[keycloak-dev] Kerberos progress

Marek Posolda mposolda at redhat.com
Tue Feb 17 04:11:29 EST 2015


For improving SPIs, I think the point where we need to improve is 
pluggable authentication. People should be able to introduce new 
authentication mechanisms without need to change anything in core code 
inside "services" module. Also with possibility to introduce complex 
authentication flow or simplify existing. For example:

* some admins may want to always authenticate with Kerberos ticket 
(never display login screen).

* Some others allow either kerberos or password.

* Some others may want: (kerberos OR password OR facebook) AND totp.

There might be pluggable authentication interceptor, which has access to 
HTTP request/response and can either redirect to send response back or 
continue to other interceptors in chain. ClientSessionModel will have 
list of required "authentication actions" once it's created and those 
are configurable by user. For example there can be actions configured 
like this:
* kerberos sufficient
* password sufficient
* facebook sufficient
* totp          required

for the last case I mentioned. The 
AuthenticationManager.nextActionAfterAuthentication is triggered only if 
ClientSessionModel contains flags that required authentication 
mechanisms were met. Maybe we would need to improve LoginFormsProvider 
to easily allow people to plug their own login screens.

One example from the usecase mentioned in Kerberos JIRA: Some 
applications authenticate against SecureID. Some applications require 
multi factor authentication. Kerberos + SecureID + OTP that is sent to 
Phone or email address

Marek

On 16.2.2015 22:52, Bill Burke wrote:
>
>
> On 2/16/2015 4:34 PM, Marek Posolda wrote:
>> Still thinking whether it's better to use federation SPI or identity
>> broker SPI for kerberos integration. I am finally much more inclined to
>> Federation SPI ;-)
>>
>
> That's why I brought it up before...I wasn't sure what the right SPI 
> to use would be, or if our SPIs needed to improve and be refactored.  
> Maybe the answer is use both??? *shrug*
>
> I don't know if this makes sense, but a kerberos broker would import 
> users from information from the kerberos ticket.  A Kerberos 
> Federation Provider interacts directly with an LDAP server to provide 
> a more complete integration point???  I don't know...just thinking.  I 
> don't know enough about kerberos or how people want to use it with us 
> to make a decision.
>



More information about the keycloak-dev mailing list