-
Notifications
You must be signed in to change notification settings - Fork 178
As an administrator, I would like LDAP authenticated users to automatically have accounts created on my system so that I can automate this process. #19
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Comments
It appears not, but I'm working on a PR to implement this. |
Hello! I think the better way to do this would be to use nss_ldap + pam_ldap to make all users on ldap 'automagically' have local accounts on the machine. That's what we do at wikimedia. http://www.tldp.org/HOWTO/archived/LDAP-Implementation-HOWTO/pamnss.html is a decent guide. This has the following advantages over creating local accounts here:
Can you think of any advantages that putting account creation in ldapauthenticator would have, over using this setup? Thanks! |
@yuvipanda You definitely bring up some good points, however I see a few disadvantages as well:
I modeled this implementation for ldapauthenticator after the oauthenticator. |
Can you explain what you mean by possibility of conflict with sudospawner? Securitywise, I'd be very tempted to just say 'no' in this context - If you really want to not use pam_ldap + nss_ldap, I'd recommend creating a On Thu, Sep 1, 2016 at 11:23 AM, Ben Hosmer notifications@github.com
Yuvi Panda T |
I can also write up a doc on how to setup pam_ldap + nss_ldap along with On Thu, Sep 1, 2016 at 11:52 AM, Yuvi Panda yuvipanda@gmail.com wrote:
Yuvi Panda T |
It's not a matter of not knowing how to implement PAM, LDAP, and NSS, it's more of the added complexity. Yeah, I certainly agree they're probably more secure than this smaller project will be. ldapauthenticator could still be used even for a non-root user though if the user that is running hub has sudo privileges to |
@yuvipanda before I go a create a separate module, I want to make sure this PR isn't going anywhere. What about the oauthenticator? Even for the sake of uniformity across jupyterhub? |
I think it might make more sense in OAuthenticator, since there's no To recap,
Thank you for talking it through, and I hope I have been able to On Thu, Sep 1, 2016 at 12:58 PM, Ben Hosmer notifications@github.com
Yuvi Panda T |
Your reasoning is sound. Thanks for the engagement on this. I'll likely create a small module that extends the ldapauthenticator initially. |
yw! I wonder if you can just do this in your jupyterhub_config file itself. On Thu, Sep 1, 2016 at 5:14 PM, Ben Hosmer notifications@github.com wrote:
Yuvi Panda T |
I'm curious, what would this look like in the config file? |
@benhosmer, @yuvipanda please share the config file |
I never got it to work in the config file. I imagine you could just do something similar to this:
Or just |
@venkatchetkuri You may wish to look at https://github.com/bloomberg/jupyterhub-kdcauthenticator to see if it would fulfill your requirements. |
@willingc Here is my use case: What i did so far on a single machine is :
Error message when I'm trying to run : [C 2017-06-27 21:10:31.135 JupyterHub application:90] Bad config encountered during initialization: Being a newbie to Jupyter/Spark and Kerberos, I'm not able figure out what I'm missing. Here I am attaching the overall architecture and the configuration files of livy and jupyterhub. |
Hi, I hope this isn't an off-topic, but I would really appreciate such a guide, or a push in the right direction, and this issue seems to be exactly about the problem I am experiencing. I've managed to get nslcd to work, and I am even able to log in to JupyterHub via PAM+LDAP, but as soon as I'm in, I get the following error:
I had the same issue even when I had used the LDAP-plugin for JupyterHub, but since the user in question is in the right group, that has access to the Anaconda folder, I am assuming this has to do with PAM-configuration? There I am truly lost, so any suggestions would be welcome. Almost all users simply get an error that their home folder does not exist... Thanks in advance! |
@yuvipanda does this apply to windows platform as well? |
There is an alternative ldap authenticator with user home creation support, but a little bit outdated: |
Using the LDAP authenticator, I'm able to authenticate users.
For example, the user exists in the LDAP server and also has a linux user account on the hub server. Login and authentication works fine.
If a user exists in the LDAP server though but does not have a corresponding linux system account on the hub, I get the following error:
Can the LDAP authenticator be used with the PAM/LocalAuthenticator capabalities and create this user if they don't exist?
The text was updated successfully, but these errors were encountered: