverse proxy and have it terminate TLS. The connection from the reverse proxy to lldap would still be clear text, of course.
Author
Owner

@nitnelave commented on GitHub (Jan 23, 2024):

Reverse proxy is the recommended setup. Is there any reason that doesn't work for you?

<!-- gh-comment-id:1906903104 --> @nitnelave commented on GitHub (Jan 23, 2024): Reverse proxy is the recommended setup. Is there any reason that doesn't work for you?
Author
Owner

@ykhemani commented on GitHub (Jan 24, 2024):

Reverse proxy is the recommended setup. Is there any reason that doesn't work for you?

Indeed, it can work. Having this allows you to have end-to-end encryption without another layer.

<!-- gh-comment-id:1908745509 --> @ykhemani commented on GitHub (Jan 24, 2024): > Reverse proxy is the recommended setup. Is there any reason that doesn't work for you? Indeed, it can work. Having this allows you to have end-to-end encryption without another layer.
Author
Owner

@nitnelave commented on GitHub (Jan 24, 2024):

Alright, since we have a working solution, I'm not going to fix it myself. If someone wants to come and implement it, be my guest.

<!-- gh-comment-id:1909007504 --> @nitnelave commented on GitHub (Jan 24, 2024): Alright, since we have a working solution, I'm not going to fix it myself. If someone wants to come and implement it, be my guest.
Author
Owner

@fsdrw08 commented on GitHub (Apr 10, 2024):

Any updates for this request?

<!-- gh-comment-id:2047278928 --> @fsdrw08 commented on GitHub (Apr 10, 2024): Any updates for this request?
Author
Owner

@nitnelave commented on GitHub (Apr 10, 2024):

Any updates for this request?

See the message above: I'm not going to work on that, but I'll accept contributions.

Note that a reverse proxy that provides HTTPS to the external world but HTTP inside the host is often more than enough.

<!-- gh-comment-id:2047283094 --> @nitnelave commented on GitHub (Apr 10, 2024): > Any updates for this request? See the message above: I'm not going to work on that, but I'll accept contributions. Note that a reverse proxy that provides HTTPS to the external world but HTTP inside the host is often more than enough.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/lldap-lldap#292
No description provided.