-
-
Notifications
You must be signed in to change notification settings - Fork 681
Support for Proxy Auth via. HTTP header #1847
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Proxy Auth via. HTTP header #1847
Comments
interesting, this would mean taking the auth header and just going along with it. My feeling is that this should be rather easy to do (or there is already some package for this) |
I remember a issue with this. So it would require the app to be changed as well, to allow using API key for logging in, instead of using username/password, as that would no longer work (they have no password). My current nginx setup allows anyone to access |
(have started adding the setting and the docs to the other repos) |
grafana has an optional IP whitelist, might also be a good idea |
Might be a good idea to support in the future, but isn't necessary for this, is it? :) |
I just added it now, wasn't much work, seems more secure that way 😄 If you can, can you checkout the branch and check that it works it with a real auth service? I've just done some very rudimentary tests |
Is the intention that you're forced to set What it protects against, is if wger is bound to E.g. I specifically set this in places, where I want to ensure the client cannot manipulate the headers. This is e.g. for the API endpoint, which shouldn't use that form of authentication, on mobile devices.
I'll try to test it out when I find the time :) |
exactly. In the docker setup the application and the proxy are different services and you only want to accept the headers from the one you want (ok, here you couldn't access the application directly from the outside, but with other setups, you might). I feel that explicitly whitelisting the auth proxy makes it clearer and avoids potentially leaving this open because you didn't think about something.
💪🏻 |
Use case
This would allow to put e.g. Authelia in front of Wger, and then use the header that Authelia passes to wger to create/signin the user.
This could function as a simple way, to support the uses cases such as #1797 (not 100%, but it is quite simple to make).
See miniflux/v2#534 and https://grafana.com/docs/grafana/latest/auth/auth-proxy/ .
Proposal
PROXY_AUTH_HEADER=Remote-User
PROXY_AUTH_CREATE_USER=True
ALLOW_REGISTRATION=False
should still allow creating users usingPROXY_AUTH_
I might take a jab at this if I have the time.
The text was updated successfully, but these errors were encountered: