LDAP (Install-Time Configuration)
What's planned
When Phase 4 ships, the install script will accept LDAP parameters in install.conf:
LDAP_ENABLED=true
LDAP_URL=ldaps://ldap.your-domain.com:636
LDAP_BIND_DN=cn=honeyframe,ou=service-accounts,dc=your-domain,dc=com
LDAP_BIND_PASSWORD=<redacted>
LDAP_USER_SEARCH_BASE=ou=users,dc=your-domain,dc=com
LDAP_USER_SEARCH_FILTER=(uid={username})
LDAP_GROUP_SEARCH_BASE=ou=groups,dc=your-domain,dc=com
LDAP_GROUP_SEARCH_FILTER=(member={user_dn})
LDAP_GROUP_NAME_ATTR=cn
LDAP_USE_STARTTLS=false
LDAP_CA_BUNDLE=/etc/ssl/certs/your-ldap-ca.crt
The runtime sync of LDAP groups → Honeyframe groups (hubstudio.groups) is documented in Security → LDAP Configuration. Install-time config only sets the connection parameters.
Preparing your directory
You can do the directory-side prep work today so the install is a one-step config flip when Phase 4 ships:
- Create a service account with read access to the user and group OUs you intend to expose to Honeyframe. Avoid sharing this account with other applications — rotation is easier when each consumer has its own.
- Decide on a group naming convention that maps cleanly to Honeyframe groups. Honeyframe groups are flat — there is no nesting — so plan one LDAP group per Honeyframe group.
- Allocate a UID attribute the platform will treat as the canonical username. The default planned filter is
(uid={username}); if your directory usessAMAccountNameormail, plan to overrideLDAP_USER_SEARCH_FILTER. - Provision a CA bundle if your LDAP server uses an internal CA. The platform will not bypass certificate verification by default.
Until LDAP ships
For now, manage users directly in the platform:
- Superadmins are created by the install script and via the
usersAPI. - Group membership is administered through the Groups Management page (Platform UI) or the
/api/groupsendpoint. - For SSO, use the Google Identity integration documented under Authentication in the Developer property — it's the only third-party identity provider currently wired.
Migration path (when Phase 4 ships)
The plan is for LDAP to augment the local user table, not replace it. On first LDAP login, Honeyframe will:
- Look up the user in
hubstudio.usersby username. - If absent, create a row with
auth_source='ldap'and link to the directory user viaexternal_id. - Sync group memberships by mapping LDAP groups to
hubstudio.groupsrows.
Existing local users will keep working. Mixing local and LDAP users in the same organization is supported.