diff --git a/pica-nginx-ldap/Dockerfile b/pica-nginx-ldap/Dockerfile
new file mode 100644
index 0000000000000000000000000000000000000000..ffbcdf84deb42800361048b76a3749c814c80494
--- /dev/null
+++ b/pica-nginx-ldap/Dockerfile
@@ -0,0 +1,34 @@
+FROM debian:bullseye
+ARG NGINX_VERSION=1.21.4
+LABEL maintainer picasoft@assos.utc.fr
+
+# Install prerequisites
+RUN apt-get update && \
+    apt-get install -y build-essential git-core libpcre3-dev libldap2-dev libssl-dev wget zlib1g zlib1g-dev
+
+# Download LDAP module
+RUN git clone https://github.com/kvspb/nginx-auth-ldap.git /nginx-auth-ldap
+
+# Download and build NGINX with LDAP module
+RUN wget -O nginx.tar.gz http://nginx.org/download/nginx-${NGINX_VERSION}.tar.gz && \
+    tar xvf nginx.tar.gz && \
+    cd nginx-${NGINX_VERSION} && \
+    chmod +x configure && \
+    ./configure --user=nginx --group=nginx --prefix=/etc/nginx --sbin-path=/usr/sbin/nginx --conf-path=/etc/nginx/nginx.conf --pid-path=/var/run/nginx.pid --lock-path=/var/run/nginx.lock --error-log-path=/var/log/nginx/error.log --http-log-path=/var/log/nginx/access.log --with-http_gzip_static_module --with-http_stub_status_module --with-http_ssl_module --with-pcre --with-file-aio --with-http_realip_module --add-module=/nginx-auth-ldap/ --with-ipv6 --with-debug && \
+    make && \
+    make install
+
+COPY ./entrypoint.sh /entrypoint.sh
+COPY ./nginx.conf /etc/nginx/templates/nginx.conf.template
+
+RUN touch /etc/nginx/site.conf
+
+RUN apt-get install -y gettext-base && \
+    chmod +x /entrypoint.sh
+
+RUN useradd nginx
+
+EXPOSE 80
+
+ENTRYPOINT ["/entrypoint.sh"]
+CMD ["nginx"]
diff --git a/pica-nginx-ldap/README.md b/pica-nginx-ldap/README.md
new file mode 100644
index 0000000000000000000000000000000000000000..ce179a1f8c092aa66cf1d6bd56899159ea6b8119
--- /dev/null
+++ b/pica-nginx-ldap/README.md
@@ -0,0 +1,64 @@
+## nginx with LDAP authentication
+
+nginx has a mechanism allowing to use an external service handling authentication requests. For LDAP, the traditionnal way involves running a [ldap-auth](https://github.com/nginxinc/nginx-ldap-auth) daemon. It seemed a bit burdensome to me, even if there is a [Docker image](https://hub.docker.com/r/bitnami/nginx-ldap-auth-daemon/) for the daemon. I think this is because LDAP auth is included in NGINX Plus and a bit tricky to integrate with free pre-built packages.
+
+There is an unofficial nginx module, [nginx-auth-ldap](https://github.com/kvspb/nginx-auth-ldap), which works well. We just need to recompile nginx with it, and voilà.
+
+This is the purpose of this repository : make a ready-to-use nginx single image with LDAP auth.
+
+## Sample usage with Compose
+
+```yaml
+version: '3.8'
+
+services:
+  nginx_ldap:
+    image: registry.picasoft.net/pica-nginx-ldap:1.21.4
+    container_name: registry_frontend
+    environment:
+      LDAP_URL: ldaps://ldap.picasoft.net:636
+      LDAP_BASE_DN: dc=picasoft,dc=net
+      LDAP_ANSWER_ATTRIBUTES: cn
+      LDAP_SCOPE_SEARCH: sub
+      LDAP_FILTER: (objectClass=posixAccount)
+      LDAP_BIND_DN: cn=nss,dc=picasoft,dc=net
+      SERVER_NAME: registry.picasoft.net
+    ports:
+      - 8080:80
+    env_file: ./secrets/ldap.secrets
+    restart: unless-stopped
+```
+
+With `LDAP_BIND_PASSWORD=XXX` in `ldap.secrets`.
