GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    silverwizard (silverwizard@convenient.email)'s status on Tuesday, 15-Nov-2022 23:33:56 JST silverwizard silverwizard
    Anyone have any advice for a #HomeLab #LDAP server?

    I think I am getting to the point that I want my local resources to have SSO

    I'd especially appreciate advice on having two endpoints so that I can have failover easily enabled
    In conversation Tuesday, 15-Nov-2022 23:33:56 JST from convenient.email permalink
    • Embed this notice
      Steve Lord (stevelord@bladerunner.social)'s status on Tuesday, 15-Nov-2022 23:44:11 JST Steve Lord Steve Lord
      in reply to

      @silverwizard maybe integrate openldap with something like keycloak? It's a bit of a faff but it means you get proper SSO out of it and anything LDAP only can fall back to LDAP.

      In conversation Tuesday, 15-Nov-2022 23:44:11 JST permalink
      silverwizard likes this.
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Tuesday, 15-Nov-2022 23:49:11 JST silverwizard silverwizard
      in reply to
      • Steve Lord
      @stevelord not sure what the main use of keycloak in the stack is based on a few seconds of reading.
      In conversation Tuesday, 15-Nov-2022 23:49:11 JST permalink
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Wednesday, 16-Nov-2022 00:38:30 JST silverwizard silverwizard
      in reply to
      • Steve Lord
      @stevelord Oh! Sure that makes sense!

      That definitely is a good frontend for if things in my stack don't LDAP - but I think most of them do. But good tip.
      In conversation Wednesday, 16-Nov-2022 00:38:30 JST permalink
    • Embed this notice
      Steve Lord (stevelord@bladerunner.social)'s status on Wednesday, 16-Nov-2022 00:38:31 JST Steve Lord Steve Lord
      in reply to

      @silverwizard Keycloak handles OIDC, SAML etc. which is the SSO bit. If you don't have services that use those and LDAP is fine, just stick with OpenLDAP.

      In conversation Wednesday, 16-Nov-2022 00:38:31 JST permalink
      silverwizard likes this.
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Wednesday, 16-Nov-2022 02:37:38 JST silverwizard silverwizard
      in reply to
      • Matt Knight
      @mattknight Really?! Gitea as author provider eeeeeeh? Considering git.obscuritus.ca that might be useful!
      In conversation Wednesday, 16-Nov-2022 02:37:38 JST permalink

      Attachments


    • Embed this notice
      Matt Knight (mattknight@mastodon.online)'s status on Wednesday, 16-Nov-2022 02:37:40 JST Matt Knight Matt Knight
      in reply to

      @silverwizard my very basic system uses Gitea as an auth provider. Works with some services like Drone and Outline. Not sure if that helps at all, but it's simple.

      In conversation Wednesday, 16-Nov-2022 02:37:40 JST permalink
      silverwizard likes this.
    • Embed this notice
      Matt Knight (mattknight@mastodon.online)'s status on Wednesday, 16-Nov-2022 03:01:27 JST Matt Knight Matt Knight
      in reply to

      @silverwizard indeed! Worth exploring if it would satisfy your needs at least, especially if you have an existing instant already running!

      In conversation Wednesday, 16-Nov-2022 03:01:27 JST permalink
      silverwizard likes this.
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Wednesday, 16-Nov-2022 03:02:04 JST silverwizard silverwizard
      in reply to
      • Matt Knight
      @mattknight This is why I ask people things!
      In conversation Wednesday, 16-Nov-2022 03:02:04 JST permalink
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Wednesday, 16-Nov-2022 09:53:30 JST silverwizard silverwizard
      in reply to
      • p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:
      • M. Hamzah Khan
      @mhamzahkhan @projectdp I mean, any SSO would be a headache - more than OpenLDAP or anything else?

      My headache tolerance is shockingly high to be clear
      In conversation Wednesday, 16-Nov-2022 09:53:30 JST permalink
    • Embed this notice
      M. Hamzah Khan (mhamzahkhan@intahnet.co.uk)'s status on Wednesday, 16-Nov-2022 09:53:31 JST M. Hamzah Khan M. Hamzah Khan
      in reply to
      • p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:

      @projectdp @silverwizard I'm using #FreeIPA in my #homelab. It works, but it can sometimes be a bit of a headache to maintain.

      In conversation Wednesday, 16-Nov-2022 09:53:31 JST permalink
    • Embed this notice
      p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple: (projectdp@infosec.exchange)'s status on Wednesday, 16-Nov-2022 09:53:32 JST p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple: p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:
      in reply to
      • Matt Knight

      @silverwizard @mattknight I haven't tried these but have been meaning to: https://glauth.github.io/ and https://www.freeipa.org/

      In conversation Wednesday, 16-Nov-2022 09:53:32 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: glauth.github.io
        GLAuth
      2. No result found on File_thumbnail lookup.
        FreeIPA
    • Embed this notice
      p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple: (projectdp@infosec.exchange)'s status on Wednesday, 16-Nov-2022 10:25:02 JST p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple: p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:
      in reply to
      • M. Hamzah Khan

      @mhamzahkhan @silverwizard That's good to hear about Keycloak I do want to try it out. What part about FreeIPA was annoying to maintain?

      In conversation Wednesday, 16-Nov-2022 10:25:02 JST permalink
      silverwizard likes this.
    • Embed this notice
      M. Hamzah Khan (mhamzahkhan@intahnet.co.uk)'s status on Wednesday, 16-Nov-2022 10:25:03 JST M. Hamzah Khan M. Hamzah Khan
      in reply to
      • p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:

      @projectdp @silverwizard I'm using Keycloak with FreeIPA at the moment.

      I like Keycloak. It just sits there and quietly does its thing with very little TLC from me. ?

      In conversation Wednesday, 16-Nov-2022 10:25:03 JST permalink
      silverwizard likes this.
    • Embed this notice
      p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple: (projectdp@infosec.exchange)'s status on Wednesday, 16-Nov-2022 10:25:05 JST p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple: p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:
      in reply to
      • M. Hamzah Khan

      @silverwizard @mhamzahkhan You could also look into Keycloak + (Open)LDAP for an SSO option. I'm thinking you could also run FreeIPA LDAP and set up Keycloak with that for a decent SSO setup for your lab.

      I'm still looking into options myself. There are a bunch of ways to do the internet-to-homelab proxying with solid SSO and security throughout and I haven't found out what works for me the best quite yet. Part of it is doing proper implementation of ZeroTrust principles throughout the entire process.

      In conversation Wednesday, 16-Nov-2022 10:25:05 JST permalink
      silverwizard likes this.
    • Embed this notice
      M. Hamzah Khan (mhamzahkhan@intahnet.co.uk)'s status on Wednesday, 16-Nov-2022 10:26:14 JST M. Hamzah Khan M. Hamzah Khan
      in reply to

      @silverwizard I don't want to make it sound like it's not a stable product.

      It definitely is. I've used it in a number of larger companies I've worked at. But for a homelab environment, in my experience, it's not something that can just be setup and left to run in the background. It needs a lot of caressing (and monitoring) ?

      In conversation Wednesday, 16-Nov-2022 10:26:14 JST permalink

      Attachments


      silverwizard likes this.
    • Embed this notice
      M. Hamzah Khan (mhamzahkhan@intahnet.co.uk)'s status on Wednesday, 16-Nov-2022 10:26:15 JST M. Hamzah Khan M. Hamzah Khan
      in reply to

      @silverwizard It's more of a headache than just OpenLDAP. FreeIPA has a lot of different components. It does LDAP, Kerberos, PKI, and DNS.

      I currently have my FreeIPA domain set up with 3 IPA replicas. I've had instances where I had to resolve LDAP replication issues or certificates and tokens for FreeIPAs internal services not renewing correctly.

      In conversation Wednesday, 16-Nov-2022 10:26:15 JST permalink
      silverwizard likes this.
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Wednesday, 16-Nov-2022 10:26:44 JST silverwizard silverwizard
      in reply to
      • p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:
      • M. Hamzah Khan
      @mhamzahkhan @projectdp Cool thanks both so much!
      In conversation Wednesday, 16-Nov-2022 10:26:44 JST permalink
    • Embed this notice
      M. Hamzah Khan (mhamzahkhan@intahnet.co.uk)'s status on Wednesday, 16-Nov-2022 10:27:44 JST M. Hamzah Khan M. Hamzah Khan
      in reply to
      • p̻̻̥r̥̻̥o̻j̤͛ec͔t̞dp :verifiedpurple:

      @projectdp FreeIPA does a lot of certificate and Kerberos ticket renewals automatically in the background for its own internal services. I've had a few problems when those renewals occur, which required manual intervention.

      But the biggest one I've had is LDAP replication conflicts. I'm fairly certain that this is because the VPN connection between my IPA replicas is a bit crap, but I've also experienced this issue at work before as well.

      In conversation Wednesday, 16-Nov-2022 10:27:44 JST permalink
      silverwizard likes this.
    • Embed this notice
      Balaji Dutt (balaji@social.linux.pizza)'s status on Wednesday, 16-Nov-2022 21:56:42 JST Balaji Dutt Balaji Dutt
      in reply to

      @silverwizard Authentik aims to be a one stop solution as it comes with LDAP built in plus OIDC. That said it's fairly unproven in larger deployments so the code isn't battle tested unlike say FreeIPA. Lots of folks use it in #homelab and are happy with it. Personally I've got FreeIPA setup and will be deploying authentik later.

      In conversation Wednesday, 16-Nov-2022 21:56:42 JST permalink
      silverwizard likes this.
    • Embed this notice
      Nikolay Volosatov ? (bamx23@mstdn.bx23.net)'s status on Wednesday, 16-Nov-2022 21:57:09 JST Nikolay Volosatov ? Nikolay Volosatov ?
      in reply to

      @silverwizard it's not an LDAP, but have you looked at Authelia? Authentication happens on the reverse proxy side. I even disabled auth for some of my services in favor of auth headers provided by the Authelia middleware in Traefik. I.e. Grafana works with them.

      In conversation Wednesday, 16-Nov-2022 21:57:09 JST permalink
      silverwizard likes this.
    • Embed this notice
      Seth Grover :heart_cyber: :terminal: :d20: (mmguero@infosec.exchange)'s status on Wednesday, 16-Nov-2022 21:57:34 JST Seth Grover :heart_cyber: :terminal: :d20: Seth Grover :heart_cyber: :terminal: :d20:
      in reply to

      @silverwizard for my somewhat simple setup I used #openldap for a while but it was honestly overkill. I found #glauth and that has fit the bill nicely for me. I don't have any experience with HA/failover for it though.

      In conversation Wednesday, 16-Nov-2022 21:57:34 JST permalink
      silverwizard likes this.
    • Embed this notice
      ismirnov@sysad.ninja's status on Tuesday, 22-Nov-2022 08:22:33 JST ismirnov ismirnov
      in reply to

      @silverwizard From what I've seen online, people seem to be running FreeIPA (https://www.freeipa.org/page/Main_Page). Deploy either on proxmox or using their docker image

      In conversation Tuesday, 22-Nov-2022 08:22:33 JST permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        FreeIPA
      silverwizard likes this.
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Tuesday, 22-Nov-2022 08:22:33 JST silverwizard silverwizard
      in reply to
      • ismirnov
      @ismirnov Yeah this seems super Linux centric, but thanks for the tip, maybe it'll run more portably than that
      In conversation Tuesday, 22-Nov-2022 08:22:33 JST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.