Auth Basic Service Configuration
Introduction
The Infinite Scale Auth Basic service provides basic authentication for those clients who cannot handle OIDC. This is a rare case, is usually not necessary and mainly used for tests or development.
The auth-basic
service is responsible for validating authentication of incoming requests. To do so, it will use the configured auth manager
, see the Auth Managers
section. Only HTTP basic auth requests to ocis will involve the auth-basic
service.
To enable auth-basic
, you first must set PROXY_ENABLE_BASIC_AUTH
to true
.
The basic authentication implementation does not support cookies and is therefore not intended to be used for benchmarks. |
Auth Managers
Since the auth-basic
service does not do any validation itself, it needs to be configured with an authentication manager. One can use the AUTH_BASIC_AUTH_PROVIDER
environment variable to configure this.
Scalability
Scalability, just like memory and CPU consumption, are highly dependent on the configured auth manager. When using the recommended one which is "ldap"
, there is no persistance as requests will just be forwarded to the LDAP server. Therefore, multiple instances of the auth-basic
service can be started without further configuration. Be aware, that other auth managers might not allow that.
Configuration
Environment Variables
The auth-basic
service is configured via the following environment variables. Read the Environment Variable Types documentation for important details.
Deprecation Info | Deprecation Version | Removal Version | Deprecation Replacement |
---|---|---|---|
LDAP_BIND_PASSWORD changing name for consistency |
4.0.2 |
5.0.0 |
OCIS_LDAP_BIND_PASSWORD |
Name | Type | Default Value | Description |
---|---|---|---|
|
bool |
false |
Activates tracing. |
|
string |
|
The type of tracing. Defaults to '', which is the same as 'jaeger'. Allowed tracing types are 'jaeger' and '' as of now. |
|
string |
|
The endpoint of the tracing agent. |
|
string |
|
The HTTP endpoint for sending spans directly to a collector, i.e. http://jaeger-collector:14268/api/traces. Only used if the tracing endpoint is unset. |
|
string |
|
The log level. Valid values are: 'panic', 'fatal', 'error', 'warn', 'info', 'debug', 'trace'. |
|
bool |
false |
Activates pretty log output. |
|
bool |
false |
Activates colorized log output. |
|
string |
|
The path to the log file. Activates logging to this file if set. |
|
string |
127.0.0.1:9147 |
Bind address of the debug server, where metrics, health, config and debug endpoints will be exposed. |
|
string |
|
Token to secure the metrics endpoint. |
|
bool |
false |
Enables pprof, which can be used for profiling. |
|
bool |
false |
Enables zpages, which can be used for collecting and viewing traces in-memory. |
|
string |
127.0.0.1:9146 |
The bind address of the GRPC service. |
|
string |
tcp |
The transport protocol of the GRPC service. |
|
string |
|
The secret to mint and validate jwt tokens. |
|
string |
com.owncloud.api.gateway |
The CS3 gateway endpoint. |
|
string |
|
TLS mode for grpc connection to the go-micro based grpc services. Possible values are 'off', 'insecure' and 'on'. 'off': disables transport security for the clients. 'insecure' allows using transport security, but disables certificate verification (to be used with the autogenerated self-signed certificates). 'on' enables transport security, including server certificate verification. |
|
string |
|
Path/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the go-micro based grpc services. |
|
bool |
false |
Disables the encoding of the user’s group memberships in the reva access token. This reduces the token size, especially when users are members of a large number of groups. |
|
string |
ldap |
The authentication manager to check if credentials are valid. Supported value is 'ldap'. |
|
string |
ldaps://localhost:9235 |
URI of the LDAP Server to connect to. Supported URI schemes are 'ldaps://' and 'ldap://' |
|
string |
~/.ocis/idm/ldap.crt |
Path/File name for the root CA certificate (in PEM format) used to validate TLS server certificates of the LDAP service. If not defined, the root directory derives from $OCIS_BASE_DATA_PATH:/idm. |
|
bool |
false |
Disable TLS certificate validation for the LDAP connections. Do not set this in production environments. |
|
string |
uid=reva,ou=sysusers,o=libregraph-idm |
LDAP DN to use for simple bind authentication with the target LDAP server. |
|
string |
|
Password to use for authenticating the 'bind_dn'. |
|
string |
ou=users,o=libregraph-idm |
Search base DN for looking up LDAP users. |
|
string |
ou=groups,o=libregraph-idm |
Search base DN for looking up LDAP groups. |
|
string |
sub |
LDAP search scope to use when looking up users. Supported values are 'base', 'one' and 'sub'. |
|
string |
sub |
