rport icon indicating copy to clipboard operation
rport copied to clipboard

ldap auth support available?

Open miconx opened this issue 2 years ago • 5 comments

is there any auth option for ldap servers? only can find local db or local file in docs

miconx avatar Jul 24 '22 11:07 miconx

@miconx Shorty we will start implementing SSO. The first implementation will be based on oAuth and SAML will follow. Very likely, we will never implement a direct connection with an LDAP server. We consider this insecure because the cleartext password of the user will be accessible from the RPort server. You would have to install an OAuth add-on on top of your LDAP server that can issue tokens.

thorstenkramm avatar Jul 25 '22 10:07 thorstenkramm

ok i see - just cannot understand the argument that LDAP should be insecure ? its secured via TLS - there is no cleartext password in transit at all ???

miconx avatar Jul 25 '22 18:07 miconx

@miconx If the LDAP is located “behind” the RPort server, the users must enter the password on the RPort User Interface. The password is sent encrypted by TLS, but the rport server will decrypt it immediately. This is how all web servers work. From now on, the password is an encrypted variable inside the running web server. Anyone who has shell access to the rport server can manipulate the server easily to log all entered passwords to a log file. How the communication to the LDAP server is secured doesn't matter.

thorstenkramm avatar Jul 26 '22 08:07 thorstenkramm

It's super fine with Oauth and SAML. it will be perfect to have that functionality.

We use the RportCLI tool a lot, it would be great if SAML and Oauth were also implemented when using the rportcli tool.

msbusk avatar Jul 26 '22 14:07 msbusk

@thorstenkramm - LDAP is pretty scary by itself, but LDAPS should provide coverage for the cleartext data transfer concern while something like RADIUS with its various EAP paradigms can be used to effect MFA via the various MFA proxies from Duo/Okta/etc (though at least Okta fails miserably with anything other than PAP in the EAP). If you're looking for authentication vs attribution, then the directory-level entrypoint is probably not the best one and leveraging RADIUS which is fairly common existing infrastructure may provide a "safer" integration with legacy stacks.

sempervictus avatar Aug 28 '22 14:08 sempervictus