mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 08:15:52 +03:00
[GH-ISSUE #712] Feature request: Allow OpenSSH-LPK schema #254
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#254
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @victoitor on GitHub (Oct 23, 2023).
Original GitHub issue: https://github.com/lldap/lldap/issues/712
I found nowhere on the code or instructions on how to set up lldap to use OpenSSH-LPK to have OpenSSH use lldap for public key authentication.
Something like this: https://openssh-ldap-pubkey.readthedocs.io/en/latest/openldap.html
Is it possible to do this with lldap? If not, has this been considered?
@nitnelave commented on GitHub (Oct 23, 2023):
Congratulations, you are just in time! It became technically possible
yesterday, after a long period of work on #67 .
However, the web ui doesn't support it yet, so the feature is only
available through direct graphql calls (for now!)
We are looking for volunteers to help debug integrations such as openSSH
and share their configurations.
Could you help us by checking which attributes are necessary to make the
feature work?
On Mon, 23 Oct 2023, 20:53 victoitor, @.***> wrote:
@levonhart commented on GitHub (Oct 24, 2023):
It seems we need
sshPublicKey(repeatable) and the defaultposixAccount's attributes.The LDAP ssh key specification:
@victoitor commented on GitHub (Oct 25, 2023):
We're definitely interested in testing this integration with OpenSSH. Btw, @levonhart works with me and is the person who currently has implemented our initial LDAP solution. We're interested in lldap so we'll be testing it soon.
@levonhart commented on GitHub (Oct 26, 2023):
So I added the attribute
sshPublicKeywith the GraphQL API and initial tests showed that openssh-lpk might be is supported, that is, it is possible to use lldap for SSH public key authentication.Also, it seems adding attributes only works in lowercase. I couldn't find it documented anywhere.
That means that the attribute to add is actually
sshpublickey.It could be useful if we could add the
objectClass: ldapPublicKeyattribute to the schema, but it is not necessary.The graphql query to add
sshpublickey:@nitnelave commented on GitHub (Oct 26, 2023):
Thanks!
A couple of points that are nice to highlight:
matching on the lowercase version of the attribute. However, it seems that
we're not lowercasing when creating attributes. We should fix that.
implemented yet.
On Thu, Oct 26, 2023 at 12:59 PM Leonardo de Abreu @.***>
wrote:
--
Valentin Tolmer
@nitnelave commented on GitHub (Jan 22, 2024):
Btw, checking in a bit late, did you manage to make it work?
Now there's https://github.com/Zepmann/lldap-cli to help with managing attributes, and we're working on the web UI as well.
@levonhart commented on GitHub (Jan 25, 2024):
Thanks for checking in. We had some problems with the client side actually and we were doing some internal changes so I put this on hold for a while.
I'll work on it again within a couple of weeks.
@nitnelave commented on GitHub (Apr 1, 2025):
Out of curiosity, did you get it to work? The custom objectclass works now (but it's applied to every user), though you might prefer to do an attribute presence check
(sshPublicKey=*)instead.@victoitor commented on GitHub (Apr 2, 2025):
We stopped working on it for quite some time. Right now we're getting back to it but using kanidm instead, Some issues we've had with it before seem to be gone so we're testing it out.
@helmut72 commented on GitHub (May 26, 2025):
Is it planned to add an objectclass to individual users? It's not for this topic, but for this one:
https://www.sogo.nu/files/docs/SOGoInstallationGuide.html#_authentication_using_ldap
If an objectclass "CalendarResoure" is created and applied to every user, every user becomes a calendar resource for SOGo. Not very useful ;)
@nitnelave commented on GitHub (May 27, 2025):
No, per-user classes are not planned.
Modeling calendar resources (neither users nor groups) is not in the scope of LLDAP
@helmut72 commented on GitHub (May 27, 2025):
SOGo just check for an existing objectclass name per-user, in this case CalendarResource. This can be any other objectclass name, but must be of course per-user.
Thanks for the info.