-
-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSO Kerberos v5 #132
Comments
Исправил изначальное сообщение, в первоначальном сообщении нашёл мою ошибку. Google translation by translator: Corrected the original message, found my error in the original message |
Pàdé supports Windows SSO through NTLM using Waffle. I have no plans to support SSO via Kerberos as it is complicated to setup for a web browser. |
Да действительно есть сложности с настройкой веб браузера. Но они решаемы. Для Waffle нужно сервер openfire устанавливать на операционную систему Windows а у меня openfire установлен на операционной системе CentOS 7. SSO авторизация через xmpp.keytab Kerberos v5 - это универсальный способ подходящий для любого варианта установки сервера openfire. А с помощью GPO эти настройки можно сделать на всех компьютерах домена. Google translation by translator: Yes indeed there are difficulties with setting up a web browser. But they are solvable. For Waffle, you need to install the openfire server on the Windows operating system and I have openfire installed on the CentOS 7 operating system. SSO authentication via xmpp.keytab Kerberos v5 is a universal way suitable for any installation option of the openfire server. And with the help of GPO, these settings can be made on all computers in the domain. |
I will investigate |
I did some investigation and this is what I found.
In order to test this, you would need to:
Make sure you can access the secure web page at https://your-server:7443/sso/password from Openfire with NO prompt before you test Pade. I used the following web pages for reference.
Best of luck |
Спасибо, буду пробовать. Пока занят чуть позже отпишусь. Google translation by translator: Thanks, I will try. While busy a little later accomplish your goal. |
Скачал и установил openfire-chat-api plugin version 0.9.5 Release 1. Возникла проблема со страницей https://your-server:7443/sso/password. Я правильно понимаю, что мне необходимо создать эту страницу через Jetty? (создать файл .java, скомпилировать его в .class и запустить на сервере openfire) Google translation by translator: Downloaded and installed openfire-chat-api plugin version 0.9.5 Release 1. There was a problem with the page https://your-server:7443/sso/password. Do I understand correctly that I need to create this page through Jetty? (create the file. java, compile it into .class and run on openfire server) |
No Please download and install openfire-chat plugin. See https://github.com/igniterealtime/Openfire-Chat/releases/tag/v0.9.5-release1 Follow the steps here #132 (comment) |
Sample setup CentOS 7 OpenFire SSO via xmpp.keytab and http.keytab A description of server configuration:
What to do on the server OpenFire
com.sun.security.jgss.accept {
com.sun.security.jgss.accept {
[realms] [domain_realm] [appdefaults]
chown daemon:daemon /opt/openfire/conf/gss.conf
kinit -V -k -t /opt/openfire/http.keytab HTTP/[email protected]
sasl.gssapi.config = /opt/openfire/conf/gss.conf
|
Please make sure chat api plugin is enabled and restart openfire First make sure SSO kerberos works between Chrome browser and Openfire Jetty web server by accessing web page https://jabber.openfire.su:7443/sso/password from your Chrome browser. I am assuming jabber.openfire.su is the FQDN of the openfire server and http-bind port is 7443. If you get a browser username/password window, then it is not working. Recheck parameters or restart Openfire. You should NOT get a prompt and it should display you some data on the screen. If that happens, then you should test with Pade. |
Checked that Chat API is enabled. Still, when you try to log in, the login-password window appears. Is it possible to view logs in jetty? We tested authorization from chrome on IIS, it works. It turns out that the problem is in the openfire settings and we can not yet find where exactly we need to configure. |
To see Jetty logs, enable debug logging in openfire. |
У меня сервер OpenFire на CentOS 7. Сервер введен в Microsoft Active Directory. На сервере для локальной сети (пользователей домена) реализована SSO авторизация клиентов по xmpp.keytab Kerberos v5, протестировано на клиентах Spark и Miranda. Нужно реализовать SSO авторизацию через xmpp.keytab Kerberos v5
Google translation by translator:
I have an OpenFire server on CentOS 7. The server is entered into Microsoft Active Directory. The server for the local network (domain users) has SSO authentication of clients using xmpp.keytab Kerberos v5, tested on Spark and Miranda clients. Need to implement SSO authentication through xmpp.keytab Kerberos v5
The text was updated successfully, but these errors were encountered: