The Single Sign-On Multi-Factor portal for web apps
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
I use it for quite a few of my services, it's ready effective! And not that hard to set up, though I haven't tried to make it work with an LDAP service yes.
I got it set up with LDAP and a web front end to configure LDAP users. Works really nice. If only my services supported with with it.
I use an LDAP server, as it's pretty much designed for exactly this task. You can tell PAM to authenticate and authorise from it to manage logins to the physical machines, and web apps typically either have a straightforward way to use LDAP, or support 'external' auth, with your web server handling the authentication and authorisation for it.
OpenLDAP is a solid, easily self hosted server. If you like working from the shell it has everything you need. If you prefer a GUI there are a variety of desktop and web based management frontends available.
I’ve been toying with the idea of standing it up. Any recommendations for the GUI side?
I use openLDAP + LDAP Account Manager and Self-service password. Deployed/managed through this ansible role
Well…. you just blocked off my calendar for the weekend!
I confess I normally work from the command line, but I have set up LDAPAdmim for projects where others needed to manage the directory, and it worked pretty well.
I got ya. Took a quick look at that link and it looks like the client is Windows specific which is frowned upon and permanently blacklisted in this house!!!
Still, I appreciate the reply
That's what comes of late night posting, I'd meant to link you to PHPLDAPAdmin, not LDAPAdmin! It's written in PHP, which isn't lovely, but it does it's job.
I would recommend keycloak. I can basically do everything related to webapps authentication (OIDC, 2FA, etc)... except working as an LDAP/AD server, which typically used to enable login to physical machine using the network account. But, it has built-in LDAP provider support, which mean you can use OpenLDAP to host the accounts of your users (so they can use LDAP authentication on their own machine), and point keycloak to that OpenLDAP instance to allow your users to login to your webapps using their OpenLDAP account.
Keycloak is nice, but probably overkill for what OP needs. Keep it simple.
I don't have the exactly solution for you, but I went through this a while ago and came up with using openLDAP for this. It's not tidy at all, but it was a tremendous learning experience, and I documented it in 2 blog posts which may be interesting to you; I doubt you'll want to do what I did, but it was informative and has worked flawlessly since. I documented some of the flaws I found in options I considered at the time:
https://www.surfrock66.com/openldap-kerberos-and-sasl-my-experience-in-the-homelab/