PerformanceΒΆ
LDAPBackend is carefully designed not to
require a connection to the LDAP service for every request. Of course, this
depends heavily on how it is configured. If LDAP traffic or latency is a concern
for your deployment, this section has a few tips on minimizing it, in decreasing
order of impact.
- Cache groups. If
AUTH_LDAP_FIND_GROUP_PERMSisTrue, the default behavior is to reload a user’s group memberships on every request. This is the safest behavior, as any membership change takes effect immediately, but it is expensive. If possible, setAUTH_LDAP_CACHE_GROUPStoTrueto remove most of this traffic. Alternatively, you might consider usingAUTH_LDAP_MIRROR_GROUPSand relying onModelBackendto supply group permissions.- Don’t access user.ldap_user.*. These properties are only cached on a per-request basis. If you can propagate LDAP attributes to a
Useror profile object, they will only be updated at login.user.ldap_user.attrstriggers an LDAP connection for every request in which it’s accessed. If you’re not usingAUTH_LDAP_USER_DN_TEMPLATE, then accessinguser.ldap_user.dnwill also trigger an LDAP connection.- Use simpler group types. Some grouping mechanisms are more expensive than others. This will often be outside your control, but it’s important to note that the extra functionality of more complex group types like
NestedGroupOfNamesTypeis not free and will generally require a greater number and complexity of LDAP queries.- Use direct binding. Binding with
AUTH_LDAP_USER_DN_TEMPLATEis a little bit more efficient than relying onAUTH_LDAP_USER_SEARCH. Specifically, it saves two LDAP operations (one bind and one search) per login.