Skip to content
This repository has been archived by the owner on Feb 16, 2023. It is now read-only.

Additional parameters for header authentication #1386

Closed
oeiber opened this issue Oct 13, 2021 · 3 comments
Closed

Additional parameters for header authentication #1386

oeiber opened this issue Oct 13, 2021 · 3 comments

Comments

@oeiber
Copy link

oeiber commented Oct 13, 2021

In addition to
#260
it would be nice if there where an option to restrict header auth to ip addresses of trusted proxies, only.
It would also be nice if there where an option to pass the full name of the user and also for its email address.

@amenk
Copy link
Contributor

amenk commented Oct 31, 2021

What would be your use case and how would you test that?

I guess you have a SSO-proxy and want to allow only requests from that one? Not sure if this needs to be handled in paperless NG - you might also be able to put an IP filter in front of paperless-ng? Which setup are you using? docker?

@ybizeul
Copy link

ybizeul commented Feb 13, 2022

Piling up on this, but I'm not sure I understand the documentation regarding the various proxy settings, especially PAPERLESS_ENABLE_HTTP_REMOTE_USER which states 'If you’re exposing paperless to the internet directly, do not use this.'. But I guess I'm not exposing it to internet directly as I use a proxy...

In my case, I'm using Traefik and Authelia for authentication and OTP, works like a charm, but I'd like to push it further and propulate the username authenticated directly to paperless and bypass authentication.

The thing is, I'm afraid that anyone pushing Remote-User: <username> on my LAN would gain access to that user without a password. So I guess we're back to @oeiber comment, I would like to be sure Paperless-ng only accepts requests from traefik.

@oeiber oeiber closed this as completed Nov 28, 2022
@ybizeul
Copy link

ybizeul commented Nov 28, 2022

Is there a ref for this change ?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants