Commit Graph

82 Commits

Author SHA1 Message Date
Igor Ippolitov 8952b217a8 Put correct link to an architecture solution image 2017-09-12 12:25:18 +03:00
arozyev 937def0caa Added Template usage example to README.md 2017-05-17 14:46:03 +03:00
A compound of Fe and O f9e1a42329 Merge pull request #19 from nichivo/master
Fixed logging and typo for bind DN argument
2017-05-02 16:46:01 +03:00
Rick Hansen d66d4a04e7 Update spec file to rotate log file 2017-05-01 14:34:22 +10:00
Rick Hansen f94670848e Use unbuffered IO and redirect output to log file 2017-05-01 14:31:45 +10:00
Rick Hansen 481b02a979 Fixed typo for bind DN argument in .default 2017-05-01 14:28:41 +10:00
Vladimir Homutov 9d7cfcd1cc Merge pull request #14 from oxpa/master
Fixed a typo in .service file and fixed missing file in .install
2016-11-07 15:31:16 +04:00
Igor Ippolitov bd3f672763 Fixed a typo in .service file and fixed missing file in .install 2016-11-07 14:20:38 +03:00
Vladimir Homutov b56c9ef686 Merge pull request #13 from ArfyFR/patch-1
Quoted-string Basic realm ctx according to rfc7235
2016-11-03 14:10:01 +04:00
ArfyFR 64bb271b2e Quoted-string Basic realm ctx according to rfc7235
Hi,

I faced some problems with 401 message and an Android client.

It yelded because in the WWW-Authenticate header the
Basic ream=<ctx>
wasn't surrouned by ""

In the https://tools.ietf.org/html/rfc7235 it is written that 
 - Authentication parameters are name=value pairs
 - and "auth-param     = token BWS "=" BWS ( token / quoted-string )"
 - and "For historical reasons, a sender MUST only generate the quoted-string
   syntax.  Recipients might have to support both token and
   quoted-string syntax for maximum interoperability with existing
   clients that have been accepting both notations for a long time."

After my modification, the Android worked again (and iOs and PC clients faicing the 401 still worked ;) )

BR,
Arfy
2016-11-03 11:00:33 +01:00
Vladimir Homutov 9f7537ef34 Merge pull request #12 from oxpa/master
cli options for the daemon and basic debian packaging
2016-11-03 13:24:23 +04:00
Igor Ippolitov f824aee3ef files needed for debian packaging and minor changes into rpm spec 2016-11-02 20:06:42 +03:00
Igor Ippolitov 438518509d ensure required parameters are set at the time of a request 2016-11-02 20:06:42 +03:00
Igor Ippolitov 5fec096aa6 added options for commandline 2016-11-02 18:33:15 +03:00
Vladimir Homutov 3873fab889 Merge pull request #11 from thresheek/master
Added systemd service file and rpm spec file
2016-11-02 18:47:07 +04:00
Konstantin Pavlov 6cd01885aa Added RPM spec file. 2016-11-02 17:37:28 +03:00
Konstantin Pavlov fe3b441727 Added systemd service file for nginx-ldap-auth-daemon.
This service file assumes nginx-ldap-auth-daemon.py was installed to
/usr/bin under the name of nginx-ldap-auth-daemon.
2016-11-02 17:31:29 +03:00
Vladimir Homutov 40fc2ef257 Merge pull request #10 from rysiekpl/master
Minor bugfixes
2016-10-10 23:53:52 +04:00
Michał 'rysiek' Woźniak 24bf24ffbb Minor bugfixes: password can now contain colons, log_message uses self.ctx (instead of global ctx, which does not exist) 2016-10-10 21:38:15 +02:00
Vladimir Homutov c61f0137b7 Merge /home/vl/tasks/0216-ldap_auth_lab/src/nginx-ldap-auth 2016-10-10 16:51:28 +03:00
Vladimir Homutov d56a55e21e Updated documentation and example.
Commit 06444b36f6 changed returned error
code from 403 to 401 in case of failed auth and documentaion must be
updated accordingly.
2016-10-10 16:48:29 +03:00
Vladimir Homutov 06444b36f6 Merge pull request #9 from ArfyFR/patch-1
Use RFC2616 recommandation to reply 401 instead on 403 for auth_failed
2016-10-10 17:46:18 +04:00
Vladimir Homutov 7f3634bba0 more robust error routine.
self.ctx may be unset in case of bad request or other low-level error.
2016-10-10 16:39:56 +03:00
ArfyFR f57c05388d Use RFC2616 recommandation to reply 401 instead on 403 for auth_failed
Cf https://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html ,

401 is for: auth failed... please retry ;)
-----------
10.4.2 401 Unauthorized
 The request requires user authentication. The response MUST include a WWW-Authenticate header field (section 14.47) containing a challenge applicable to the requested resource. The client MAY repeat the request with a suitable Authorization header field (section 14.8). If the request already included Authorization credentials, then the 401 response indicates that authorization has been refused for those credentials. If the 401 response contains the same challenge as the prior response, and the user agent has already attempted authentication at least once, then the user SHOULD be presented the entity that was given in the response, since that entity might include relevant diagnostic information. HTTP access authentication is explained in "HTTP Authentication: Basic and Digest Access Authentication" [43].



403 is for: more or less auth shouldn't be repeated
-----------
10.4.4 403 Forbidden
 The server understood the request, but is refusing to fulfill it. Authorization will not help and the request SHOULD NOT be repeated. If the request method was not HEAD and the server wishes to make public why the request has not been fulfilled, it SHOULD describe the reason for the refusal in the entity. If the server does not wish to make this information available to the client, the status code 404 (Not Found) can be used instead.

Regards,
Pascal
2016-10-10 09:09:05 +02:00
Vladimir Homutov 52d5cba3e9 Merge pull request #6 from ClassicTim/add_rh_ctl_script
Added CTL script for RedHat linux.
2016-07-08 13:08:01 +04:00
Artem Stepanov 9e55fd2c76 Added ctl script for RedHat linux. 2016-07-05 16:21:23 +03:00
Vladimir Homutov 995d0f8eaa Default binddn is changed to empty string.
This allows to use anonymous bind, if binddn is not provided. Previous
default setting lead to use of unauthenticated bind, which is usually
disabled in LDAP server configurations.
2016-06-28 13:55:13 +03:00
Faisal Memon 081d42d5cc 2nd try to fix formatting. 2015-06-22 11:59:33 -07:00
Faisal Memon cb503c9218 fix link at end 2015-06-22 11:52:50 -07:00
tmauro-nginx ebeaf8fd57 Update README.md
Standardizing representation of hyperlink to "How Authentication Works in the Reference Implementation" section of blog post. Adding space in front of OpenLDAP hyperlink in 'Compatibility' section, hoping that makes the link look right.
2015-06-22 11:42:06 -07:00
tmauro-nginx f40722de6e Update README.md
Correcting link to blog post: changing https://nginx.com/blog/nginx-plus-authenticate-users#configure to .../#ldap-auth-configure
2015-06-22 11:36:26 -07:00
Vladimir Homutov 6a345efd55 Initial commit 2015-06-19 14:13:56 +03:00