Hi

On Fri, 9 May 2025 at 08:45, Akshay Joshi <akshay.jo...@enterprisedb.com>
wrote:

> Hi Hackers/Dave,
>
> I have started working on issue #8580
> <https://github.com/pgadmin-org/pgadmin4/issues/8580>, where the correct
> error message should be displayed based on the user's authentication source
> when an incorrect password is provided.
>
> *Actual Issue*: The admin has configured AUTHENTICATION_SOURCES =
> ['internal', 'ldap']. A user with the email a...@xyz.com exists only as an
> internal user in the database, and there is no corresponding LDAP entry for
> this user. When this user attempts to log in with an incorrect password,
> the system first tries internal authentication, which fails. It then
> proceeds to check the next authentication source (LDAP), as per the
> configured logic. Since no matching LDAP user exists, an LDAP-related error
> is returned, even though the user is intended to be authenticated only
> internally. His/her account will never get locked.
>
> This behavior appears to be incorrect to me. I’m proposing two possible
> solutions to address it:
> *Solution 1 (Logic Changes): *
> *Scenario 1: ['internal', 'ldap']:*
>
>    - If a user exists in the database with the specified authentication
>    source (internal), attempt to authenticate using internal. If
>    authentication fails, return an error. No need to check for the LDAP or
>    next auth source.
>
> Yes.

>
>    - If no user-auth source combination is found for internal, proceed to
>    the next authentication source (LDAP). Attempt LDAP login, and if
>    successful (and auto-create is enabled), create the user in the database.
>
> Yes.


> *Scenario 2: ['ldap', 'internal']*
>
>    - If the LDAP user does not exist in the database, but the same user
>    exists as an internal user, first try LDAP authentication. If it fails,
>    fall back to internal or the next configured auth source in the list.
>
> Yes.

>
>    - If the LDAP user does exist in the database, attempt to authenticate
>    via LDAP. If LDAP authentication fails, return the error without checking
>    for the next authentication source.
>
> Yes.


> *Note:* - In the above approach, it is the administrator's responsibility
> to configure the order of authentication sources appropriately.
>

Agreed.


>
> *Solution 2 (GUI Changes): *Add a single login button with a drop-down
> menu to select the authentication source (e.g., "Internal", "LDAP") on the
> login page, as we already display N buttons for N OAuth2 configurations,
> which can be removed for a cleaner user experience.
> OR
> Alternatively, add a separate button labeled "Login with LDAP" to
> explicitly trigger LDAP authentication.
>

I don't like this solution, as it requires the end user to understand how
their admin has setup the backend authentication. That seems like something
they shouldn't need to concern themselves with.

-- 
Dave Page
pgAdmin: https://www.pgadmin.org
PostgreSQL: https://www.postgresql.org
pgEdge: https://www.pgedge.com

Reply via email to