-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Support LDAP Authentication #70
Comments
I have implemented a basic POC. But as I have implemented it now - and without having much golang knowledge - I doubt that my naive approach is going to scale. The LDAP-Server is going to be hammered with requests, a single I'm afraid an authentication cache level needs to be implemented, and that will definitely get ugly very quickly. Maybe I'm going to work on a solution based on |
I just finished to implement some credential caching using freecache and it looks promising. Just have to write some tests and do some code cleanup. |
Quite possibly -- approximately how big is the change? |
I would suggest to implement a Such a backend would read lines that could look like this (unindented JSON):
and respond with a message like This would also allow for more complex rest-server ACLs without having to directly support all possible use cases within rest-server. |
I like this approach, it would reduce the complexity needed in rest-server. Hm. |
@mholt I think it is not too intrusive. A little change to @wojas @fd0: Beside the approach being indeed very flexible and powerful, it adds a lot of more functionality (and complexity/work). In my eyes, this is a good candidate for a new issue like "Implement Authorization (ACL)". |
I will create a new issue for the |
Wouldn't it be easier to use --no-auth and have a reverse proxy do the authentication? I'm pretty sure you can hook nginx into ldap |
A reverse proxy makes sense, but you do need to be careful about potential differences in path handling between the proxy and rest-server to not introduce security issues. |
The .htpasswd auth is difficult to scale or manage beyond a few users. Supporting LDAP would allow for large number of users in both *nix and Windows environments.
The text was updated successfully, but these errors were encountered: