-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2 Factor Authentication #683
Comments
Hi @brimdor, may be LDAP can help? |
I'm sure LDAP works fine in general, however, I use SAML SSO in my environment that I'm trying to implement this. |
SAML or OIDC (OpenID Connect) would be amazing. Really convenient as the SSO provided will handle 2FA instead of have to code that into this App. |
Or... since this project recommends nginx for SSL support anyway, why not support passing user creds from nginx? I am running an nginx proxy as a docker container in front of the semaphore container. I have nginx prompting for username/pass and on some of my other containers that support web auth it just passes that through (phpIPAM and mediawiki for example). Currently the nginx does the authentication against my LDAPS servers, and when the time comes to get that working with smartcard, I only have to reconfigure nginx. |
@KenK73 indeed just trusting the remote user name in REMOTE_USER would be good. I use Apache with mod_auth_openidc to handle authentication with OpenID Connect here. |
Apache will handle the authentication and provide the username in an HTTP header. The admin will need to configure Apache to pass the username in a header. See https://renaudmarti.net/posts/make-apache-proxy-remote-user-to-backend/ for example. Then the app would skip the login page and use the username from the header. |
@fiftin I could give it a try at implementing 2FA (TOTP) for non-LDAP users. |
If it were closer to Christmas, I would be asking for SAML support instead, so someone could use their chosen IDP (like Ping Federate) to bring SSO and 2FA support to this app.
…-Ken K
On Jul 4, 2022, at 6:03 PM, Weilbyte ***@***.***> wrote:
@fiftin I could give it a try at implementing 2FA (TOTP) for non-LDAP users.
—
Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you were mentioned.
|
@KenK73 what SAML provider do you use? |
Are you asking about the IDP? Ping Federate is what we've started rolling out. Maybe I dont understand what you are asking. I am not well versed in SAML just yet, I just see it working pretty well on our other apps that support it. |
+1 on the SSO implementation. It's a lot cleaner and secure than LDAP. Please and thank you! |
OpenID Connect would be good too (preferable to SAML). |
+1 would be really good |
+1 would be really really good |
+1 on the SSO implementation. Even being able to authenticate users with Github would be incredible. (Similar to how AWX does it) |
2FA is needed |
Use OpenID Connect and let your IDP do 2FA. |
IMHO this issue can get closed. It is possible to enable 2FA on an OIDC/OAuth2 provider. There are much more important features or fixes than building your own 2FA mechanism for local or LDAP users. |
It currently uses basic auth with its own user management. What about incorporating 2 factor authentication? Building out users and allowing access via their enterprise authentication?
The text was updated successfully, but these errors were encountered: