SSO is another important consideration.

Spring Security looks like a winner. Very impressive list of support.


> On Oct 5, 2015, at 9:34 PM, larry mccay <[email protected]> wrote:
> 
> The wiki page seems to describe continuing to use Spring Security.
> I believe this to be a wise choice.
> 
> I would encourage you to try and expose the capabilities of that framework
> as much as possible rather than providing support for a constrained set of
> providers.
> 
> SSO integrations are becoming important for a number of ecosystem projects
> and UIs for instance.
> The ability to add a custom authentication provider will be important for
> such usecases.
> 
>> On Mon, Oct 5, 2015 at 10:10 PM, Tony Kurc <[email protected]> wrote:
>> 
>> I'd like to see Duo Web two-factor https://www.duosecurity.com/docs/duoweb
>> 
>>> On Mon, Oct 5, 2015 at 10:00 PM, Rick Braddy <[email protected]> wrote:
>>> 
>>> 1) Basic password authentication with Recaptcha after N failed logins
>>> (encrypted password storage)
>>> 
>>> 2) 2-factor Google Auth option to supplement password logins
>>> 
>>> 3) Active Directory / Kerberos auth (with 2-factor option as well)
>>> 
>>>> On Oct 5, 2015, at 8:56 PM, Joe Witt <[email protected]> wrote:
>>>> 
>>>> Thanks Rick.  If you were to say which of that you'd want 'first' and
>>>> then which you can see coming later please advise.
>>>> 
>>>> All: Please do just that - let us know which you need 'now' and which
>>>> you can wait on.
>>>> 
>>>> Thanks
>>>> Joe
>>>> 
>>>>> On Mon, Oct 5, 2015 at 9:53 PM, Rick Braddy <[email protected]>
>>> wrote:
>>>>> Matt,
>>>>> 
>>>>> Here you go:
>>>>> 
>>>>> -  2-factor Google Authenticator to supplement password auth (e.g. to
>>> strengthen password with mobile phone onetime ID or other support strong
>>> auth options)
>>>>> 
>>>>> - Recaptcha required after N failed password login attempts to block
>>> brute force attacks (e.g. 5 failed logins, then captcha required)
>>>>> 
>>>>> - Password strength policies
>>>>> 
>>>>> - PAM support provides pluggable authentication options, at least for
>>> Linux (better than locally stored passwords)
>>>>> 
>>>>> - Active Directory Kerberos integration (Windows native and Linux)
>>>>> 
>>>>> If passwords to be stored locally, must be encrypted.
>>>>> 
>>>>> Hope that helps.
>>>>> 
>>>>> Rick
>>>>> 
>>>>>> On Oct 5, 2015, at 8:34 PM, Matt Gilman <[email protected]>
>>> wrote:
>>>>>> 
>>>>>> All,
>>>>>> 
>>>>>> I've started working on providing additional authentication
>> mechanisms
>>> for
>>>>>> the NiFi user interface. Currently, only two way SSL using client
>>>>>> certificates is supported to authenticate users. I would like to
>>> inquire
>>>>>> about which other mechanisms the community would like to see
>>> implemented.
>>>>>> 
>>>>>> We have created a feature proposal discussing some of the options
>> [1].
>>> At a
>>>>>> high level, in additional to PKI, we are looking at
>>>>>> 
>>>>>> - Username/password
>>>>>> -- stored in a local configuration file (ie authorized-users.xml)
>>>>>> -- stored in a configurable LDAP
>>>>>> -- stored in a configurable database
>>>>>> - Kerberos
>>>>>> - OpenId Connect
>>>>>> 
>>>>>> What other options are important and should be added to the list?
>>> Thanks!
>>>>>> 
>>>>>> Matt
>>>>>> 
>>>>>> [1]
>> https://cwiki.apache.org/confluence/display/NIFI/Pluggable+Authentication
>> 

Reply via email to