On Fri, 9 May 2025 at 11:34, Khushboo Vashi <khushboo.va...@enterprisedb.com> wrote:
> > > On Fri, May 9, 2025 at 3:23 PM Dave Page <dp...@pgadmin.org> wrote: > >> Hi >> >> On Fri, 9 May 2025 at 08:45, Akshay Joshi <akshay.jo...@enterprisedb.com> >> wrote: >> >>> Hi Hackers/Dave, >>> >>> I have started working on issue #8580 >>> <https://github.com/pgadmin-org/pgadmin4/issues/8580>, where the >>> correct error message should be displayed based on the user's >>> authentication source when an incorrect password is provided. >>> >>> *Actual Issue*: The admin has configured AUTHENTICATION_SOURCES = >>> ['internal', 'ldap']. A user with the email a...@xyz.com exists only as an >>> internal user in the database, and there is no corresponding LDAP entry for >>> this user. When this user attempts to log in with an incorrect password, >>> the system first tries internal authentication, which fails. It then >>> proceeds to check the next authentication source (LDAP), as per the >>> configured logic. Since no matching LDAP user exists, an LDAP-related error >>> is returned, even though the user is intended to be authenticated only >>> internally. His/her account will never get locked. >>> >>> This behavior appears to be incorrect to me. I’m proposing two possible >>> solutions to address it: >>> *Solution 1 (Logic Changes): * >>> *Scenario 1: ['internal', 'ldap']:* >>> >>> - If a user exists in the database with the specified authentication >>> source (internal), attempt to authenticate using internal. If >>> authentication fails, return an error. No need to check for the LDAP or >>> next auth source. >>> >>> Yes. >> >>> >>> - If no user-auth source combination is found for internal, proceed >>> to the next authentication source (LDAP). Attempt LDAP login, and if >>> successful (and auto-create is enabled), create the user in the database. >>> >>> Yes. >> >> >>> *Scenario 2: ['ldap', 'internal']* >>> >>> - If the LDAP user does not exist in the database, but the same user >>> exists as an internal user, first try LDAP authentication. If it fails, >>> fall back to internal or the next configured auth source in the list. >>> >>> Yes. >> >>> >>> - If the LDAP user does exist in the database, attempt to >>> authenticate via LDAP. If LDAP authentication fails, return the error >>> without checking for the next authentication source. >>> >>> Yes. >> > > > If the user is registered for multiple authentications (per entries in our > database), the next in line should be checked if one fails.= > I think that's reasonable, but *only* in that case where there's another source already present in the DB. -- Dave Page pgAdmin: https://www.pgadmin.org PostgreSQL: https://www.postgresql.org pgEdge: https://www.pgedge.com