[ 
https://issues.apache.org/jira/browse/GUACAMOLE-1212?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17291290#comment-17291290
 ] 

Nick Couchman commented on GUACAMOLE-1212:
------------------------------------------

[~mirek186]: I suspect that there's something specific about this bind failure 
that needs to be captured - perhaps there is a particular status code that 
FreeIPA returns that we could retrieve from the failure to determine if the 
server is rejecting the user outright or asking for more information? This 
could then be used during the bind attempt to throw 
GuacamoleInsufficientCredentialsException and ask for something more than what 
was provided, rather than just throwing GuacamoleInvalidCredentialsException, 
which causes the failed login.

> Support 2FA Directly in LDAP Extension
> --------------------------------------
>
>                 Key: GUACAMOLE-1212
>                 URL: https://issues.apache.org/jira/browse/GUACAMOLE-1212
>             Project: Guacamole
>          Issue Type: Improvement
>          Components: guacamole-auth-ldap
>            Reporter: Brett Smith
>            Priority: Minor
>
> I'm using FreeIPA in my environment. I have guacamole-auth-ldap enabled and 
> configured and it works fine for users who do not have 2FA enabled. For our 
> users with 2FA enabled, we are using TOTP tokens provided by FreeIPA.
> When investigating a tcpdump between guacamole and the LDAP server, I can see 
> that guacamole passes the username and password to the LDAP server twice. 
> This works fine for a traditional username and password, but for a 
> 2FA-enabled user, the second authentication attempt returns failure since the 
> TOTP is one-time use. 2FA login attempts result in the guacamole logs 
> outputting "successfully authenticated" while the web UI shows "Invalid 
> Login" in a red banner.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to