-
Notifications
You must be signed in to change notification settings - Fork 357
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Additional Cloud Identity Providers for Login #658
Comments
Hi @RRohi - I agree. I've had this on the list for quite a while. One item of note:
This should be the case now. For Password pushes, to receive through a secret URL, no login is required. Did you possibly add custom authentication? On everything else I'm in agreement. Hopefully I can get to this sooner than later. |
The issue with the current implementation is, for us, that In the last sentence, I summarized how we would like it to end up working, as a whole, which is why I added the anonymous bit, although it already works. So, the focus is still on being able to use external authentication providers. |
This is mostly a duplicate of #410 |
@RRohi consider using a reverse proxy and splitting the password generation portal and password viewing functionality onto different domains and protect the first with an Azure Application Proxy. That's what we have been doing in testing. Let me know if you're interested in NGINX configuration on how to do this. |
@Viajaz I would like to see the nginx configuration please. |
If you need it, there is a generic nginx example here: https://github.com/pglombardo/PasswordPusher/tree/master/containers/examples/pwpush-and-nginx |
@Viajaz , is this also achievable in Azure ? I'm running now the application in Azure with APP service plan + Web + docker. Could you please give more info about splitting? |
@clahil-linum @burak40
|
I'm investigating expanding the authentication system and re-reading some of this feedback. Hopefully I'll have something tangible soon. I did notice one point re: @RRohi
As a temporary bandaid you can set the environment variable If it might help, documentation is here. |
Two updates for this issue:
Once SSO is in the OSS code base, you should be able to create a client app, add credentials and limit who can access the application. The two feature requests for SSO & OpenID are #1609 & #410. I'll update those two issue when everything is out in the OSS version. If nothing remains here, I'll close out this issue soon. Let me know if otherwise! |
🚀 Feature Request
Allow configuration of identity sources from cloud identity providers, such as Azure Active Directory (AAD) and the like.
🔈 Motivation
PasswordPusher currently has a login feature, that largely functions as we need it to, but the users are local, which is not great. We would rather take users from AAD, using groups.
I've set up PasswordPusher in Azure, using the following guide: #277 (comment)
I configured authentication on the app level, but the problem here is that the one who receives the password would also have to authenticate and that is not how we want it to work.
We want our users to authenticate, via our cloud directory, to use the service, and the password receivers to access the page anonymously.
🛰 Alternatives
📎 Additional context
The text was updated successfully, but these errors were encountered: