Skip to content

Conversation

@rhafer
Copy link
Contributor

@rhafer rhafer commented Jan 20, 2026

The approach to take has not been decided yet. This just reflects the current research/concept work.

The approach to take has not been decide yet. This just reflects
the current research/concept work.

## Additional thoughts

If OpenCloud were responsible for allocating the UserIDs of all users
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point! I was wondering also, if that could simplify things in the future and let us get rid of the LDAP dependency.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AFAICT always having opencloud generate a userid would allow us to get rid of the shared ldap deployment mode. The ldap server would only be used to find recipients (users or groups) in an organization. We always only send invitations into some form of inbox of a user. This could literally be an email. Or an internal nats queue with invites.
Then, when he follows the invite link, we not only provision their personal space (guest users don't have one) but the invite they followed (the creat home call can add the grant). Invites are actually not a new concept. IMO it is just a better name for a pending share (they have three states: pending, accepted and declined).
When sharing with 'internal' users the invite service can take the responsibility of creating grants and accepting them instead of creating invites.

Anyway, IIRC we bounced around the idea of exchanging the sub+iss, basic auth or app password credentials in the proxy with a userid generated by opencloud years ago already. It has seeveral benefits:

  1. we can assign credentials and multiple identities (as in multiple Identity Providers) to an account. This allows migrating accounts from one IdP to another as the grants on disk can keep the same userid.
  2. we can add a scim_id as an identitiy, which would make some use cases follow the standard integration of SCIM and OpenID Connect we could use SCIM to provision a guest account in the Identity management system.

The last point addresses the problem that if a user shares with a guest, aka an email address, that needs to trigger an onboarding process for the new guest. If we just create a new user in a keycloak that we have write permission to we are back at the same shadow it user management as before.

We could use OpenID Connect Discovery to find the external issuer and trust that to authenticate users. OIDC in theory is federated. However, in practice our clients would have to dynamically register with the guests IdP ... which does not seem to be widely supported, yet.

I think we should use a list of trusted identity providers, this would allow a single instance to use multiple identity providers, eg for multi tenancy use cases or when organization merge and multiple idps exist for a wile or to better reflect the sovereignty of organizations.

If no idp is responsible for the guest email, we can use a fallback idp that is only used for guest accounts. We already have the webfinger service that we can use for the issuer discovery.

So ... yes, please ... make opencloud generate a userid.

account in the IDP, and might be external to the organization), it should
be possible to invite "Guest Users" into and OpenCloud instance.

## Requirements
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with the requirements. Maybe we need to add that the process can be asynchonous and take some time because we are crossing a lot of boundaries between different systems.


To allow collaboration with external Users (Users that don't yet have an
account in the IDP, and might be external to the organization), it should
be possible to invite "Guest Users" into and OpenCloud instance.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
be possible to invite "Guest Users" into and OpenCloud instance.
be possible to invite "Guest Users" into an OpenCloud instance.

accessing the shared resource (including the possibility to use 2FA)
- the ability to invite external users is tied to a separate permission
(e.g. "can invite guest users")
- make it work with all (most) of the user-management configurations we support
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not for Lico, right?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

fine for me.

contexts as well?
- What if the user already exists but used a different mail address in
his account (e.g. sub-addressing?).

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can guest users be converted to "regular" users and keep their shares?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ideally yes. I guess we should add that to the requirements.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ideally yes.

Comment on lines +58 to +61
- When an external IDP is used the generation of that userid is usually
not in control of OpenCloud (exception User-Autoprovisioning, or when
the Provisioning/Education API is used), but where taking the userid
from some LDAP Attribute maintained in the external system
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- When an external IDP is used the generation of that userid is usually
not in control of OpenCloud (exception User-Autoprovisioning, or when
the Provisioning/Education API is used), but where taking the userid
from some LDAP Attribute maintained in the external system
- When an external IDP is used, the generation of that userid is usually
not in control of OpenCloud (exception User-Autoprovisioning, or when
the Provisioning/Education API is used). In that case, the userid is taken
from a LDAP Attribute maintained in the external system

service) - e.g. in multi-tenant setups
- External IDP, with User-Autoprovisioning (also to a local OpenCloud
specific LDAP service)
- everything in-between and outside of the above
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I suggest to explicitly not support the internal IDP

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yep. I consider the internal IDP to become a legacy system in the next years, as long as it does not support MFA. Having no MFA or other strong authentication like passkeys will become a nogo in the next years i guess.

using the Keycloak Admin API
- As part of the user creation keycloak triggers an email to be sent to
the invited user to get him to verify his email address and set a
password. This is not really and invitation email.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That is not enough. We need to be in control of that EMail probably.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What exactly do you mean by that?

