-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
As an administrator, I would like LDAP authenticated users to automatically have accounts created on my system so that I can automate this process. #19
Comments
It appears not, but I'm working on a PR to implement this. |
Hello! I think the better way to do this would be to use nss_ldap + pam_ldap to make all users on ldap 'automagically' have local accounts on the machine. That's what we do at wikimedia. http://www.tldp.org/HOWTO/archived/LDAP-Implementation-HOWTO/pamnss.html is a decent guide. This has the following advantages over creating local accounts here:
Can you think of any advantages that putting account creation in ldapauthenticator would have, over using this setup? Thanks! |
@yuvipanda You definitely bring up some good points, however I see a few disadvantages as well:
I modeled this implementation for ldapauthenticator after the oauthenticator. |
Can you explain what you mean by possibility of conflict with sudospawner? Securitywise, I'd be very tempted to just say 'no' in this context - If you really want to not use pam_ldap + nss_ldap, I'd recommend creating a On Thu, Sep 1, 2016 at 11:23 AM, Ben Hosmer notifications@github.com
Yuvi Panda T |
I can also write up a doc on how to setup pam_ldap + nss_ldap along with On Thu, Sep 1, 2016 at 11:52 AM, Yuvi Panda yuvipanda@gmail.com wrote:
Yuvi Panda T |
It's not a matter of not knowing how to implement PAM, LDAP, and NSS, it's more of the added complexity. Yeah, I certainly agree they're probably more secure than this smaller project will be. ldapauthenticator could still be used even for a non-root user though if the user that is running hub has sudo privileges to |
@yuvipanda before I go a create a separate module, I want to make sure this PR isn't going anywhere. What about the oauthenticator? Even for the sake of uniformity across jupyterhub? |
I think it might make more sense in OAuthenticator, since there's no To recap,
Thank you for talking it through, and I hope I have been able to On Thu, Sep 1, 2016 at 12:58 PM, Ben Hosmer notifications@github.com
Yuvi Panda T |
Your reasoning is sound. Thanks for the engagement on this. I'll likely create a small module that extends the ldapauthenticator initially. |
yw! I wonder if you can just do this in your jupyterhub_config file itself. On Thu, Sep 1, 2016 at 5:14 PM, Ben Hosmer notifications@github.com wrote:
Yuvi Panda T |
I'm curious, what would this look like in the config file? |
@benhosmer, @yuvipanda please share the config file |
I never got it to work in the config file. I imagine you could just do something similar to this:
Or just |
@venkatchetkuri You may wish to look at https://github.com/bloomberg/jupyterhub-kdcauthenticator to see if it would fulfill your requirements. |
@willingc Here is my use case: What i did so far on a single machine is :
Error message when I'm trying to run : [C 2017-06-27 21:10:31.135 JupyterHub application:90] Bad config encountered during initialization: Being a newbie to Jupyter/Spark and Kerberos, I'm not able figure out what I'm missing. Here I am attaching the overall architecture and the configuration files of livy and jupyterhub. |
Hi, I hope this isn't an off-topic, but I would really appreciate such a guide, or a push in the right direction, and this issue seems to be exactly about the problem I am experiencing. I've managed to get nslcd to work, and I am even able to log in to JupyterHub via PAM+LDAP, but as soon as I'm in, I get the following error:
I had the same issue even when I had used the LDAP-plugin for JupyterHub, but since the user in question is in the right group, that has access to the Anaconda folder, I am assuming this has to do with PAM-configuration? There I am truly lost, so any suggestions would be welcome. Almost all users simply get an error that their home folder does not exist... Thanks in advance! |
@yuvipanda does this apply to windows platform as well? |
There is an alternative ldap authenticator with user home creation support, but a little bit outdated: |
Using the LDAP authenticator, I'm able to authenticate users.
For example, the user exists in the LDAP server and also has a linux user account on the hub server. Login and authentication works fine.
If a user exists in the LDAP server though but does not have a corresponding linux system account on the hub, I get the following error:
Can the LDAP authenticator be used with the PAM/LocalAuthenticator capabalities and create this user if they don't exist?
The text was updated successfully, but these errors were encountered: