-
Notifications
You must be signed in to change notification settings - Fork 0
With ldap auth #10
base: master
Are you sure you want to change the base?
With ldap auth #10
Conversation
node-cron is still missing - needs to send Emails to all users |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The implementation now looks better. I will take a closer look at it tomorrow and test it. Thanks
@JannikZed I know this would need another round of refactoring but could you take a look at passport and the corresponding LDAP strategy http://www.passportjs.org/packages/passport-ldapauth/ please? Passport seems to have a broader community and is also used in some bigger projects like codimd. User groups search/filter should work as well see vesse/passport-ldapauth#10 and https://github.com/vesse/node-ldapauth-fork#ldapauth-config-options |
I'm using right now our own fork of https://github.com/shaozi/ldap-authentication - this is just temporary, as I'm just waiting for the newest version to be published to npm. Will replace it with the official library afterwards. This library is actually just a little wrapper around the official LDAP.js library https://github.com/ldapjs/node-ldapjs - it is the same with most other libaries like passport-ldapauth (the pure communication with the ldap server is always done using node-ldapjs or forks from it). The library I use has just way less overhead, as we don't need the passport features (we are using next-auth, the official next.js authentication library). |
Thanks for the explanation. I'll give it a test 👍 |
Still not working for me as expected:
|
what is the expected behaviour when no groups lookup is used? The frontend will not allow any view on the frontend when a user is not part of the needed groups. |
Without groups lookup every valid LDAP user is able to use the full app. That's how it should work. A common workflow is to configure an LDAP group filter as an admin e.g. |
alright. Will implement it like this. |
using LDAP without Admin user is now no longer possible. So searching as normal user will not happen again. Not defining the groups make the dashboard just allow all groups. |
Thanks a lot. I'll test it. You removed a bit too many defaults now :) Could you add back:
|
Edit: Found it, it's already there. Maybe it was not really clear from my site but now just |
It's still not working. With disabled groups lookup: In this case the error is also still in the url...
With enabled groups lookup:
|
For me it looks like the issue is related to the library https://github.com/shaozi/ldap-authentication/blob/master/index.js#L186 Even in |
Ok will check it out. Let's have a quick call next week 🙃
…On 17. Sep 2020, 16:49 +0200, Robert Kaussow ***@***.***>, wrote:
For me it looks like the issue is related to the library https://github.com/shaozi/ldap-authentication/blob/master/index.js#L186 Even in authenticateWithAdmin the group search is done with the ldapUserClient instead of the ldapAdminClient
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
Sure, just write me a mail. We're getting closer 🤞 |
@xoxys please test it again - LDAP group lookup should be done with admin user now. |
Thanks, I'll look into this next week. |
@JannikZed still not working.... See below. Btw. in such case I still got error messages in the address bar:
|
Looks like this error only occurs if |
I've also noticed that the /import route is not group filtered right now, that should be added too. |
That's all secondary stuff.. Will add that later - could you first verify the group lookup please?
…On 6. Oct 2020, 11:56 +0200, Robert Kaussow ***@***.***>, wrote:
I've also noticed that the /import route is not group filtered right now, that should be added too.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
Group lookup and limiting access seems to be working |
updated everything as requested. Switched also back to the official LDAP package now, as my pull request got merged. |
any updates ? :) |
this pull request adds full LDAP support for the Kimai Dashboard. All user settings get scoped