Updated screenshots, backtick formatting, added assumptions section, users > nextcloud_users, clarity to certain sections.
BIN
example_configs/images/.DS_Store
vendored
Normal file
BIN
example_configs/images/authelia_openid_config.png
Normal file
After Width: | Height: | Size: 152 KiB |
Before Width: | Height: | Size: 82 KiB After Width: | Height: | Size: 76 KiB |
Before Width: | Height: | Size: 168 KiB After Width: | Height: | Size: 213 KiB |
Before Width: | Height: | Size: 110 KiB After Width: | Height: | Size: 114 KiB |
@ -5,24 +5,22 @@
|
||||
This example is using following users & groups in lldap :
|
||||
|
||||
* A technical user (ex: `ro_admin`), member of `lldap_strict_readonly` or `lldap_password_manager`
|
||||
* A catch-all group called `nextcloud_users`. Note: This is _not_ the same as the `Users` designation in the LLDAP Web UI. This must be a whole new group that you've created and called `nextcloud_users`.
|
||||
* A catch-all group called `nextcloud_users`.
|
||||
* Members of `nextcloud_users` group will be authorized to log in Nextcloud.
|
||||
* Some "application" groups, let's say `friends` and `family`: users in Nextcloud will be able to share files and view people in dynamic lists only to members of their own group(s).
|
||||
* Users in 'family' and 'friends' should also be users in 'nextcloud_users' group!
|
||||
* Users in `family` and `friends` should also be users in `nextcloud_users` group!
|
||||
|
||||
If you plan on following this tutorial line-by-line, you will now have the following:
|
||||
* 6 groups:
|
||||
1. `users`
|
||||
1. `nextcloud_users`
|
||||
2. `family`
|
||||
3. `friends`
|
||||
4. `lldap_strict_readonly`
|
||||
5. `lldap_password_manager`
|
||||
6. 'lldap_admin'
|
||||
7. `admin`
|
||||
* 1 admin user in one or both of the following groups:
|
||||
6. `admin`
|
||||
* 1 admin user in any of the following groups:
|
||||
1. `lldap_password_manager`
|
||||
2. `lldap_strict_readonly`
|
||||
3. `lldap_admin`
|
||||
* (Atleast) 1 user in the `nextcloud_users` group
|
||||
* (Optional) Any number of users in the `friends` or `family` group.
|
||||
|
||||
@ -76,7 +74,7 @@ occ ldap:set-config s01 ldapUserFilterMode 1
|
||||
occ ldap:set-config s01 ldapUuidGroupAttribute auto
|
||||
occ ldap:set-config s01 ldapUuidUserAttribute auto
|
||||
```
|
||||
With small amount of luck, you should be able to log in your nextcloud instance with LLDAP accounts in the `users` group.
|
||||
With a bit of of luck, you should be able to log in your nextcloud instance with LLDAP accounts in the `nextcloud_users` group.
|
||||
|
||||
## Nextcloud config : the GUI way
|
||||
|
||||
@ -93,9 +91,9 @@ Fill the LLDAP domain and port, DN + password of your technical account and base
|
||||
### Users tab
|
||||
|
||||
Select `person` as object class and then choose `Edit LDAP Query` : the `only from these groups` option is not functional.
|
||||
We want only users from the `users` group to be allowed to log in Nextcloud :
|
||||
We want only users from the `nextcloud_users` group to be allowed to log in Nextcloud :
|
||||
```
|
||||
(&(objectclass=person)(memberOf=cn=users,ou=groups,dc=example,dc=com))
|
||||
(&(objectclass=person)(memberOf=cn=nextcloud_users,ou=groups,dc=example,dc=com))
|
||||
```
|
||||
|
||||

|
||||
@ -117,12 +115,10 @@ You can use the menus for this part : select `groupOfUniqueNames` in the first m
|
||||
|
||||

|
||||
|
||||
The resulting LDAP filter could be simplified removing the first 'OR' condition (I think).
|
||||
## Sharing restrictions
|
||||
|
||||
Go to Settings > Administration > Sharing and check following boxes :
|
||||
|
||||
* "Allow username autocompletion to users within the same groups"
|
||||
* "Restrict users to only share with users in their groups"
|
||||
|
||||

|
||||
|
@ -1,25 +1,30 @@
|
||||
## Assumptions
|
||||
|
||||
If you're here, there are some assumptions being made about access and capabilities you have on your system:
|
||||
1. You have Authelia up and running, understand its functionality, and have read through the documentation.
|
||||
2. You have [LLDAP](https://github.com/nitnelave/lldap) up and running.
|
||||
3. You have Nextcloud and LLDAP communicating and without any config errors. See the [example config for Nextcloud](example_configs/nextcloud.md)
|
||||
|
||||
## Authelia
|
||||
|
||||
Set up Authelia according to it's [documentation](https://www.authelia.com/overview/prologue/introduction/), including the [OpenID Connect](https://www.authelia.com/configuration/identity-providers/open-id-connect/) and [Nextcloud instructions](https://www.authelia.com/integration/openid-connect/nextcloud/).
|
||||
Set up Authelia according to its [documentation](https://www.authelia.com/overview/prologue/introduction/), including the [OpenID Connect](https://www.authelia.com/configuration/identity-providers/open-id-connect/) and [Nextcloud instructions](https://www.authelia.com/integration/openid-connect/nextcloud/).
