On Wed, Mar 19, 2025 at 1:00 PM Craig Huckabee <[email protected]> wrote:
>
> > On Mar 19, 2025, at 12:12, Quanah Gibson-Mount <[email protected]> wrote:
> >
> > --On Monday, March 17, 2025 10:28 AM -0400 BuzzSaw Code 
> > <[email protected]> wrote:
> >
> >> We have an existing set of RHEL8 servers running the 2.4.x version of
> >> OpenLDAP - we can't upgrade to the latest version due to other
> >> dependencies.
> >>
> >> I'm trying to solve a problem where we want to use our 2FA
> >> authentication (which is OTP based on RADIUS) with some devices and
> >> applications that don't support RADIUS at all, but they *do* support
> >> LDAP authentication.
> >>
> >> I've read about using the SASL, but since that requires replacing the
> >> userPassword attribute for each user it won't work as I have to do
> >> this without breaking straight username/password binds for users.
> >
> > If you're talking about SASL pass through authentication, yes. If you're 
> > talking about normal SASL mechanisms like cert auth, Kerberos, etc, that is 
> > not correct.  What is it that you think "SASL" (whatever that means) will 
> > solve as a problem?
> >
>
> I’m talking about pass through authentication that uses saslauthd.
>
> It solves the problem I tried to describe - I want to use our RADIUS based 
> 2FA system for authentication (Yubikey) with systems that don’t support 
> RADIUS but do support LDAP authentication.

Off-topic (or maybe related): it took me quite some time to find a
developer oriented discussion list for YubiKeys. If you need one, it
is located at fido-dev Google Group,
<https://groups.google.com/a/fidoalliance.org/g/fido-dev>.

(I'm especially interested in using YubiKeys and leveraging the
public/private key crypto parts from FIDO2 and WebAuthn protocols for
non-web based applications).

> I can pass the username/password supplied in the LDAP bind request to RADIUS 
> utilizing saslauthd.
>
> But I want to do this in a way that maintains the standard username/password 
> binds as we have some systems where we don’t want to enforce 2FA.
>
> Rather than create a whole new LDAP infrastructure for this, I’d hoped to 
> user an overlay to create a new rPeople ou that was a translucent overlay of 
> the People ou, except for userPassword which would contain the required 
> information to trigger pass through authentication.
>
> It would be even better if we could offer pass through authentication or not 
> based on the IP/host name of the source for the bind attempt.
>
> If that’s not possible with openldap then we’ll look into alternatives.

Jeff

Reply via email to