Cloudron external ldaps with OpenCTI
-
I successfully integrated my OpenCTI threat intel platform instance with my cloudron ldaps.
If anyone is doing a similar project, dm me if you need assistance. -
I successfully integrated my OpenCTI threat intel platform instance with my cloudron ldaps.
If anyone is doing a similar project, dm me if you need assistance.@Mastadamus why not like this:
Write the tutorial here?
You don't have all time for people to ask you question.
There are different time zones in this world, are you willing to help out at night?I would love to see a tutorial on this topic instead of running after people to get some help.
Also if the tutorial is good it can be added to the docs. -
@Mastadamus why not like this:
Write the tutorial here?
You don't have all time for people to ask you question.
There are different time zones in this world, are you willing to help out at night?I would love to see a tutorial on this topic instead of running after people to get some help.
Also if the tutorial is good it can be added to the docs.@BrutalBirdie I am working on it now and when I get done I will post it.
-
@BrutalBirdie I am working on it now and when I get done I will post it.
@Mastadamus
Uhhh nice.
Thank you very much!
-
I haven't had a chance to finish the overall guide for the cloudron specific part but I completed a guide for installing OpenCTI with Traefik, Elasticsearch, and lots of plugins. I also have a complete docker-compose for OpenCTI, Elasticsearch cluster with X-Pack security, and multiple plugins as well as LDAP integration. you can find it here
OpenCTI install guide
https://dev.azure.com/Mastadamus/OpenCTI/_wiki/wikis/OpenCTI.wiki/3/OpenCTI-with-Traefik-Reverse-ProxyOpenCTI GIT that contains my templates
https://dev.azure.com/Mastadamus/_git/OpenCTIIf you just want to skip to how you integrate LDAP with OpenCTI docker-compose I will paste examples below
- PROVIDERS__LDAP__STRATEGY=LdapStrategy - PROVIDERS__LDAP__CONFIG__URL=ldaps://Your.Domain.Name:636 - PROVIDERS__LDAP__CONFIG__BIND_DN={{`cn=admin,ou=system,dc=YourLDAPserverName`}} - PROVIDERS__LDAP__CONFIG__BIND_CREDENTIALS=XXXXXXXXXX - PROVIDERS__LDAP__CONFIG__SEARCH_BASE={{`ou=users,dc=YourLDAPserverName`}} - PROVIDERS__LDAP__CONFIG__SEARCH_FILTER={{`(cn={{username}})`}} - PROVIDERS__LDAP__CONFIG__MAIL_ATTRIBUTE=mail - PROVIDERS__LDAP__CONFIG__ACCOUNT_ATTRIBUTE=givenName - PROVIDERS__LDAP__CONFIG__ALLOW_SELF_SIGNED=true - PROVIDERS__LOCAL__STRATEGY=LocalStrategy
Hello! It looks like you're interested in this conversation, but you don't have an account yet.
Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.
With your input, this post could be even better 💗
Register Login