ldap cache disabled by default #46507
t1
started this conversation in
Design Discussions
Replies: 1 comment 2 replies
-
I really don't know. Adding the cache could be seen as a specific tuning and something you should be aware of - because then you introduce a delay between your LDAP changes and when they are taken into account. Now, adding something to the documentation is always welcome and if you can find a good place for a section about it (it could be a NOTE/TIP), feel free to open a pull request. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We are developing several services based on Quarkus, but as our IAM infrastructure is currently mainly based on LDAP, we cannot yet use OIDC, etc. I understand that LDAP support is not en vogue anymore, so support is minimalistic, e.g. there is no dev service. That's okay for us.
We experienced some performance and reliability issues, and when we compared the times that the access log and our application logs reported, there was a difference of ~150ms. It took us quite a while to understand that LDAP was the cause. Every request was validated with the LDAP server, which is an extra roundtrip and sometimes caused errors, as the default for
quarkus.security.ldap.cache.enabled
isfalse
. As Quarkus normally has the most common and useful settings as a default, this came to a complete surprise to us. Isn't this the normal behavior for any LDAP client authentication? Could this be changed in a future release. I suppose everybody using LDAP in Quarkus has set it totrue
. And if not: This should be clearly stated in the Guide, don't you think?Beta Was this translation helpful? Give feedback.
All reactions