Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings
This repository was archived by the owner on Aug 23, 2025. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions 12 docs/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -96,6 +96,18 @@ SAML-based authentication can be enabled by setting the necessary environment va

SQLPad users do not need to be added ahead of time, and may be created on the fly using `samlAutoSignUp`. Whenever a new user is detected (unable to match to existing user email), a user record will be added to SQLPad's user table and a user signed in. By default users are not auto-created and must otherwise be added ahead of time.

## LDAP (Experimental)

LDAP-based authentication can be enabled by setting the necessary environment variables:

- `ENABLE_LDAP_AUTH`
- `LDAP_URL`
- `LDAP_BASE_DN`
- `LDAP_USERNAME`
- `LDAP_PASSWORD`

Users sign in to LDAP using a username (and not an e-mail address).

## Allowed Domains for User Administration

An entire domain can be allowed for username administration by setting enviornment variable `SQLPAD_ALLOWED_DOMAINS`. This may be particularly useful in combination with OAuth.
35 changes: 35 additions & 0 deletions 35 docs/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -425,3 +425,38 @@ When supplying both `id` and `email`, `id` will be used for user matching instea

- Key: `authProxyHeaders`
- Env: `SQLPAD_AUTH_PROXY_HEADERS`

## enableLdapAuth

Set to `true` to enable LDAP authentication

- Key: `enableLdapAuth`
- Env: `ENABLE_LDAP_AUTH`

## ldapUrl

LDAP server URL. Examples: `ldap://localhost:389`, `ldaps://ad.corporate.com:636`

- Key: `ldapUrl`
- Env: `LDAP_URL`

## ldapBaseDN

LDAP Base DN

- Key: `ldapBaseDN`
- Env: `LDAP_BASE_DN`

## ldapUsername

Username for LDAP lookup

- Key: `ldapUsername`
- Env: `LDAP_USERNAME`

## ldapPassword

Password for LDAP user used for LDAP lookup

- Key: `ldapPassword`
- Env: `LDAP_PASSWORD`
Morty Proxy This is a proxified and sanitized view of the page, visit original site.