ldap-client: Pure Haskell LDAP Client Library

This is a package candidate release! Here you can preview how this package release will appear once published to the main package index (which can be accomplished via the 'maintain' link below). Please note that once a package has been published to the main package index it cannot be undone! Please consult the package uploading documentation for more information.

[maintain] [Publish]

Pure Haskell LDAP client library implementing (the parts of) RFC 4511.


[Skip to Readme]

Properties

Versions 0.1.0, 0.2.0, 0.3.0, 0.3.0, 0.4.0, 0.4.1, 0.4.2, 0.4.3
Change log CHANGELOG.markdown
Dependencies asn1-encoding (>=0.9), asn1-types (>=0.3), async, base (>=4.6 && <5), bytestring, connection (>=0.2), containers, fail, network (>=2.6), semigroups (>=0.16), stm, text [details]
License BSD-2-Clause
Copyright 2015 Matvey Aksenov, 2019 AlasConnect LLC
Author Matvey Aksenov, AlasConnect LLC
Maintainer matvey.aksenov@gmail.com, software@alasconnect.com
Category Network
Home page https://github.com/alasconnect/ldap-client
Source repo head: git clone git@github.com:alasconnect/ldap-client(tag 0.3.0)
Uploaded by bcj at 2019-07-22T16:57:58Z

Modules

[Index] [Quick Jump]

Downloads

Maintainer's Corner

Package maintainers

For package maintainers and hackage trustees


Readme for ldap-client-0.3.0

[back to package description]

ldap-client

Hackage Build Status

This library implements (the parts of) RFC 4511

Feature RFC Section Support
Bind Operation 4.2
Unbind Operation 4.3
Unsolicited Notification 4.4
Notice of Disconnection 4.4.1
Search Operation 4.5 ✔*
Modify Operation 4.6
Add Operation 4.7
Delete Operation 4.8
Modify DN Operation 4.9
Compare Operation 4.10
Abandon Operation 4.11
Extended Operation 4.12
IntermediateResponse Message 4.13
StartTLS Operation 4.14 ✔†
LDAP over TLS -

* The :dn thing is unsupported in Extensible matches
† Only serves as an example of Extended Operation. It's useless for all practical purposes as it does not actually enable TLS. In other words, use LDAP over TLS instead.