mirror of
https://github.com/go-vikunja/vikunja.git
synced 2026-05-07 12:37:14 -05:00
Support LDAP authentication for users #20
Closed
opened 2025-11-01 20:44:27 -05:00 by GiteaMirror
·
22 comments
No Branch/Tag Specified
main
feat-huma-api-v2-migration
feat-v2-foundation
spike-huma-openapi3
claude/investigate-swagger3-support-nyyUa
feat-list-view-buckets
ci-mysql-8-test
codex/analyze-codebase-for-email-task-feature
feat-project-templates
csv-import-feature
claude/email-reply-comments-wpdcQ
fix-oidc-pkce-support
fix/overview-subtasks-expand
feat/bucket-select-task-detail
feat-soft-delete-projects
claude/review-bot-design-plan-cf5C3
claude/project-scoped-api-tokens-KTqR3
claude/explore-openclaw-integration-KQEzg
claude/project-scoped-api-tokens-yv5KS
fix-duplicate-close-button
feat-list-view-sorting
feat/official-vite-sentry-plugin
feat/highlight-overdue-tasks
feat/add-enter-key-form-submission-handling
feat/TipTap-nits
feat/update-caldavtimetotimestamp-parsing
feat-phosphor-icons
wip-plans
claude/investigate-issue-2173-llKme
fix-description-text-drag
feat-custom-keyboard-shortcuts
pr-1845-ci
codex/fix-drag-and-drop-behavior-inconsistency
copilot/add-clickable-labels-for-filtering
copilot/fix-issue-1786
playwright-migration
fix-kanban-repeating-wip
copilot/fix-1498
feature/replace-axios
codex/upgrade-to-tailwind-4.1.8-using-pnpm
codex/add-cypress-test-for-avatar-types
feature/biome
feature/oxc
codex/update-flexsearch-to-0.8.205
4r6ni9-codex/fix-deprecated-sass-@import-usage
codex/fix-deprecated-sass-@import-usage
codex/add-cypress-test-for-task-list-refresh-fix
codex/fix-quick-add-magic-not-adding-tasks
codex/fix-all-type-errors
codex/fix-mimetype-for-docs.json
feature/caldav-from-scratch
feature/gh-actions-hetzner
fix-ci
feat/new-logger
jyte-better-dev-config
feat/add-team-member-with-enter
fix/button-and-icon-types
fix/notifications-component-name-collision
feature/null-time
renovate/tailwindcss-4.x
feature/unplugin-vue-router
fix/deprecated-import
feature/zod-schema
renovate/golangci-golangci-lint-1.x
fix/tiptap-editor-reactive-destructuring
release/0.24
feat/improve-add-task
fix/saved-filter-search
feat/webp-and-avif-attachment-previews
feature/migrate-back-to-bulma
fix/sass-add-missing-list-import
feature/sticky-demo-bar
fix/gantt-view-switch
feature/typesense-position-join
feature/focus-visible
dependencies/golangci-lint
feature/better-filter-syntax
fix/tiptap-task-list
renovate/github.com-golang-jwt-jwt-v4-5.x
feature/hide-forbidden-related-tasks
renovate/golang-1.x
release/0.20
release/0.17
release/0.16
release/0.15
release/0.14
v2.3.0
v2.2.2
v2.2.1
v2.2.0
v2.1.0
v2.0.0
v1.1.0
v1.0.0
v1.0.0-rc4
v1.0.0-rc3
v1.0.0-rc2
v1.0.0-rc1
v1.0.0-rc0
v0.24.6
v0.24.5
v0.24.4
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.0
v0.22.1
v0.22.0
0.21.0
v0.21.0
v0.20.4
v0.20.5
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.2
v0.19.1
v0.19.0
vue3
v0.18.1
v0.18.0
v0.17.1
v0.17.0
v0.16.1
v0.16.0
v0.15.1
v0.15.0
v0.14.1
v0.14.0
v0.13.1
v0.13
v0.12
v0.11
v0.10
v0.9
v0.8
v0.7
v0.6
v0.5
v0.4
v0.3
v0.2
v0.1
Labels
Clear labels
area/api
area/attachments
area/auth
area/avatars
area/backup-restore
area/caldav
area/calendar-view
area/comments
area/config
area/database
area/desktop
area/docker
area/email
area/favorites
area/filters
area/frontend
area/gantt
area/i18n
area/import-export
area/internal-code
area/kanban
area/labels
area/list-view
area/mobile
area/notifications
area/permissions
area/projects
area/pwa
area/recurring-tasks
area/reminders
area/search
area/shortcuts
area/subtasks
area/sync
area/table-view
area/task-editor
area/task-metadata
area/task-relations
area/teams
area/theming
area/time-tracking
area/typesense
area/views
area/webhooks
bug
changes requested
concern/accessibility
concern/performance
concern/regression
concern/ux
confirmed
db/mysql
dependencies
enhancement
good first issue
help wanted
integration/inbound
integration/outbound
kind/bug
kind/feature
needs reproduction
pull-request
question
security
support
upstream issue
waiting for reply
wontfix
Mirrored from GitHub Pull Request
No Label
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/vikunja#20
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sunrez on GitHub (Oct 17, 2021).
Hi,
I wanted to request LDAP capability be added to your roadmap to link with the Vikunja user database.
This ideal for an organization with >5 people to share / collaborate on tasks which is an awesome capability of Vikunja. Duplicating users/passwords or keeping this in sync with a central database always becomes problematic, LDAP / ActiveDirectory is very mature and works well for this.
@kolaente commented on GitHub (Oct 17, 2021):
Hi!
I plan to release a plugin for this, once we have a plugin api.
@Typhonragewind commented on GitHub (Dec 13, 2021):
Adding on the LDAP authentication, it would be awesome to have proxy authentication with it (as in once authorized by first service, such as Authelia, the authorization is passed via proxy headers)
@kolaente commented on GitHub (Dec 14, 2021):
@Typhonragewind Like this PR started adding?
@Typhonragewind commented on GitHub (Dec 14, 2021):
Oh, I wasn't aware of it, that's awesome!
@sunrez commented on GitHub (Jan 16, 2023):
Just wanted to (respectfully) ask if there's been any progress on LDAP support.
@kolaente commented on GitHub (Jan 16, 2023):
No progress yet.
@uweschmitt commented on GitHub (Feb 20, 2023):
Also would appreciate LDAP support.
@sunrez commented on GitHub (Nov 11, 2023):
Hi, any feedback on this request? Would make this 100x more useful for any organization >1 person.
@kolaente commented on GitHub (Nov 11, 2023):
Does openid work for you?
@sunrez commented on GitHub (Nov 18, 2023):
Hi @kolaente ,
Thanks for the reply. Unfortunately, OpenID does not work. If one is self-hosting the application with the goal of not having any third-party or external dependencies, LDAP (OpenLDAP or ActiveDirectory) is really important.
I work with organizations that need to self-host applications due to safety / security and they've mostly implemented OpenLDAP, some MSFT ActiveDirectory.
@alexanderadam commented on GitHub (Nov 18, 2023):
This doesn't make any sense, since LDAP and AD are literally external dependencies.
So would be a server component that speaks OpenID Connect.
And modern self hostable projects like KanIDM or Authentik even support both — for valid reasons like having single session authentication handling.
All the major players were moving away from OpenLDAP to other solutions in the last years. Most Linux distributors are using 389ds based solutions.
I'm not sure that safety is a concern of theirs if they continue using something that most people are moving away from and if they don't want to setup an OIDC app like Authelia.
@sunrez commented on GitHub (Nov 18, 2023):
@alexanderadam :
OpenLDAP and ActiveDirectory can be completely self-hosted, even if you consider them "external". I'm not sure why you believe 'most' Linux distributions are using 389DS also? I think 'FreeIPA' (from RHEL, which uses 389DS, dogtag, etc) is likely more popular but since FreeIPA has to own DNS, administering it can become complicated. Even if 389DS is 'more popular (that's debatable) it's still an LDAP provider, which means LDAP authentication would work with OpenLDAP/FreeIPA(389DS)/AD.
I work with a mix of small to huge companies and while many use providers like Okta for SASS or VPN, LDAP/AD is still there since UNIX group permissions, UIDs, NFS, Samba, etc all benefit from central administration.
@alexanderadam commented on GitHub (Nov 18, 2023):
Well, OpenID services can be completely self-hosted too. So if you're not considering self-hosted services external, then I don't understand what you meant by this
OpenID servers and LDAP servers can both be self-hosted.
So either you consider both to be external dependencies or not.
If self-hosting another server is an option then you can already use an OpenID Connect server right now. If your customers use LDAP infrastructure, just spin up an Authelia instance and let it point to your LDAP server.
Well, OIDC servers also give the benefit of central administration. The projects KanIDM and Authentik, that I mentioned before, even have less fraction in doing so, since they're single simple projects.
Therefore I'm really not sure why you can't simply spin up a simple OpenID Connect server if self-hosting is an option any way.
@bfd69 commented on GitHub (Feb 13, 2024):
Hello
i think openldap/Ad Support would be greet. from my point of you it would be for populating vikunja.
let me explain : i created a dockered service Vikunja. so far so well everything worked with openid and authelia, and then i created some project we had in our teams with tasks. After that a invited everyone to connect, 30% of them tried. but when they connected they did'nt see their project and abandoned.
if i could propulate vikunja with AD users at least (maybe groups too) i could have assigned beforehand the users to projects.
for example nextcloud works like that.
by the way Vikunja is really great and beautiful, a bit tricky in docker and traefik but great :)
@kolaente commented on GitHub (Feb 13, 2024):
There is a PR to add automatic provisioning of teams based on openid claims to Vikunja. Maybe that would help your use case?
@bfd69 commented on GitHub (Feb 13, 2024):
i think it will !
@kolaente commented on GitHub (Jan 28, 2025):
This is now available in unstable: https://vikunja.io/docs/ldap/
@ValentinKolb commented on GitHub (Jul 15, 2025):
Is there a planned timeline for when this feature will be included in the official stable release?
@kolaente commented on GitHub (Jul 15, 2025):
@ValentinKolb there are currently a few things left to do for the stable release. It's done when it's done.
@ValentinKolb commented on GitHub (Jul 15, 2025):
Thanks for the response!
Just to confirm: will LDAP support be included in the next stable release? It's an essential feature for us, and we're really looking forward to using it.
@kolaente commented on GitHub (Jul 15, 2025):
Yes, everything that's in the current unstable builds will be included in the next stable release.
@ValentinKolb commented on GitHub (Jul 15, 2025):
Great, thank you for confirming! Looking forward to the stable release.