Get a full Active Directory REST API in 30 seconds
  • Go 68.6%
  • JavaScript 31.2%
  • Makefile 0.2%
Find a file
2025-11-26 11:15:59 -07:00
addict_js add addict.js to a folder for reference 2024-09-14 20:58:26 -06:00
docs update swagger info 2023-10-24 16:35:07 -06:00
ldap deprecate pad for str 2025-06-27 09:50:39 -06:00
web add addict.js to a folder for reference 2024-09-14 20:58:26 -06:00
.air.toml update swagger info 2023-10-24 16:35:07 -06:00
.envrc start of reconfiguration 2023-09-11 17:22:47 -06:00
.gitignore add .envrc to gitignore 2023-10-24 10:44:42 -06:00
api_group.go start of reconfiguration 2023-09-11 17:22:47 -06:00
api_other.go start of reconfiguration 2023-09-11 17:22:47 -06:00
api_ou.go start of reconfiguration 2023-09-11 17:22:47 -06:00
api_user.go start of reconfiguration 2023-09-11 17:22:47 -06:00
envrc.sample add envrc sample files 2023-10-24 16:29:08 -06:00
go.mod bump 2025-11-26 11:15:59 -07:00
go.sum bump 2025-11-26 11:15:59 -07:00
LICENSE Initial commit 2020-12-28 20:09:01 -07:00
main.go start of reconfiguration 2023-09-11 17:22:47 -06:00
Makefile add air and swagger 2023-04-27 13:42:51 -06:00
readme.md initial commit 2023-02-22 19:59:20 -07:00
router.go start of reconfiguration 2023-09-11 17:22:47 -06:00

//The Nitty Gritty //Passing Secrets

//You can pass the AD details at runtime:

//addict --url ldaps://[address] --user [user]@[domain] --pass [pass]

//As environmental variables:

//export ADDICT_URL=ldaps://[address] //export ADDICT_USER=[user]@[domain] //export ADDICT_PASS=[pass]

//Or in ./config.json:

//git clone https://github.com/dthree/addict.git //cd addict //vim ./config.json

//{ //... //"user": "[user]@[domain]", //"pass": "[pass]", //"url": "ldaps://[address]" //}

//Authentication

//This service defaults to no authentication. I can't and won't try to guess your flavor.

//Addict uses express. The file ./middleware.js at the root of the directory exposes the app so you can add middleware hooks for auth logic. //LDAP vs LDAPS

//If you connect to Active Directory over plain LDAP, it will refuse certain write operations including adding a user and changing a password. To make things even better, Windows Server doesn't support LDAPS out of the box. You're going to have to set up the Domain Controller as a cert authority by installing the Active Directory Certificate Services Role.

//Here's a good tutorial on that.