Vagrant for OpenLDAP testing environment
☆12Feb 28, 2014Updated 12 years ago
Alternatives and similar repositories for vagrant-ldap
Users that are interested in vagrant-ldap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OpenLDAP configuration utilities☆11May 28, 2025Updated 10 months ago
- SQLAlchemy models and DDL and ERD generation from chop-dbhi/data-models style JSON endpoints.☆11May 22, 2023Updated 2 years ago
- The homepage for our jabber.at and associated hostnames.☆19Dec 7, 2022Updated 3 years ago
- ☆18Nov 25, 2025Updated 4 months ago
- Report generator for Git activity☆20Mar 19, 2012Updated 14 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Oct 28, 2021Updated 4 years ago
- An ETL pipeline to transform your EMP data to OMOP.☆16Oct 15, 2025Updated 6 months ago
- 'pkill -f' with a confirmation prompt.☆14Mar 26, 2020Updated 6 years ago
- Prometheus exporter for Jenkins☆21Apr 8, 2026Updated last week
- Automatic C-CDA scorecard to promote best practices☆29Aug 29, 2016Updated 9 years ago
- A beginner starter guide to Vert.x reactive framework in Java. Introduces Vert.x and demonstrates a blown out HelloWorld app.☆21Feb 17, 2017Updated 9 years ago
- Hibernate service for Vert.x☆19Apr 4, 2015Updated 11 years ago
- JHipster on Quarkus☆27Apr 4, 2025Updated last year
- ⌨️ Using <kbd> for fun & profit☆32Sep 18, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Jenkins example setup discussed on thoughts-on-cpp☆21Apr 21, 2023Updated 2 years ago
- Operational scripts for docker-gerrit project.☆16Jul 12, 2019Updated 6 years ago
- Beyond HDP Sandbox☆18Jun 6, 2016Updated 9 years ago
- Automatic blocking of suspicious remote IP hosts - tool monitors log files for suspicious activity to automatically deny further access w…