LDAP search scope to use when looking up groups. Supported values are 'base', 'one' and 'sub'. |
|
string |
|
LDAP filter to add to the default filters for user search like '(objectclass=ownCloud)'. |
|
string |
|
LDAP filter to add to the default filters for group searches. |
|
string |
inetOrgPerson |
The object class to use for users in the default user search filter ('inetOrgPerson'). |
|
string |
groupOfNames |
The object class to use for groups in the default group search filter ('groupOfNames'). |
|
[]string |
[uid] |
The user object attributes, that can be used for login. |
|
string |
https://localhost:9200 |
The identity provider value to set in the userids of the CS3 user objects for users returned by this user provider. |
|
string |
attribute |
An option to control the behavior for disabling users. Valid options are 'none', 'attribute' and 'group'. If set to 'group', disabling a user via API will add the user to the configured group for disabled users, if set to 'attribute' this will be done in the ldap user entry, if set to 'none' the disable request is not processed. |
|
string |
cn=DisabledUsersGroup,ou=groups,o=libregraph-idm |
The distinguished name of the group to which added users will be classified as disabled when 'disable_user_mechanism' is set to 'group'. |
|
string |
ownclouduuid |
LDAP Attribute to use as the unique ID for users. This should be a stable globally unique ID like a UUID. |
|
bool |
false |
Set this to true if the defined 'ID' attribute for users is of the 'OCTETSTRING' syntax. This is e.g. required when using the 'objectGUID' attribute of Active Directory for the user IDs. |
|
string |
LDAP Attribute to use for the email address of users. |
|
|
string |
displayname |
LDAP Attribute to use for the displayname of users. |
|
string |
uid |
LDAP Attribute to use for username of users. |
|
string |
ownCloudUserEnabled |
LDAP attribute to use as a flag telling if the user is enabled or disabled. |
|
string |
ownclouduuid |
LDAP Attribute to use as the unique id for groups. This should be a stable globally unique id (e.g. a UUID). |
|
bool |
false |
Set this to true if the defined 'id' attribute for groups is of the 'OCTETSTRING' syntax. This is e.g. required when using the 'objectGUID' attribute of Active Directory for the group IDs. |
|
string |
LDAP Attribute to use for the email address of groups (can be empty). |
|
|
string |
cn |
LDAP Attribute to use for the displayname of groups (often the same as groupname attribute). |
|
string |
cn |
LDAP Attribute to use for the name of groups. |
|
string |
member |
LDAP Attribute that is used for group members. |
|
string |
owncloud |
Database user to use for authenticating with the owncloud database. |
|
string |
|
Password for the database user. |
|
string |
mysql |
Hostname of the database server. |
|
int |
3306 |
Network port to use for the database connection. |
|
string |
owncloud |
Name of the owncloud database. |
|
string |
https://localhost:9200 |
The identity provider value to set in the userids of the CS3 user objects for users returned by this user provider. |
|
int64 |
90 |
Fallback number if no numeric UID and GID properties are provided. |
|
bool |
false |
Join the user properties table to read usernames |
|
bool |
false |
Join the user properties table to read user ID’s. |
YAML Example
Note that the filename shown below has been chosen on purpose.
See the Configuration File Naming for details when setting up your own configuration.
# Autogenerated
# Filename: auth-basic-config-example.yaml
tracing:
enabled: false
type: ""
endpoint: ""
collector: ""
log:
level: ""
pretty: false
color: false
file: ""
debug:
addr: 127.0.0.1:9147
token: ""
pprof: false
zpages: false
grpc:
addr: 127.0.0.1:9146
tls: null
protocol: tcp
token_manager:
jwt_secret: ""
reva:
address: com.owncloud.api.gateway
tls:
mode: ""
cacert: ""
skip_user_groups_in_token: false
auth_provider: ldap
auth_providers:
ldap:
uri: ldaps://localhost:9235
ca_cert: ~/.ocis/idm/ldap.crt
insecure: false
bind_dn: uid=reva,ou=sysusers,o=libregraph-idm
bind_password: ""
user_base_dn: ou=users,o=libregraph-idm
group_base_dn: ou=groups,o=libregraph-idm
user_scope: sub
group_scope: sub
user_filter: ""
group_filter: ""
user_object_class: inetOrgPerson
group_object_class: groupOfNames
login_attributes:
- uid
idp: https://localhost:9200
disable_user_mechanism: attribute
ldap_disabled_users_group_dn: cn=DisabledUsersGroup,ou=groups,o=libregraph-idm
user_schema:
id: ownclouduuid
id_is_octet_string: false
mail: mail
display_name: displayname
user_name: uid
user_enabled: ownCloudUserEnabled
group_schema:
id: ownclouduuid
id_is_octet_string: false
mail: mail
display_name: cn
group_name: cn
member: member
owncloudsql:
db_username: owncloud
db_password: ""
db_host: mysql
db_port: 3306
db_name: owncloud
idp: https://localhost:9200
nobody: 90
join_username: false
join_owncloud_uuid: false