Replies: 3 comments 5 replies
-
|
I am in a similar situation, I want to use an existing AD server to authenticate the users. I have done that for many applications in the past and I am surprised how difficult it is with OpenCloud. I use an external proxy and I came up with the following value for COMPOSE_FILE: OpenCloud and Keycloak start correctly. In Keycloak, I see in "User federation" a provider named "ldap". I created another one with the provider "Active directory". In "Users", I then see the AD users. The username is "firstname lastname" (lowercase, with a space). I do not know where the value comes from, but if I try to log in using it, OpenCloud says that the username is invalid because of the space. If I use instead the email address of the user, then I get past the login screen, but I immediately get an error message: I had a look at the log files, but they did not help. The thing is that I am not even sure if what I did is the right way. For instance:
This is a common setup for target audience of OpenCloud, who probably does not have experience with Keycloak, so a step-by-step guide would be very helpful. I am ready to write one, once I get it working 😉 |
Beta Was this translation helpful? Give feedback.
-
|
The compose setup has not been designed to achieve that. The compose project focuses on single node simple setups which are covering 80% of the community needs. For a commercial setup with MS AD, we have a helm chart which is part of our subscription. |
Beta Was this translation helpful? Give feedback.
-
|
If you need LDAP directly: https://github.com/vadikonline1/ocsi-owncloud-s3-docker/blob/main/opencloud_LDAP_AD.md |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello everyone,
I did set up OpenCloud using the Keycloak example stack and extended it to connect to my external Active Directory. Users created in the local LDAP through Keycloak work fine and can log in.
Users coming from the external AD cannot log in. Keycloak does not expose the real objectGUID. Instead it maps it to a string that represents the binary form of the objectGUID, and this string is what ends up in the JWT. From what I found this seems to be a known Keycloak limitation, which might be the reason AD users are blocked.
I am a bit confused on the example here https://github.com/opencloud-eu/opencloud-compose/blob/main/idm/ldap-keycloak.yml
Do I have to change the "OC_LDAP_xx" values to my active directory one and remove the open-ldap container? I sadly couldn't find much documentation about these environment values.
I also have found https://github.com/orgs/opencloud-eu/discussions/1261 it was overriden these values. In addition I saw and tested https://github.com/orgs/opencloud-eu/discussions/1014 this works for me but authentik does not seem as flexible as keycloak (specially in terms of default groups once synced from AD)
Has anyone run into this before or found a workaround? Any hints or examples would help a lot.
Beta Was this translation helpful? Give feedback.
All reactions