-
Notifications
You must be signed in to change notification settings - Fork 647
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IP-Mapping #1143
IP-Mapping #1143
Conversation
|
I think we should be careful with adding this, my first impression is that this has a high risk of breaking at some point in time and might not provide what people might think. |
|
@AdSchellevis this should always work: Login page (is also available when not logged in): The screenshot has been taken on by dev machine where I had the password in plaintext and the volt is still cached but anyone can login here (if he has the right credentials for the selected auth server for password based authentication - other mechanisms may be added later) After login, you will get this view: Configuration: The authorization daemon maps users and groups to aliases and it will clear them if they expire. The user type should always work but groups need to be available - this is what Local Database provides if you merge my core PR. The view of the aliases: |
|
@AdSchellevis Just forgot to add the answer for your question about the scenario: I can make firewall rules like @fabianfrz is allowed to access TCP/22 on the internet. |
|
Maybe it's only the name of the feature at the moment, as an enduser I would expect something that integrates with the network in some way (802.1x, proxy/ntlm, etc). This looks like something that's more aimed at certain expert groups in the network that can elevate rights using an additional login feature. Technically I do have some doubts about the solution, but for the plugins we're less strict. @fichtner what do you think? |
|
In Enterprise environments this is a common feature, but usually a small daemon installed on a DC which synchronize user/ip mappings to firewall. |
|
@MichaelDeciso I know, but I just don't think we're getting there this way... |
|
Feels like a backend emulation of the captive portal without a practical user-facing frontend == non-functional requirement and no proper use case. I still believe this is highly non-trivial to implement. |
|
@fichtner The web frontend is not very practical but I want to build a local client which does it in the background. That's the advantage of the API. |
|
Since the small QT issue has been fixed recently: https://bugreports.qt.io/browse/QTBUG-73443 The authenticator is here: https://github.com/fabianfrz/usermapping-authenticator |
|
That would be a must have feature for enterprise networks. |
|
Currently this seems to be out of scope for our solution. Maybe eventually we can think of a more standardised without requiring distribution of external software. |
|
how do you see the authentication without external tools? This type of functionality is, in my opinion, as essential for the individual concerned with his security and the minimum for a company. |






@fichtner Regarding difficulty: told you so ;)
Forum: https://forum.opnsense.org/index.php?topic=10861.0