Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

radius support and 2FA #1

Open
mikoday opened this issue Mar 1, 2021 · 9 comments
Open

radius support and 2FA #1

mikoday opened this issue Mar 1, 2021 · 9 comments
Labels
enhancement New feature or request

Comments

@mikoday
Copy link

mikoday commented Mar 1, 2021

Hello, this project looks interesting, will you plan to add radius support and 2FA?

@h44z
Copy link
Owner

h44z commented Mar 1, 2021

Hi,
2FA is on my TODO list but I cannot give you concrete date right now.
And at the moment I have no plans to integrate radius, but contributions are very welcome.

@mikoday
Copy link
Author

mikoday commented Mar 1, 2021

Hello, sounds very promising, I keep my fingers crossed then.
One more question, can you explain how the authentication based on ldap works?

@h44z
Copy link
Owner

h44z commented Mar 1, 2021

What exactly do you want to know? Its a simple ldap bind operation to check the user credentials. See here: https://en.wikipedia.org/wiki/Lightweight_Directory_Access_Protocol#Bind_(authenticate)

Maybe you are confusing the authentication to the management portal with the WireGuard authentication? LDAP is just used to fill the userdatabase in the management portal. If enabled, a WireGuard tunnel configuration (keypair) is created for each LDAP user automatically. The user can then download his configuration from the portal by logging in with his LDAP credentials.
Does that answer your question?

@mikoday
Copy link
Author

mikoday commented Mar 2, 2021

Yes, that's what I meant, thank you very much for the explanation. :basecampy:

@h44z h44z added the enhancement New feature or request label Apr 2, 2021
@PandemiK911
Copy link

You could delegate the 2FA process to a OpenID Connect backend. We're currently using WG Gen Web with OIDC connector to a Keycloak instance.
The whole code is already written inside Wg gen web, you could simply integrate it (be gentle, mention the other project) and let the OIDC part deal with the 2FA.

That means the LDAP auth will never have a 2FA but ... it's LDAP huh ?

gandalfmagic added a commit to gandalfmagic/wg-portal that referenced this issue Jan 5, 2022
gandalfmagic added a commit to gandalfmagic/wg-portal that referenced this issue Jan 5, 2022
gandalfmagic added a commit to gandalfmagic/wg-portal that referenced this issue Jan 5, 2022
gandalfmagic added a commit to gandalfmagic/wg-portal that referenced this issue Jan 5, 2022
@gandalfmagic
Copy link

@h44z if you are interested, I made the PR #85 to enable Oauth2 and OIDC login

@PandemiK911
Copy link

Great ! Thanks for your work. I can test OIDC integration with Keycloak.

@CantBelieveThisWorks
Copy link

For 2FA, there is also this project to look at and potentially incorporate: https://github.com/NHAS/wag

@teadur
Copy link

teadur commented Mar 23, 2023

One option how to achieve 2FA would be to support Radius, then 2FA could be handled by the Radius server.

https://www.oreilly.com/library/view/radius/0596003226/re04.html

@h44z h44z mentioned this issue Aug 3, 2023
h44z added a commit that referenced this issue Aug 4, 2023
Initial alpha codebase for version 2 of WireGuard Portal.
This version is considered unstable and incomplete (for example, no public REST API)! 
Use with care!


Fixes/Implements the following issues:
 - OAuth support #154, #1 
 - New Web UI with internationalisation support #98, #107, #89, #62
 - Postgres Support #49 
 - Improved Email handling #47, #119 
 - DNS Search Domain support #46 
 - Bugfixes #94, #48 

---------

Co-authored-by: Fabian Wechselberger <wechselbergerf@hotmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

6 participants