Replies: 1 comment 3 replies
-
|
Hi @gnieser Thank you very much for your idea! That's a great idea! My biggest problem here is deciding which of the possible solutions is the best. From my understanding/knowledge, we would have at least LDAP, OIDC, and SAML. By biggest problem with the LDAP integration in Symfony (the framework we've used for mosparo) is that it is only compatible with one LDAP server, so if you use multiple (failover) servers in an enterprise environment, adding LDAP means that we would have to build the logic to handle multiple servers which is not a simple thing to do (we did it in a project for my employeer). OIDC or SAML would not have this problem, but all these technologies require some work. From this perspective, I would try to integrate only one solution (at least as a start) to limit the complexity. Since OIDC is integrated more or less directly into Symfony, I prefer this one. I think disabling the internal user system should be done with an environment variable. The process for this is that you install mosparo as it is for now (with the internal user management) and create an admin user there. After that, you can enable the external user management and (optionally) turn off the internal user management. In case of an emergency, you could re-enable the internal user management and log in with the admin user. With this method, we can make sure that logging in via the internal system is completely blocked (if required, when the env variable is enabled). What do you think? Kind regards, |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
Currently, mosparo uses internal storage for user management. I think it would be a valuable addition to support user federation through external identity providers, especially in enterprise context, via LDAP and/or OIDC.
It would allow users to authenticate using their existing credentials (Active Directory, Keycloak, Azure AD, Okta, etc.)
Additionally, though more complex, it could also leverage user groups/roles from external providers and map them to mosparo’s permission model, further streamlining access control.
I’d be happy to discuss further configuration details and help refine the approach.
E.g.: ability to disable internal users to enforce federation and ability to re-activate a backup admin account in case the federation is broken.
Kind regards
Beta Was this translation helpful? Give feedback.
All reactions