-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Disabling Local Passwords #726
Comments
This feature has also been requested in GitHub discussions: |
We could support an option which forces authentication via OIDC during each login. That option would have major UX drawbacks though:
If we implement this feature, we should point out in the config file that login won't be possible without a network connection. Furthermore, I think that even with that option enabled, we should only force OIDC authentication when the user logs in via GDM or SSH, but still support a local password for |
Note that @aleasto is keen to fix this soon, so that may not be a problem anymore |
I feel that in these kids of scenarios the the users aren't even added to the sudo groups, so the issue is likely not to hit anybody. At the same time, I wouldn't block someone who want a such annoying UX to provide it if they want. |
I have an idea which would also prevent users who don't have access to the identity provider anymore from logging in: We could support an option which requires that the access token is refreshed during each login. That would still require a network connection, but at least the UX isn't as bad, because users don't have to redo the device authentication each time. Would that be a solution for your use case, @RandyParedis? |
@adombeck I am sorry for a late response; somehow I did not get notified of any comments... The OIDC solution does seem like a viable solution for my use case. SSO users (in my setup) don't have any admin privileges, so the cumbersome setup of needing OIDC each time is really not a bother on my end. Not needing my users to be prompted with a password creation would therefore be ideal (they cannot change users, they cannot suspend, they cannot do superuser stuff...).
I do admit that my use case is very specific where I believe this will not be an issue. But, I do agree that most other users will be unsatisfied with such a UX. |
Personally I don't think it's a problem for us, in the sense that if what an admin of authd wants to be, and we can easily provide it, we shouldn't care much about how efficient is the UX, since that's what an admin requested for (and they very likely prefer it to be complex instead of providing other ways). |
@RandyParedis Thanks for the feedback! The use case you describe is valid, but we don't consider it to be high priority, so it might take some time until we get around to implement an option to disable the local password. PRs are welcome though. |
Thanks! Cheers! |
Is there an existing request for this feature?
Describe the feature
I want to enable authd to all machines in a larger PC room; however, I do not want the accounts to persist after a log out. This makes the need for a local password (kind of) obsolete.
Ideally, authd should be configurable that no local password is needed.
Describe the ideal solution
By default, local passwords are enabled, but by adding
use_local_passwd
field to the broker config file (or somewhere else), these can be disabled. SSH will not prompt for a local password, and GDM won't either.Alternatives and current workarounds
I have not found any workarounds. I suspect I could edit the PAM to make this work, but I do not know enough about PAM to do so.
System information and logs
Environment
Relevant information
No response
Double check your logs
The text was updated successfully, but these errors were encountered: