Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LDAP Centralized Authentication #73

Open
Zamanry opened this issue Aug 29, 2022 · 3 comments
Open

LDAP Centralized Authentication #73

Zamanry opened this issue Aug 29, 2022 · 3 comments
Labels
enhancement New feature or request
Projects
Milestone

Comments

@Zamanry
Copy link

Zamanry commented Aug 29, 2022

Hello, love the project! My company has been using Cracklord for years. We would like to deploy a Python based tooling like this repository on our cracking systems. However, we need to have it Active Directory connected. Have you considered adding LDAP and LDAPS support? Would love this feature in addition to adding local accounts.

@i128
Copy link
Contributor

i128 commented Aug 30, 2022

Yes, this is something we'd love to implement in the future. I don't think it'll be in the next release, but hopefully down the road it will be.

@i128 i128 added the enhancement New feature or request label Aug 30, 2022
@i128 i128 added this to the v0.8.2 milestone Aug 30, 2022
@Yoshi325 Yoshi325 added this to On Deck in v0.8.2 Jan 17, 2023
@tautology0
Copy link

Can I add a +1 for this - we're looking at migrating from crackerjack to hashview; but the lack of LDAP is a big sticking point.

@i128
Copy link
Contributor

i128 commented May 7, 2024

So I think one of the challenges i need to figure out is how to handle multiple scenarios for different authentication backends.

  1. database
  2. on prem LDAP
  3. Azure/Entra

Things to consider,

  • How do we handle access to the app if 2/3 are in accessible.
  • Currently users are assigned a unique id in the DB. From there objects created within hashview are associated with those user id's. Wordlists, tasks, etc. How does switching to LDAP/Azure/Entra affect that. Do we still add users to a local database and then just point to the 3rd party for authentication? Do we require a unique ldap attribute as the user id for object ownership?
  • What happens when a user is removed from AD? what happens to the objects in hashview? currently, when a user is removed from the database, a flow is triggered to remove any associated wordlists/rules, etc. Perhaps an option would be to re-assign them, but to whom? an admin?
  • Do we keep admins as local auth against a db?

lets say this is all answered and solved. Then we need to figure out how to migrate existing users to ldap users, or at least their object ownership.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
v0.8.2
On Deck
Development

No branches or pull requests

3 participants