+
+## Build
+
+```
+docker build -t nginx-ldap .
+```
+
+## LDAP configuration
+
+Via Environments variables :
+
+- `LDAP_URL` → `ldap[s]://<url>:<port>`
+- `LDAP_BASE_DN` → where to start the search
+- `LDAP_ANSWER_ATTRIBUTES` → which attributes to get back, comma-separated.
+- `LDAP_SCOPE_SEARCH` : `base`, `one` or `sub`
+- `LDAP_FILTER` : constrain the search
+- `LDAP_BIND_DN` : user with read access
+- `LDAP_BIND_PASSWORD` : password for the user with read access
+
+See [official docs](https://ldapwiki.com/wiki/LDAP%20URL) for detail.
+
+## Server configuration
+
+Environment variable :
+
+- `SERVER_NAME` : URL of your website.
+
+Mount a file at `/etc/nginx/site.conf`. Every line will be included in the `server {}` section of `nginx.conf`.
+
+Environment variables **won't be** subtituted at startup.
+
+Note that nginx always listen internally on port 80. To change all configuration you can just mount an `nginx.conf` file. The moninal use is pretty standard : act as an authorization proxy or serve a simple single website.
diff --git a/pica-nginx-ldap/entrypoint.sh b/pica-nginx-ldap/entrypoint.sh
new file mode 100644
index 0000000000000000000000000000000000000000..047dafd716acbf260753e161b27c41d11a7acc1c
--- /dev/null
+++ b/pica-nginx-ldap/entrypoint.sh
@@ -0,0 +1,7 @@
+#!/bin/sh
+
+# Substitute env variables (secrets) in nginx configuration
+envsubst < /etc/nginx/templates/nginx.conf.template > /etc/nginx/nginx.conf
+
+# Execute initial command
+exec $@
diff --git a/pica-nginx-ldap/nginx.conf b/pica-nginx-ldap/nginx.conf
new file mode 100644
index 0000000000000000000000000000000000000000..02b1cfd2cabca68304704287e060d79e193a532e
--- /dev/null
+++ b/pica-nginx-ldap/nginx.conf
@@ -0,0 +1,31 @@
+worker_processes  1;
+daemon off;
+error_log /dev/stdout info;
+
+events {
+    worker_connections  1024;
+}
+
+http {
+  include       mime.types;
+  default_type  application/octet-stream;
+  access_log /dev/stdout;
+  sendfile        on;
+  keepalive_timeout  65;
+
+  ldap_server main {
+    url ${LDAP_URL}/${LDAP_BASE_DN}?${LDAP_ANSWER_ATTRIBUTES}?${LDAP_SCOPE_SEARCH}?${LDAP_FILTER};
+    binddn ${LDAP_BIND_DN};
+    binddn_passwd ${LDAP_BIND_PASSWORD};
+    require valid_user;
+  }
+
+  server {
+    listen       80;
+    server_name ${SERVER_NAME};
+    auth_ldap "Enter LDAP credentials";
+    auth_ldap_servers main;
+
+    include /etc/nginx/site.conf;
+  }
+}
diff --git a/pica-nginx-ldap/secrets/ldap.secrets.example b/pica-nginx-ldap/secrets/ldap.secrets.example
new file mode 100644
index 0000000000000000000000000000000000000000..38b0b9360bbfe2498f619f070e11c2703656233a
--- /dev/null
+++ b/pica-nginx-ldap/secrets/ldap.secrets.example
@@ -0,0 +1 @@
+LDAP_PASSWORD=test
diff --git a/pica-registry/auth.example b/pica-registry/auth.example
deleted file mode 100644
index 93fd9cde491e77394ea8971eaef6b86f0785c7a9..0000000000000000000000000000000000000000
--- a/pica-registry/auth.example
+++ /dev/null
@@ -1 +0,0 @@
-pica:<encrypted_password>
diff --git a/pica-registry/docker-compose.yml b/pica-registry/docker-compose.yml
index 9609cd9a501e31fee0b0e607b4b474f0373cd56e..f2eae1004941752b3772b0f9d83ab4f1caf01084 100644
--- a/pica-registry/docker-compose.yml
+++ b/pica-registry/docker-compose.yml
@@ -3,6 +3,8 @@ version: '3.7'
 networks:
   proxy:
     external: true
+  registry:
+    name: registry
 
 volumes:
   registry:
@@ -13,18 +15,35 @@ services:
     image: registry:2
     container_name: registry
     environment:
-      REGISTRY_AUTH: htpasswd
-      REGISTRY_AUTH_HTPASSWD_PATH: /auth/htpasswd
-      REGISTRY_AUTH_HTPASSWD_REALM: Registry Realm
       REGISTRY_STORAGE_FILESYSTEM_ROOTDIRECTORY: /var/lib/registry
+      REGISTRY_HTTP_HOST: registry.picasoft.net
     networks:
-      - proxy
+      - registry
     volumes:
       - registry:/var/lib/registry
-      - ./auth.secrets:/auth/htpasswd
+    restart: unless-stopped
+
+  nginx_ldap:
+    image: registry.picasoft.net/pica-nginx-ldap:1.21.4
+    build: ../pica-nginx-ldap
+    container_name: registry_frontend
+    environment:
+      LDAP_URL: ldaps://ldap.picasoft.net:636
+      LDAP_BASE_DN: dc=picasoft,dc=net
+      LDAP_ANSWER_ATTRIBUTES: cn
+      LDAP_SCOPE_SEARCH: sub
+      LDAP_FILTER: (objectClass=posixAccount)
+      LDAP_BIND_DN: cn=nss,dc=picasoft,dc=net
+      SERVER_NAME: registry.picasoft.net
+    env_file: ./secrets/ldap.secrets
+    volumes:
+      - ./proxy.conf:/etc/nginx/site.conf
     labels:
       traefik.http.routers.registry.entrypoints: websecure
       traefik.http.routers.registry.rule: Host(`registry.picasoft.net`)
-      traefik.http.services.registry.loadbalancer.server.port: 5000
+      traefik.http.services.registry.loadbalancer.server.port: 80
       traefik.enable: true
+    networks:
+      - registry
+      - proxy
     restart: unless-stopped
diff --git a/pica-registry/proxy.conf b/pica-registry/proxy.conf
new file mode 100644
index 0000000000000000000000000000000000000000..447a02c4547bc22d6d0c598d2eccbbc080d8d378
--- /dev/null
+++ b/pica-registry/proxy.conf
@@ -0,0 +1,22 @@
+# disable any limits to avoid HTTP 413 for large image uploads
+client_max_body_size 0;
+
+# required to avoid HTTP 411: see Issue #1486 (https://github.com/moby/moby/issues/1486)
+chunked_transfer_encoding on;
+
+location /v2 {
+    add_header 'Docker-Distribution-Api-Version' 'registry/2.0';
+
+    proxy_pass                          http://registry:5000;
+    proxy_set_header  Host              $http_host;   # required for docker client's sake
+    proxy_set_header  X-Real-IP         $remote_addr; # pass on real client's IP
+    proxy_set_header  X-Forwarded-For   $proxy_add_x_forwarded_for;
+    # Forwarding from Traefik, always https
+    proxy_set_header  X-Forwarded-Proto https;
+    proxy_read_timeout                  900;
+    proxy_set_header Upgrade $http_upgrade;
+    proxy_set_header Connection keep-alive;
+    proxy_request_buffering off;
+    proxy_cache off;
+    proxy_buffering off;
+}
diff --git a/pica-registry/secrets/ldap.secrets.example b/pica-registry/secrets/ldap.secrets.example
new file mode 100644
index 0000000000000000000000000000000000000000..74edc6eaeac147cce51d4841bcfd21f564165b1c
--- /dev/null
+++ b/pica-registry/secrets/ldap.secrets.example
@@ -0,0 +1 @@
+LDAP_BIND_PASSWORD=test