[ https://issues.apache.org/jira/browse/GUACAMOLE-1985?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17885918#comment-17885918 ]
Daniel Hoffend edited comment on GUACAMOLE-1985 at 9/30/24 2:20 PM: -------------------------------------------------------------------- We were trying to get the same configuration going but [~armfem] was faster reporting the configuration problem: We're using guacomale as remote desktop gateway to several internal systems, while using LDAP as our main authentication and connection database. (btw: It's nice to directly assign users to groupOfNames and connect them via member/seeAlso attribute to connections they're allowed to use). The problem is: we want to extend the use of guacamole from internal network accesses to external network accesses as well. But connections from external (untrusted) sources would require a 2nd factor (this is where an additional OpenID Provider comes into play). Those external guacamole servers are seperated from the internal servers) * In this setup the authentication provider will be switched from ldap to openid + ldap (priority to openid). * On login request, the OpenID provider checks the user credentials and multi-factor components and redirects the user back to guacamole with a relevant subset of groups he's part of. * The connection storing method is still be the ldap database, no additional (sql) database required * The given group membership should somehow be resolved and user is provided with a list of connections he's allowed to use. Comments: * Right now it seems that only a real (sql) database connection backend would allow openid authenticated users to access their (withing the db assigned) connections. As I mentioned we would like to don't run an additional database. Don't maintain the connections multiple times (ldap, db1, db2, db3 ...) * I guess it would need an configuration option to control weather the search bind user is used to load connections and check group memberships or the real user. * It's also a security discussion if the real user bind should be used to load connections or the search ldap user (need to known principal) Hope that helps to clarify. Maybe [~armfem] has the same use case. was (Author: JIRAUSER302220): We were trying to get the same configuration going but [~armfem] was faster reporting the configuration problem: We're using guacomale as remote desktop gateway to several internal systems, while using LDAP as our main authentication and connection database. (btw: It's nice to directly assign users to groupOfNames and connect them via member/seeAlso attribute to connections they're allowed to use). The problem is: we want to extend the use of guacamole from internal network accesses to external network accesses as well. But connections from external (untrusted) sources would require a 2nd factor (this is where an additional OpenID Provider comes into play). Those external guacamole servers are seperated from the internal servers) * In this setup the authentication provider will be switched from ldap to openid + ldap (priority to openid). * On login request, the OpenID provider checks the user credentials and multi-factor components and redirects the user back to guacamole with a relevant subset of groups he's part of. * The connection storing method is still be the ldap database * The given group membership should somehow be resolved and user is provided with a list of connections he's allowed to use. Comments: * Right now it seems that only a real database connection backend would allow openid authenticated users to access their (withing the db assigned) connections. As I mentioned we would like to don't run an additional database. Don't maintain the connections multiple times (ldap, db1, db2, db3 ...) * I guess it would need an configuration option to control weather the search bind user is used to load connections and check group memberships or the real user. * It's also a security discussion if the real user bind should be used to load connections or the search ldap user (need to known principal) Hope that helps to clarify. Maybe [~armfem] has the same use case. > There is no account reconciliation between OIDC and LDAP > -------------------------------------------------------- > > Key: GUACAMOLE-1985 > URL: https://issues.apache.org/jira/browse/GUACAMOLE-1985 > Project: Guacamole > Issue Type: Wish > Components: guacamole-auth-ldap > Environment: LDAP: AD > SSO: OIDC with LemonLDAP > Reporter: armfem > Priority: Minor > > Bonjour, > > I had configured guacamole users through LDAP, which work very nice. Then I > added an SSO (LemonLDAP) which is connected via OIDC to guacamole. Which also > seems to work quite nice to access it. > The problem is that when connecting through OIDC I cannot access the users > that are in LDAP, there are only users already connected through OIDC. > Furthermore, it seems that the OIDC user is not reconciled with same name > LDAP user. > > For the time being, I avoid the problem creating a group in LDAP and a group > in Guacamole, and then the application is able to reconcile the groups. -- This message was sent by Atlassian Jira (v8.20.10#820010)