Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Discuss
  3. LDAP for Win10 Authentication/Authorization with pGina

LDAP for Win10 Authentication/Authorization with pGina

Scheduled Pinned Locked Moved Discuss
1 Posts 1 Posters 390 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Jan MacenkaJ Offline
    Jan MacenkaJ Offline
    Jan Macenka
    wrote on last edited by Jan Macenka
    #1

    tl;dr:
    Has anybody got a working setup for using pGina for Win10 Authentication/Authorization with the Cloudron built-in LDAP-Server?

    Hi everybody,

    I am currently trying to generate a setup for a client where he can have his primary user-management in Cloudron as he will mostly use the Web-Services anyway. The client now requested that the Login for his Windows10 machines should also use the same login.

    One Google-Search (and 2 ChatGPT prompts) later I found that there is the pGina Project which allows to do just that.

    After following some Tutorials and tinkering around with the setup, I can get my machine to Authenticate to the LDAP Server correctly:

    e6d0ea6d-a636-4ff0-b9e4-66fd0a22926f-image.png

    However the Authorization part does not work currently:
    a4d95970-4ab6-4ae3-9a40-f8cff359aba9-image.png
    If in the Authorization Rule-Set, I set Default to allow, it will allow access without checking if my given user is part of the Group, that I care about as specified in the rule-set below. Which is not the behavior I want to have.

    I can check with other tools like JXplorer that the User I am testing actually is in the group I care about: 027971cb-411d-43e2-89f2-d4c8300d81b6-image.png

    Did anybody try something similar and succeed here? Would love to get your insights on this 🙂

    Best regards,
    Jan

    1 Reply Last reply
    1
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Don't have an account? Register

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • Bookmarks
    • Search