Hey everyone,
How do you do user management, I have a small handful of users that want one password for physical machines and for web apps. I was looking at KanIDM but I was wondering what other people use?
Submitted 1 year ago by Sandbag@lemmy.world to selfhosted@lemmy.world
Hey everyone,
How do you do user management, I have a small handful of users that want one password for physical machines and for web apps. I was looking at KanIDM but I was wondering what other people use?
Is ideal for small self-hosters.
I use an LDAP server, as it’s pretty much designed for exactly this task. You can tell PAM to authenticate and authorise from it to manage logins to the physical machines, and web apps typically either have a straightforward way to use LDAP, or support ‘external’ auth, with your web server handling the authentication and authorisation for it.
OpenLDAP is a solid, easily self hosted server. If you like working from the shell it has everything you need. If you prefer a GUI there are a variety of desktop and web based management frontends available.
I’ve been toying with the idea of standing it up. Any recommendations for the GUI side?
I use openLDAP + LDAP Account Manager and Self-service password. Deployed/managed thorugh this ansible role
I confess I normally work from the command line, but I have set up LDAPAdmim for projects where others needed to manage the directory, and it worked pretty well.
I don’t have the exactly solution for you, but I went through this a while ago and came up with using openLDAP for this. It’s not tidy at all, but it was a tremendous learning experience, and I documented it in 2 blog posts which may be interesting to you; I doubt you’ll want to do what I did, but it was informative and has worked flawlessly since. I documented some of the flaws I found in options I considered at the time:
surfrock66.com/my-experience-guide-setting-up-ope… surfrock66.com/openldap-kerberos-and-sasl-my-expe…
I would recommend keycloak. I can basically do everything related to webapps authentication (OIDC, 2FA, etc)… except working as an LDAP/AD server, which typically used to enable login to physical machine using the network account. But, it has built-in LDAP provider support, which mean you can use OpenLDAP to host the accounts of your users (so they can use LDAP authentication on their own machine), and point keycloak to that OpenLDAP instance to allow your users to login to your webapps using their OpenLDAP account.
Keycloak is nice, but probably overkill for what OP needs. Keep it simple.
Have a look at www.keycloak.org
tun@lemm.ee 1 year ago
github.com/authelia/authelia
phundrak@programming.dev 1 year ago
I use it for quite a few of my services, it’s ready effective! And not that hard to set up, though I haven’t tried to make it work with an LDAP service yes.
seang96@spgrn.com 1 year ago
I got it set up with LDAP and a web front end to configure LDAP users. Works really nice. If only my services supported with with it.