mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 16:25:55 +03:00
[GH-ISSUE #373] [BUG] Cannot log in when authelia blocks the request #142
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#142
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ptoulouse on GitHub (Nov 18, 2022).
Original GitHub issue: https://github.com/lldap/lldap/issues/373
Strange issue here. I configured both lldap and authelia according to the documentation in this repo.
When I try to reach lldap.example.com, I first hit authelia. I then authenticate, then get redirected to lldap. If I go back to authelia login page (auth.example.com) and logout on that page, I can still access lldap.example.com afterward. However username and password won't work.
I have to clear cookies to get redirected to authelia again when trying to reach lldap.example.com. AS far as I know, LLDAP is the only app that I have deployed that shows this behavior.
@nitnelave commented on GitHub (Nov 18, 2022):
It's probably due to the cache: loading the LLDAP page only loads static assets that are cached by your browser (the code of the SPA), so Authelia doesn't get a chance to trigger.
But when you try to log in, it has to check with the server if the password is correct. At that point, the request is blocked by Authelia since you're not logged in, so it shows up as "password is wrong" even though it's actually a redirect to the Authelia login page.
I guess the cleanest way to handle that would be to add support for the Authelia cookies (so if you're logged in to Authelia you're logged in to LLDAP), and check the LLDAP log in response to see if Authelia highjacked it.
@pixelrazor commented on GitHub (Dec 16, 2022):
Would it be preferred to use trusted header auth over the authelia cookie?
@nitnelave commented on GitHub (Dec 16, 2022):
Yes, trusted header is probably better.
On Fri, 16 Dec 2022, 22:18 Austin Alvarado, @.***>
wrote:
@nitnelave commented on GitHub (Mar 21, 2023):
Related: #352