- Permissions on spaces are currently not tracked in the share
manager, the are purely managed via grants. So currently the share
manager service currently does not know anything about (invited)
users being assigned to spaces
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why does the share manager need to know about invited or even accepted guest users? Is't that just a second call to the invitation manager to get that info where needed?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is't that just a second call to the invitation manager to get that info where needed?

Could you please elaborate on that?

Comment on lines +176 to +179
invite. And could skip the step of creating a "pending" Share with an
invitation assigned. As we have an ID already we could just create a
"normal" share an even populated the grants on the filesystem for that
share (or space)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
invite. And could skip the step of creating a "pending" Share with an
invitation assigned. As we have an ID already we could just create a
"normal" share an even populated the grants on the filesystem for that
share (or space)
invite. That would allow to skip the step of creating a "pending" Share with an
invitation assigned. As we have an ID already, we could just create a
"normal" share and even populate the grants on the filesystem for that
share (or space)

## Questions still to be answered

- what's the life cycle of a guest user?
- Who's responsible for deprovisioning?
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I suggest users with the role "admin"


- what's the life cycle of a guest user?
- Who's responsible for deprovisioning?
- Do guest users expire after a certain time?
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

default: guest user accounts expire after 120 days of inactivity (=no login), can be configured. the invitation expires after 30 days per default. can be configured.

- what's the life cycle of a guest user?
- Who's responsible for deprovisioning?
- Do guest users expire after a certain time?
- Do we need to keep track of who invited whom and when? (not just in
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes. there needs to be a lowlevel option to manage guest users eg. via cmd.
Guest user management must also be possible via a dashboard which is by default an external system with these options in the ui (same options should be availbale via cmd):

list all email adresses:

  • email adress (=guest user)
  • status (invitation accepted / pending)
  • invited by
  • invitation date
  • if accepted: invitation accepted date
  • last login
  • days left until expiration + absolute date (updates after every login)

actions:

  • export list as CSV
  • deactivate/activate login (triggers infomail to guestuser)
  • delete invite/user (triggers infomail to guestuser)

- Do guest users expire after a certain time?
- Do we need to keep track of who invited whom and when? (not just in
the audit log?)
- who can see the list of guest users?
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

list of all guest users: users with the role oc-admin

- Do we need to keep track of who invited whom and when? (not just in
the audit log?)
- who can see the list of guest users?
- once a guest user is created, is everyone in the organization able to
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes

- who can see the list of guest users?
- once a guest user is created, is everyone in the organization able to
share with that guest user?
- what are guest user allowed to do? (are they able to share, lookup
Copy link

@tbsbdr tbsbdr Jan 28, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • guestusers can not share or invite other users to a space or create public links. (primary focus of the feature is to provide a simple way to grant external, authorized access. anything else like resharing would undermine regular user accounts).
  • the default should be, that guestusers can not see who else has access. postponed for now
  • guestusers can use the desktop and mobile client to access their shares or spaces
  • guest users can not get the role "can manage" spaces postponed for now

share with that guest user?
- what are guest user allowed to do? (are they able to share, lookup
other users?)
- should this be really tied just to creating shares? Or should we have
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

guest users should get access to the system via a share or space membership.
could you give some examples what you mean with "other contexts"?

contexts as well?
- What if the user already exists but used a different mail address in
his account (e.g. sub-addressing?).

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ideally yes.

service) - e.g. in multi-tenant setups
- External IDP, with User-Autoprovisioning (also to a local OpenCloud
specific LDAP service)
- everything in-between and outside of the above
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yep. I consider the internal IDP to become a legacy system in the next years, as long as it does not support MFA. Having no MFA or other strong authentication like passkeys will become a nogo in the next years i guess.


- Completely rely on external system?
- Track creation and acceptance of invitations somehow?
- Do invitation expire at some point?
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By default invitations expire after 30 days. can be configured

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants