Right now auth_key_sha256 should be sha256 for both username and password, I suggest splitting the 2
I don’t integrate tools into LDAP configs to keep failures isolated.
This means I have to do (and want to do) user (and password) management within RoR itself.
However, I would like people to be able to choose their own passwords.
So I would like to see a new auth_key option like auth_key_sha256_passwordonly that has the username as clear text and the password as a sha256 hash.
This way I have full control over the username, but people can send me a sha256 hash of their password.
This way I can manage usernames and passwords completely from RoR but I still wouldn’t know my users passwords.
With the current auth_key_sha256 theoratically people could send me a sha256 hash with a different username then I intentded for them.
This would make for a safer configuration as the administrator doesn’t need to know the users password at all
Example
Have 2 options:
auth_key_sha256: EEECCE04C1ED7A63FCF96CC30E0DA747BEFCBC34F3B58E1266A2F52DC20053AE
sha hash containg username and password
auth_key_sha256_passwordonly: username:AD62252F71A484702B74F379EA3C3388AC8C147EF65A7D4F50BFA06D6D9AAF8B
sha hash containing only the password for a user.
Hi @ronald.vanboven, sorry I answered you too much in a hurry.
I was referring to the newly introduced headers rule.
However, if you are planning to use this for Kibana access with ROR PRO/Enterprise, it won’t log in users correctly, as the header value won’t become part of the resolved user identity.
So I would like user to make a SHA256 hash for their password.
They mail me their hashed password and I make a user(name) for them.
This way you have better security as only the user knows his own password, but I (the admin) have full control over usernames.
We tested this morning, it works perfect for our usecase:
auth_key_sha256: sha256 with username:password works
and
auth_key_sha256 username:sha256 with password works
@askids how would that look like? I don’t understand, ROR needs the password in clear to open the key store. Generally conf keys like these are handled via environmental variables, so it’s not in the config file.