Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 5C3CE200CF6 for ; Mon, 18 Sep 2017 18:44:35 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 5AF311609DB; Mon, 18 Sep 2017 16:44:35 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 9DBE91609D4 for ; Mon, 18 Sep 2017 18:44:34 +0200 (CEST) Received: (qmail 17208 invoked by uid 500); 18 Sep 2017 16:44:33 -0000 Mailing-List: contact user-help@guacamole.incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@guacamole.incubator.apache.org Delivered-To: mailing list user@guacamole.incubator.apache.org Received: (qmail 17198 invoked by uid 99); 18 Sep 2017 16:44:33 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 18 Sep 2017 16:44:33 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id 3684A183022 for ; Mon, 18 Sep 2017 16:44:33 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 1.979 X-Spam-Level: * X-Spam-Status: No, score=1.979 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=2, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd3-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=guac-dev-org.20150623.gappssmtp.com Received: from mx1-lw-us.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id Rb0F6qT8z76M for ; Mon, 18 Sep 2017 16:44:31 +0000 (UTC) Received: from mail-vk0-f45.google.com (mail-vk0-f45.google.com [209.85.213.45]) by mx1-lw-us.apache.org (ASF Mail Server at mx1-lw-us.apache.org) with ESMTPS id 298915FD1B for ; Mon, 18 Sep 2017 16:44:31 +0000 (UTC) Received: by mail-vk0-f45.google.com with SMTP id o22so577831vke.1 for ; Mon, 18 Sep 2017 09:44:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=guac-dev-org.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=9pfVXvDTjxtk5RgTS58ACUpD5qqcvsB+LMsAMYw1TIs=; b=o/4fU7gMX3//VS7sBdoAFrav5qooMXrQIoxNawHOOZ0Bn8/9Z5gbTPobeF+15UhjRB KR1lTRRqeAS5wdZtmQ98Zlvq1sbEav6EE9mZYR5VhZaiO699un51VS3RQ3a/X1ebTbuc pbRyQgFiRT1igE4A90ZnH277T+2SGWv/0HENCrvo9vBa6vksQdRcFIHYvXpTpkP1GM29 O4H5ABoLTOkelKFAXAOZsXHtl+ECotlK9MwCucBnJU5vapNSteICYwcZ5K0NVJKm8r10 2BvRTdPR3qwy3lopkMC7Mcj2gDHKQa04C9rHAR/uLe2LHK3cIKjOWL/dCf7kjG+DcTwn rqzg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=9pfVXvDTjxtk5RgTS58ACUpD5qqcvsB+LMsAMYw1TIs=; b=ZeFunM3UTz1lNGKHY/J8ahwrYBzaTC+T2wCPfKuRMTRvYnoQ/zIKDI7CheSjlr5WiC yH6mShOFjRxLKhqevFbdmwK9tS0ssFqHXQZ+tvRcRqHhmBIAW0BT7/tHOs+JP/zNOo4A z1umXVjgHDRP5jDl1D1LmSJGZfuzZmRKtB5bbLXzXE3nWdov5YyxhKgsYmbsw8fBTbKi xESshz/ctJh90sDQZXJzXCpO096UXsbeWrGMB9bN40kz3kax2BwZc6RpztPo4GM3UJo3 8ZXKRgCyRra6iEi+Ii4IcaWZlbxFP2Qsk/56FPT7TCeiLZN2fMzmlNTMQEepmRWYc/3u XdsA== X-Gm-Message-State: AHPjjUhBKD+yIIWqYd9/sf9wK3OCAYXMwXNX4ZmmOzRtFpOAUhfAH0cR 9BHu3eW+Klf5b0nf/TLLCeN/7FmpjBP0SFhdsgqL0CO4 X-Google-Smtp-Source: AOwi7QAtOZ0yrtf8xK2xIFS7kqt7rzQBdYZKVW2OYUT+VJoF/Z8oowjzfEd3/qG6w5+84MBXQmQWE1/jFGxBw6D15QM= X-Received: by 10.31.141.14 with SMTP id p14mr25887326vkd.53.1505753070208; Mon, 18 Sep 2017 09:44:30 -0700 (PDT) MIME-Version: 1.0 Received: by 10.176.82.139 with HTTP; Mon, 18 Sep 2017 09:43:45 -0700 (PDT) X-Originating-IP: [184.250.51.116] In-Reply-To: <1505748231686-0.post@n4.nabble.com> References: <1505748231686-0.post@n4.nabble.com> From: Mike Jumper Date: Mon, 18 Sep 2017 09:43:45 -0700 Message-ID: Subject: Re: CAS Extension To: user@guacamole.incubator.apache.org Content-Type: multipart/alternative; boundary="001a11425b6ede9dec0559797477" archived-at: Mon, 18 Sep 2017 16:44:35 -0000 --001a11425b6ede9dec0559797477 Content-Type: text/plain; charset="UTF-8" On Mon, Sep 18, 2017 at 8:23 AM, richk wrote: > > In the docs with regards to the CAS extension it has this line: > > "This module must be layered on top of other authentication extensions that > provide connection information, as it only provides user authentication". > > So would I configure the auth-provider property with > BasicFileAuthenticationProvider as usual, but then specify > cas-authorization-endpoint and cas-redirect-uri to override the default > login action to use CAS instead? There actually is no "auth-provider" property. This property was deprecated in 0.9.7 in favor of a new, self-contained extension format [1] and finally removed entirely in 0.9.10-incubating [2]. Usage of this property between 0.9.7 and 0.9.10-incubating would have worked but resulted in a warning in the logs, but the property it is now ignored. It is no longer documented in the manual, and any third-party tutorials which refer to it are out of date. If so, then can I just specify the > connection configs in user-mapping.xml as usual too? > > Is that how it's intended to work? It seems too easy? > > This is exactly how it's intended to work. Guacamole supports loading multiple extensions simultaneously, and will automatically combine authentication methods. I'd recommend using the MySQL or PostgreSQL extensions instead of "user-mapping.xml", however. Besides the way that user-mapping.xml requires the password to be manually defined for each user, I believe there is a known issue with using user-mapping.xml alongside other auth extensions (where the built-in auth mechanism handling user-mapping.xml does not properly collaborate with other extensions, unlike the database, ldap, etc. auth), but I've thus far not found a link to where this was reported. - Mike [1] http://guacamole.incubator.apache.org/releases/0.9.7/#simplified-extensions [2] http://guacamole.incubator.apache.org/releases/0.9.10-incubating/#removal-of-deprecated-lib-directory-and-auth-provider-properties --001a11425b6ede9dec0559797477 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
On M= on, Sep 18, 2017 at 8:23 AM, richk <rk5devmail@gmail.com>= wrote:

In the docs with regards to the CAS extension it has this line:

"This module must be layered on top of other authentication extensions= that
provide connection information, as it only provides user authentication&quo= t;.

So would I configure the auth-provider property with
BasicFileAuthenticationProvider as usual, but then specify
cas-authorization-endpoint and cas-redirect-uri to override the default
login action to use CAS instead?

There actu= ally is no "auth-provider" property. This property was deprecated= in 0.9.7 in favor of a new, self-contained extension format [1] and finall= y removed entirely in 0.9.10-incubating [2]. Usage of this property between= 0.9.7 and 0.9.10-incubating would have worked but resulted in a warning in= the logs, but the property it is now ignored. It is no longer documented i= n the manual, and any third-party tutorials which refer to it are out of da= te.

I= f so, then can I just specify the
connection configs in user-mapping.xml as usual too?

Is that how it's intended to work? It seems too easy?


This is exactly how it's intended = to work. Guacamole supports loading multiple extensions simultaneously, and= will automatically combine authentication methods. I'd recommend using= the MySQL or PostgreSQL extensions instead of "user-mapping.xml"= , however. Besides the way that user-mapping.xml requires the password to b= e manually defined for each user, I believe there is a known issue with usi= ng user-mapping.xml alongside other auth extensions (where the built-in aut= h mechanism handling user-mapping.xml does not properly collaborate with ot= her extensions, unlike the database, ldap, etc. auth), but I've thus fa= r not found a link to where this was reported.

- M= ike


<= /div>
--001a11425b6ede9dec0559797477--