[IMPORTANT] Please note that this site will be disabled on October 31. In it's place, the new JumpCloud Help Center is live! Check it out here!

Support Center

Configuring Docker Registry to use JumpCloud's LDAP-as-a-Service

Prerequisites:
See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.
 


Authentication Method:


Authentication Method: LDAP

 

LDAP Configuration Options:


Admin Password: (Specify a password that the account 'admin' may login locally without LDAP authentication)
LDAP Server URL: ldap.jumpcloud.com
Use StartTLS: (Check to enable StartTLS encryption)
User Base DN: ou=Users,o=<your-organization-id>,dc=jumpcloud,dc=com
User Login Attribute: uid
Search User DN: uid=<ldap-binding-user>,ou=Users,o=<your-organization-id>,dc=jumpcloud,dc=com
Search User Password: <ldap-binding-user's-password>
LDAP Sync Interval: (The time interval between LDAP syncs in the format of #h#m#s.  Configure for no shorter than 0h5m0s)



 

User Search Filter: (objectclass=inetOrgPerson)


 

Admin LDAP Group Details:


With the configuration you also have the ability to grant permission for global Trusted Registry admins via membership in LDAP groups. To leverage LDAP Groups, see Creating LDAP Groups

Admin LDAP DN: cn=GROUP_NAME,ou=Users,o=YOUR_ORG_ID,dc=jumpcloud,dc=com
Admin Group Member Attribute: member



 
 

Last Updated: Jan 29, 2018 11:16AM MST

Related Articles
desk-forwarding@jumpcloud.com
http://assets2.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete