ueberauth_active_directory alternatives and similar packages
Based on the "Authentication" category.
Alternatively, view ueberauth_active_directory alternatives based on common mentions on social networks and blogs.
-
Pow
Robust, modular, and extendable user authentication system -
coherence
Coherence is a full featured, configurable authentication system for Phoenix -
ueberauth
An Elixir Authentication System for Plug-based Web Applications -
phx_gen_auth
An authentication system generator for Phoenix 1.5 applications. -
guardian_db
Guardian DB integration for tracking tokens and ensuring logout cannot be replayed. -
Phauxth
Not actively maintained - Authentication library for Phoenix, and other Plug-based, web applications -
goth
Elixir package for Oauth authentication via Google Cloud APIs -
PowAssent
Multi-provider authentication for your Pow enabled app -
Shield
Shield is an OAuth2 Provider hex package and also a standalone microservice build top of the Phoenix Framework and 'authable' package. -
ueberauth_google
Google OAuth2 Strategy for Überauth. -
samly
Elixir Plug library to enable SAML 2.0 SP SSO in Phoenix/Plug applications. -
elixir_auth_google
👤Minimalist Google OAuth Authentication for Elixir Apps. Tested, Documented & Maintained. Setup in 5 mins. 🚀 -
basic_auth
Elixir Plug to easily add HTTP basic authentication to an app -
ueberauth_github
GitHub OAuth2 Strategy for Überauth -
ueberauth_facebook
Facebook OAuth2 Strategy for Überauth. -
Veil
Simple passwordless authentication for your Phoenix apps -
aws_auth
AWS Signature Version 4 Signing Library for Elixir -
ueberauth_auth0
Auth0 OAuth2 strategy for Überauth. -
doorman
Tools to make Plug, and Phoenix authentication simple and flexible. -
ueberauth_identity
A username/password Strategy for Überauth -
ueberauth_twitter
Twitter Strategy for Überauth -
ueberauth_slack
Slack OAuth2 Strategy for Überauth -
ueberauth_microsoft
Microsoft Strategy for Überauth -
Paseto
An Elixir implementation of Paseto (Platform-Agnostic Security Tokens) -
Paddle
A library simplifying LDAP usage in Elixir projects -
passwordless_auth
A library for simple passwordless authentication -
blackbook
All-in-one membership/authentication system for Elixir. -
ueberauth_vk
vk.com OAuth2 Strategy for Überauth. -
aeacus
A simple, secure, and highly configurable Elixir identity [username | email | id | etc.]/password authentication module to use with Ecto. -
phoenix_client_ssl
Set of Plugs / Lib to help with SSL Client Auth. -
sigaws
An Elixir library to sign and verify HTTP requests using AWS Signature V4 -
ueberauth_cas
Central Authentication Service strategy for Überauth -
exBankID
exBankID is a simple stateless API-client for the Swedish BankID API -
zachaeus
An easy to use licensing system, using asymmetric cryptography to generate and validate licenses. -
ueberauth_weibo
Weibo OAuth2 strategy for Überauth. -
htpasswd
Apache httpasswd file reader/writer in Elixir -
oauth2_github
A GitHub OAuth2 Provider for Elixir -
oauth2_facebook
A Facebook OAuth2 Provider for Elixir -
apache_passwd_md5
Apache/APR Style Password Hashing -
ueberauth_foursquare
Foursquare OAuth2 Strategy for Überauth
Elixir and Phoenix Application Security Platform
Do you think we are missing an alternative of ueberauth_active_directory or a related project?
README
UeberauthActiveDirectory
Active Directory Ueberauth strategy using Exldap.
Installation
Add ueberauth_active_directory to your list of dependencies in mix.exs
:
def deps do
[{:ueberauth_active_directory, "~> 0.1"}]
end
Ensure ueberauth_active_directory is started before your application:
def application do
[applications: [:ueberauth_active_directory]]
end
Run mix deps.get
Usage
Add AD server information to <mix env>.secret.exs
Config Value | Usage |
---|---|
server | Your Active Directory server address |
base | Base distingushed name for your domain. e.g. lab.local would be DC=lab,DC=local |
port | Ldap listening port |
ssl | Enable SSL |
user_dn | Bind account username in distinguishedName format |
password | Bind account password |
# config/dev.secret.exs
config :ueberauth, Ueberauth.Strategy.ActiveDirectory.Ldap,
server: "192.168.250.2",
base: "DC=lab,DC=local",
port: 389,
ssl: false,
user_dn: "CN=vagrant,CN=Users,DC=lab,DC=local",
password: "vagrant"
Configure Ueberauth to use the strategy
# config/dev.exs
config :ueberauth, Ueberauth,
providers: [
active_directory: { Ueberauth.Strategy.ActiveDirectory, [] },
]
Configure authentication routes
scope "/auth", MyApp do
pipe_through :browser
get "/:provider", AuthController, :request
get "/:provider/callback", AuthController, :callback
end
Include Überauth plug in your controller
defmodule MyApp.AuthController do
use MyApp.Web, :controller
plug Ueberauth
...
end
Tests
Tests require an AD environment to run. The vagrantfile included in the repo will take care of setting up the environment for you.
Prerequisites
Running Tests
- Clone the repo
cd ueberauth_active_directory
- Run
vagrant up
- Run
mix test