On 06/26/2013 01:24 PM, alen vodopijevec wrote:
On 06/26/2013 12:46 PM, Tornóci László wrote:

I think there is a simple solution, if you have access to the LDAP
that is the backend to the identity provider service. Simply untick
the "Autocreate user after SAML login" and set up LDAP auth too. The
first prevents the creation of a record in oc_users. The second
provides you auth for webdav services. This setup works for me quite
well.


Thank you for your suggestion. We don't have access to LDAP database ..
AAI@EduHr is a service in front of all individual LDAP databases located
at our academic and research institutions - so, LDAP auth is not an
option in this case.

Most of my users are employees of my university. We also have a federated auth system like you, but the federation just provides a "where are you from" service, and the IdP-s are local. Since I provide the local IdP service as well, it is not a problem to access the LDAP too. LDAP auth also gives you LDAP groups, quota management etc. The nice thing about this is that OC allows you to mix locally defined users and users defined in LDAP. You can define local groups alongside of groups defined in LDAP too. So I define users who are not in my LDAP dir as local OC users, and this works quite well.

However, if you want to provide OC service to lots of people who are in the federation, but not in the local LDAP (or simply there is no way to access the local LDAP - but that is silly), you are in trouble. I would probably write a web front end to set up local OC users based on the federated authentication data, and would let my users to pick their own passwords stored in oc_users. And I would not use SAML auth in OC at all. Otherwise you will have loads of problems because people may have two different passwords to access different services in OC. An alternative possibility to automatically mail the generated password to your users. But this also leads to the 2 passwords problem.

                                        Yours: Laszlo

_______________________________________________
Owncloud mailing list
[email protected]
https://mail.kde.org/mailman/listinfo/owncloud

Reply via email to