[
https://issues.apache.org/jira/browse/GUACAMOLE-1985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17885918#comment-17885918
]
Daniel Hoffend edited comment on GUACAMOLE-1985 at 9/30/24 2:20 PM:
--------------------------------------------------------------------
We were trying to get the same configuration going but [~armfem] was faster
reporting the configuration problem:
We're using guacomale as remote desktop gateway to several internal systems,
while using LDAP as our main authentication and connection database. (btw: It's
nice to directly assign users to groupOfNames and connect them via
member/seeAlso attribute to connections they're allowed to use).
The problem is: we want to extend the use of guacamole from internal network
accesses to external network accesses as well. But connections from external
(untrusted) sources would require a 2nd factor (this is where an additional
OpenID Provider comes into play). Those external guacamole servers are
seperated from the internal servers)
* In this setup the authentication provider will be switched from ldap to
openid + ldap (priority to openid).
* On login request, the OpenID provider checks the user credentials and
multi-factor components and redirects the user back to guacamole with a
relevant subset of groups he's part of.
* The connection storing method is still be the ldap database, no additional
(sql) database required
* The given group membership should somehow be resolved and user is provided
with a list of connections he's allowed to use.
Comments:
* Right now it seems that only a real (sql) database connection backend would
allow openid authenticated users to access their (withing the db assigned)
connections. As I mentioned we would like to don't run an additional database.
Don't maintain the connections multiple times (ldap, db1, db2, db3 ...)
* I guess it would need an configuration option to control weather the search
bind user is used to load connections and check group memberships or the real
user.
* It's also a security discussion if the real user bind should be used to load
connections or the search ldap user (need to known principal)
Hope that helps to clarify. Maybe [~armfem] has the same use case.
was (Author: JIRAUSER302220):
We were trying to get the same configuration going but [~armfem] was faster
reporting the configuration problem:
We're using guacomale as remote desktop gateway to several internal systems,
while using LDAP as our main authentication and connection database. (btw: It's
nice to directly assign users to groupOfNames and connect them via
member/seeAlso attribute to connections they're allowed to use).
The problem is: we want to extend the use of guacamole from internal network
accesses to external network accesses as well. But connections from external
(untrusted) sources would require a 2nd factor (this is where an additional
OpenID Provider comes into play). Those external guacamole servers are
seperated from the internal servers)
* In this setup the authentication provider will be switched from ldap to
openid + ldap (priority to openid).
* On login request, the OpenID provider checks the user credentials and
multi-factor components and redirects the user back to guacamole with a
relevant subset of groups he's part of.
* The connection storing method is still be the ldap database
* The given group membership should somehow be resolved and user is provided
with a list of connections he's allowed to use.
Comments:
* Right now it seems that only a real database connection backend would allow
openid authenticated users to access their (withing the db assigned)
connections. As I mentioned we would like to don't run an additional database.
Don't maintain the connections multiple times (ldap, db1, db2, db3 ...)
* I guess it would need an configuration option to control weather the search
bind user is used to load connections and check group memberships or the real
user.
* It's also a security discussion if the real user bind should be used to load
connections or the search ldap user (need to known principal)
Hope that helps to clarify. Maybe [~armfem] has the same use case.
> There is no account reconciliation between OIDC and LDAP
> --------------------------------------------------------
>
> Key: GUACAMOLE-1985
> URL: https://issues.apache.org/jira/browse/GUACAMOLE-1985
> Project: Guacamole
> Issue Type: Wish
> Components: guacamole-auth-ldap
> Environment: LDAP: AD
> SSO: OIDC with LemonLDAP
> Reporter: armfem
> Priority: Minor
>
> Bonjour,
>
> I had configured guacamole users through LDAP, which work very nice. Then I
> added an SSO (LemonLDAP) which is connected via OIDC to guacamole. Which also
> seems to work quite nice to access it.
> The problem is that when connecting through OIDC I cannot access the users
> that are in LDAP, there are only users already connected through OIDC.
> Furthermore, it seems that the OIDC user is not reconciled with same name
> LDAP user.
>
> For the time being, I avoid the problem creating a group in LDAP and a group
> in Guacamole, and then the application is able to reconcile the groups.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)