-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Single Sign On (SSO) for Windows Enterprise Users #66
Comments
The plan is to make this be as simple as possible. Just 2 check box clicks First check box click. So far so good. This is now working with Waffle Servlet Single-SignOn Security Filter 1.9.1 and is way more easier than Kerberos with Spark. It however does requires Openfire to be installed on a Windows server that belongs to the Active Directory domain we intend to authenticate against and also because Waffle uses Windows DLLs. This is the majority of use cases for AD integration. The server-side logic to this is all in the Openfire Chat API plugin. It exposes a SASL mechanism called OFCHAT which has to be enabled. Second check box click Thats it!! Jetty does the heavy lifting and single sign on between Pade and Openfire. No password is required or exchanged between them. A session token is cached in browser and reused by Converse, Jitsi-Meet and Rest API authentication. @guusdk : We discussed the in Montreal. What do you think? |
This issue is re-opened in response to a request at the Ignite Realtime weekly meeting to support corporate deployment of Pàdé with Windows SSO to many employees in a single simple effort. The issues identified are:
A possible solution with branding was identified in #89 However, this does not cover the majority use case of using the stock Pade@Work version available from the Chrome Web Store. |
In order to perform a zero-config of Pade@Work with Windows SSO, implement the following strategy
|
This is now implemented in version 0.8.0 You would need a file called pade.json in OPENFIRE_HOME/resources/spank. The minimum parameters are
Make sure Openfire Meetings is already opened in any browser tab. If not and you get the Pàdé options/login page, simply re-install Pàdé after opening the page. If all goes well, Pàdé should be auto-configured with the same openfire server as Openfire Meetings and the user configured as the Windows desktop user. |
Use the Waffle library to implement SSO for Windows Active Directory Users
See https://github.com/Waffle/waffle
The text was updated successfully, but these errors were encountered: