Hi, Contributions of ne Authenitcation Plugins are surely welcome. Please open a JIRA issue to get started. You may also find this wiki page useful: http://wiki.apache.org/solr/HowToContribute
In general, it is preferred to communicate open and frequently with the community about a feature, rather than developing everything in-house and then dumping a huge patch. -- Jan Høydahl, search solution architect Cominvent AS - www.cominvent.com > 6. apr. 2016 kl. 16.46 skrev Davis, Daniel (NIH/NLM) [C] > <daniel.da...@nih.gov>: > > I'm bordering on development post, but I want to write an Authentication > Plugin that uses Proxy Authentication and a White List. > So, it will accept a request header such as REMOTE_USER as the username from > certain hosts, by default 127.0.0.1, ::1. > I also thought about having a whitelist of IPs that are assumed to be > "admin", to make the CLI more usable. > > -----Original Message----- > From: Jan Høydahl [mailto:jan....@cominvent.com] > Sent: Wednesday, April 06, 2016 4:18 AM > To: solr-user@lucene.apache.org > Subject: Re: BYOPW in security.json > > Hi > > Note that storing the user names and passwords in security.json is just one > implementation, to easily get started. It uses the > Sha256AuthenticationProvider class, which is pluggable. That means that if > you require Basic Auth with some form of self-service management, you > could/should add another AuthenticationProvider (implement interface > BasicAuthPlugin.AuthenticationProvider which e.g. pulls valid users and > passwords from a database or some other source that you control. Or perhaps > your organization uses LDAP already, it would be convenient to create an > LDAPAuthenticationProvider. > > I would not recommend adding such complexity to the existing json backed user > list, although it has the benefit of beting 100% self contained. > > -- > Jan Høydahl, search solution architect > Cominvent AS - www.cominvent.com > >> 18. mar. 2016 kl. 23.30 skrev Oakley, Craig (NIH/NLM/NCBI) [C] >> <craig.oak...@nih.gov>: >> >> When using security.json (in Solr 5.4.1 for instance), is there a >> recommended method to allow users to change their own passwords? We >> certainly would not want to grant blanket security-edit to all users; but >> requiring users to divulge their intended passwords (in Email or by other >> means) to the administrators of the Solr installation is also arguably less >> than optimal. It is unclear whether one could setup (for each individual >> user: "user1" in this example) something like: >> >> "set-permission": {"name":"edit_pwd_user1", >> "path":"/admin/authentication", >> "params":{"command":[set-user],"login":[user1]}, >> "role": "edit_pw_user1"} >> "set-user-role": {"user1": ["edit_pw_user1","other","roles","here"]} >> >> One point that is unclear would be whether "command" and "login" are the >> correct strings in the third line of the example above: would they instead >> be "cmd" and "user"? "action" and "username"? something else? >> >> Even if this worked when implemented for each individual login, it would be >> nice to be able to say once and for all "every login can edit its own >> password". >> >> There could be ways to create a utility which would change the OS-ownership >> of its own process in order to decrypt a file containing the >> Solr-admin-password, and to use that to set the password of the Solr login >> which matched the OS login which initiated the process; but before embarking >> on developing such a utility, I thought I would ask whether there were other >> suggestions. >