Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remote auth: Take user groups from a header #5217

Open
jgraichen opened this issue Apr 18, 2024 · 0 comments
Open

Remote auth: Take user groups from a header #5217

jgraichen opened this issue Apr 18, 2024 · 0 comments

Comments

@jgraichen
Copy link

Remote authentication using the X-Remote-User header creates a user on demand but does not support assigning groups.

Describe the solution you'd like

Configuring a second header, e.g. X-Remote-Groups, with the list of groups a user should have, would ease mapping group memberships from remote auth, such as OIDC or SAML.

For example:

X-Remote-User: john
X-Remote-Groups: administrator, service-a-manager

Describe alternatives you've considered

The documentation recommends setting up LDAP group sync, but that would require LDAP infrastructure to be present and to contain the users and groups. In many modern environments, that might not be given anymore, e.g. users are managed on IdPs, such as Entrea ID, Octa, GitHub, Google, or Authentik. Some might offer LDAP endpoints, which would need extra configuration, but others do not.

Maintaining a standalone LDAP only for Icingaweb2 group mappings is tedious, or impossible, if users are not known upfront.

Additional context

The header could be specified in a configuration, and, if no header is configured, nothing would happen.

If the header must contain all groups for user, it would support addition and removal, or only stored in the session/not at all.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant