mirror of
https://github.com/goharbor/harbor.git
synced 2024-11-18 08:15:16 +01:00
26905baca2
* Updated doc to include Limited Guest * Added example for limited guest. * Updated vulnerability scanning docs for 1.10. * Updated GC docs to reflect new position in UI * Updated project quota doc to reflect new position in UI * Added some doc about tag immutability * Fixed index * Formatting * Added new replication endpoints * Added project quota webhook * Review comments from Alex * Clarified Clair requirement for additional scanners * Some formatting and edits in vulnerability section * Updated tag retention doc to reflect new UI * Updated tag immutability to reflect new UI * New screencaps * Updated robot accounts doc for new UI and rewrote * Formatting * Updated webhooks doc for new UI * Formatting * Updated Logs doc for new UI * Formatting * New screencaps * Added tag immutability to permissions document * Corrected immutability permissions * Added explanation for project quotas * Fixed typo * Linked to new compatibility list document * Comments from Alex * Comments from Steven and Wang * Removed mention of the ellipsis in project menu * Reverting some screencaps to remove ellipsis * Reverted log screencaps to remove ellipsis * Minor rewording * Fixed caps * More cap fixing * Added info about self-registration, rewrote db auth doc * Attempting to document *.asc key * Added that negligible vulnerabilities are ignored, rewrote * Formatting * Added scanner permissions to table * Clarified labelling and replication * Rewrote replication docs * Formatting * Typo * Rearranged content * Updated ASC key docs * formatting * Minor rewording * Rewrote LDAP section * minor edits * Added OIDC groups, rewrote OIDC docs * formatting * Mentioned memberof for OIDC. * Comments from steven * Added info about insecure registries * Added tag immutability example * Removed UAA from install guide * Cleaned up headers * More clean up of headers * Recommended not to use UAA * Added user-generated CLI secret * Adding stray screencap
633 B
633 B
Introduction
You can import an LDAP/AD group to Harbor and assign project roles to it. All LDAP/AD users in this LDAP/AD group have assigned roles.
NOTE: Information about how to configure LDAP Groups in the Harbor interface has migrated to the Harbor User Guide.
To configure LDAP parameters via the API, see Configure Harbor User Settings from the Command Line
For example:
curl -X PUT -u "<username>:<password>" -H "Content-Type: application/json" -ki https://harbor.sample.domain/api/configurations -d'{"ldap_group_basedn":"ou=groups,dc=example,dc=com"}'