Welcome, guest | Sign In | My Account | Store | Cart

Notice! PyPM is being replaced with the ActiveState Platform, which enhances PyPM’s build and deploy capabilities. Create your free Platform account to download ActivePython or customize Python with the packages you require and get automatic updates.

Download
ActivePython
INSTALL>
pypm install django-auth-ldap

How to install django-auth-ldap

  1. Download and install ActivePython
  2. Open Command Prompt
  3. Type pypm install django-auth-ldap
 Python 2.7Python 3.2Python 3.3
Windows (32-bit)
1.1
1.1.4Never BuiltWhy not?
1.1 Available View build log
1.0.17 Available View build log
1.0.15 Available View build log
1.0.14 Available View build log
1.0.13 Available View build log
1.0.12 Available View build log
1.0.11 Available View build log
1.0.10 Available View build log
1.0.9 Available View build log
1.0.8 Available View build log
1.0.7 Available View build log
1.0.6 Available View build log
Windows (64-bit)
1.1
1.1.4Never BuiltWhy not?
1.1 Available View build log
1.0.17 Available View build log
1.0.15 Available View build log
1.0.14 Available View build log
1.0.13 Available View build log
1.0.12 Available View build log
1.0.11 Available View build log
1.0.10 Available View build log
1.0.9 Available View build log
1.0.8 Available View build log
1.0.7 Available View build log
1.0.6 Available View build log
Mac OS X (10.5+)
1.1
1.1.4Never BuiltWhy not?
1.1 Available View build log
1.0.17 Available View build log
1.0.15 Available View build log
1.0.14 Available View build log
1.0.13 Available View build log
1.0.12 Available View build log
1.0.11 Available View build log
1.0.10 Available View build log
1.0.9 Available View build log
1.0.8 Available View build log
1.0.7 Available View build log
1.0.6 Available View build log
Linux (32-bit)
1.1.2
1.1.4Never BuiltWhy not?
1.1.2 Available View build log
1.1 Available View build log
1.0.17 Available View build log
1.0.15 Available View build log
1.0.14 Available View build log
1.0.13 Available View build log
1.0.12 Available View build log
1.0.11 Available View build log
1.0.10 Available View build log
1.0.9 Available View build log
1.0.8 Available View build log
1.0.7 Available View build log
1.0.6 Available View build log
Linux (64-bit)
1.1.4 Available View build log
1.1.2 Available View build log
1.1 Available View build log
1.0.17 Available View build log
1.0.15 Available View build log
1.0.14 Available View build log
1.0.13 Available View build log
1.0.12 Available View build log
1.0.11 Available View build log
1.0.10 Available View build log
1.0.9 Available View build log
1.0.8 Available View build log
1.0.7 Available View build log
1.0.6 Available View build log
 
License
BSD
Lastest release
version 1.1.4 on Jan 9th, 2014

This is a Django authentication backend that authenticates against an LDAP service. Configuration can be as simple as a single distinguished name template, but there are many rich configuration options for working with users, groups, and permissions.

This version is officially supported on Python >= 2.5, Django >= 1.3, and python-ldap >= 2.0. It is known to work on earlier versions (especially of Django) and backwards-compatibility is not broken needlessly, however users of older dependencies are urged to test their deployments carefully and be wary of updates.

Full documentation can be found at http://pythonhosted.org/django-auth-ldap/; following is an example configuration, just to whet your appetite:

import ldap
from django_auth_ldap.config import LDAPSearch, GroupOfNamesType


# Baseline configuration.
AUTH_LDAP_SERVER_URI = "ldap://ldap.example.com"

AUTH_LDAP_BIND_DN = "cn=django-agent,dc=example,dc=com"
AUTH_LDAP_BIND_PASSWORD = "phlebotinum"
AUTH_LDAP_USER_SEARCH = LDAPSearch("ou=users,dc=example,dc=com",
    ldap.SCOPE_SUBTREE, "(uid=%(user)s)")
# or perhaps:
# AUTH_LDAP_USER_DN_TEMPLATE = "uid=%(user)s,ou=users,dc=example,dc=com"

# Set up the basic group parameters.
AUTH_LDAP_GROUP_SEARCH = LDAPSearch("ou=django,ou=groups,dc=example,dc=com",
    ldap.SCOPE_SUBTREE, "(objectClass=groupOfNames)"
)
AUTH_LDAP_GROUP_TYPE = GroupOfNamesType()

# Simple group restrictions
AUTH_LDAP_REQUIRE_GROUP = "cn=enabled,ou=django,ou=groups,dc=example,dc=com"
AUTH_LDAP_DENY_GROUP = "cn=disabled,ou=django,ou=groups,dc=example,dc=com"

# Populate the Django user from the LDAP directory.
AUTH_LDAP_USER_ATTR_MAP = {
    "first_name": "givenName",
    "last_name": "sn",
    "email": "mail"
}

AUTH_LDAP_PROFILE_ATTR_MAP = {
    "employee_number": "employeeNumber"
}

AUTH_LDAP_USER_FLAGS_BY_GROUP = {
    "is_active": "cn=active,ou=django,ou=groups,dc=example,dc=com",
    "is_staff": "cn=staff,ou=django,ou=groups,dc=example,dc=com",
    "is_superuser": "cn=superuser,ou=django,ou=groups,dc=example,dc=com"
}

AUTH_LDAP_PROFILE_FLAGS_BY_GROUP = {
    "is_awesome": "cn=awesome,ou=django,ou=groups,dc=example,dc=com",
}

# Use LDAP group membership to calculate group permissions.
AUTH_LDAP_FIND_GROUP_PERMS = True

# Cache group memberships for an hour to minimize LDAP traffic
AUTH_LDAP_CACHE_GROUPS = True
AUTH_LDAP_GROUP_CACHE_TIMEOUT = 3600


# Keep ModelBackend around for per-user permissions and maybe a local
# superuser.
AUTHENTICATION_BACKENDS = (
    'django_auth_ldap.backend.LDAPBackend',
    'django.contrib.auth.backends.ModelBackend',
)

Subscribe to package updates

Last updated Jan 9th, 2014

Download Stats

Last month:12

What does the lock icon mean?

Builds marked with a lock icon are only available via PyPM to users with a current ActivePython Business Edition subscription.

Need custom builds or support?

ActivePython Enterprise Edition guarantees priority access to technical support, indemnification, expert consulting and quality-assured language builds.

Plan on re-distributing ActivePython?

Get re-distribution rights and eliminate legal risks with ActivePython OEM Edition.