On Fri, Feb 28, 2025 at 7:32 PM Cyrus <cyru...@gmail.com> wrote:

> Hello!,
>
> I'm trying to setup Authorization via Keycloak Authorization module
> and OIDC integration for Guacamole.
>
> I've setup all the proper rules in Keycloak, currently based on group
> membership. There's an internal testing feature that allowed me to
> validate that Authorization for a given application for user1 is
> denied, and for user2 is granted depending on group membership:
>
> https://www.keycloak.org/docs/latest/authorization_services/index.html
>
> I was expected this to be part of any OIDC standard integration, but
> Guacamole happily allows access to both user1 & user2. Reading around
> it seems that the policy enforcing should be implemented on the client
> or web resource side (which sound odd):
>
> https://www.keycloak.org/securing-apps/policy-enforcer
>
> I can't find any reference in the Guacamole documentation, can you
> please confirm if something like that is supported somehow?.
>
>
My guess is that this is related to your other post ([1]), but here are my
responses:
* I think it should be possible, within the IdP (Keycloak), to limit access
to certain applications based on group membership. I'm not a user of or
familiar with Keycloak, but the other SSO IdPs that I've worked with (CAS
and Entra) definitely allow for this.
* If for some reason this is not possible, you should still be able to
limit access within Guacamole by only assigning rights for connections,
connection groups, and administrative privileges, to the users and/or user
groups you deem necessary. Even if a user can get to the Guacamole UI, that
does not mean they have any access to use connections/groups within the
system.

-Nick

[1] - https://lists.apache.org/thread/9vsrk62phmgb6tr9x9wmjpbblc38dj55

Reply via email to