|
||||
|
||||
## LLDAP
|
||||
|
||||
Set up [LLDAP](https://github.com/nitnelave/lldap) according to its standard documentation.
|
||||
|
||||
Add a group and note the name you use. For this tutorial, we're using the group `users`. Create a new user and add it to the `nextcloud_users` group.
|
||||
With LLDAP up and running, add a group and note the name you use. For this tutorial, we're using the group `nextcloud_users`. Create a new user and add it to the `nextcloud_users` group.
|
||||
|
||||
#### Optional:
|
||||
Once setup, add an admin or config user and add to the `lldap_strict_readonly` group. This will be the config account used for Nextcloud to read your groups and users from the server.
|
||||
Once setup, add an admin or config user and add to the `lldap_strict_readonly` or `lldap_password_manager` group. This will be the config account used for Nextcloud to read your groups and users from the server.
|
||||
|
||||
## Nextcloud
|
||||
**_When we get to the OpenID section, we will be using the same defaults as Authelia's documentation. As a reminder, they are:_**
|
||||
|
||||
* **Application Root URL:** https://nextcloud.example.com
|
||||
* **Authelia Root URL:** https://auth.example.com
|
||||
* **Client ID:** nextcloud
|
||||
* **Client Secret:** nextcloud_client_secret
|
||||
* [**Client ID:**](https://www.authelia.com/configuration/identity-providers/open-id-connect/#id) nextcloud
|
||||
* [**Client Secret:**](https://www.authelia.com/configuration/identity-providers/open-id-connect/#secret) nextcloud_client_secret
|
||||
|
||||
Login to your Nextcloud instance as an admin. Setup an LDAP server connection according to [LLDAP's Documentation](https://github.com/nitnelave/lldap/blob/main/example_configs/nextcloud.md). Once your configuration is setup and Nextcloud doesn't show any errors, you can move onto the next step. It's also a good idea to test this by logging into your Nextcloud instance with your LLDAP credentials. OpenID Connect won't work if you don't first have this working.
|
||||
Login to your Nextcloud instance as an admin. By now, you should have correctly setup Nextcloud and LLDAP to be communicating and working as expected. [See assumptions, above](#assumptions)
|
||||
|
||||
Next, navigate to the `Apps` section.
|
||||
|
||||
@ -33,14 +38,13 @@ You'll see many different options for various auth methods, including major 3rd
|
||||
* Allow Users to Connect Social Logins with their Account
|
||||
* Prevent creating an account if the email address exists in another account
|
||||
* Update user profile every login
|
||||
|
||||

|
||||

|
||||
|
||||
_You can test out the other options such as preventing users without a group, but I haven't tested all the options. These are just the ones I know that worked so far._
|
||||
|
||||
Scroll down and select **Custom OpenID Connect**. Fill out the following options:
|
||||
|
||||
_The first two can be any string you'd like to identify the connection with. Note that Title is the string that will show up on the button at the login screen._
|
||||
_The first two can be any string you'd like to identify the connection with. The Title is the string that will show up on the button at the login screen and the Internal Name will be used in the Redirect uri. [See point 3 in the section below](#some-notes)._
|
||||
|
||||
| Field | Value |
|
||||
|--|--|
|
||||
@ -56,12 +60,16 @@ _The first two can be any string you'd like to identify the connection with. Not
|
||||
|Scope: | openid profile email groups |
|
||||
|Groups Claim (Optional) | |
|
||||
|Button Style | None |
|
||||
|Default Group | users |
|
||||
|Default Group | nextcloud_users |
|
||||
|
||||
#### Some Notes
|
||||
* The *scope* should be the same as the scope that was setup in Authelia.
|
||||
* *_Do not_* use commas in the scope! This caused many issues for me.
|
||||
* If you've setup LDAP correctly in nextcloud, the last dropdown for _Default Group_ should show you the group you setup in LLDAP. In this example, that group is called users.
|
||||
* The *scope* should be the same as the scope that was setup in [Authelia's OpenID Integration](https://www.authelia.com/integration/openid-connect/nextcloud/#authelia). Here's an example from Authelia:
|
||||

|
||||
* *_Do not_* use commas in the Nextcloud Social Login app scope! This caused many issues for me.
|
||||
* Be sure you update your Authelia `configuration.yml`. Specifically, the line: `redirect_uris`. The new URL should be
|
||||
`https://auth.example.com/index.php/apps/sociallogin/custom_oidc/Authelia`.
|
||||
* The final field in the URL (Authelia) needs to be the same value you used in the Social Login "Internal Name" field.
|
||||
* If you've setup LLDAP correctly in nextcloud, the last dropdown for _Default Group_ should show you the `nextcloud_users` group you setup in LLDAP.
|
||||
|
||||
Once you've filled out the fields correctly, scroll to the bottom and hit save and confirm that you don't recieve any errors from Nextcloud.
|
||||
|
||||
@ -73,9 +81,7 @@ If this is set to *false* your login screen will show the standard User/Email an
|
||||
|
||||
If this is set to *true* then the user flow will _skip_ the login page and automatically bring you to the Authelia Consent Page at `https://auth.example.com/consent?consent_id=alphanuber-uuid-string`
|
||||
|
||||
|
||||
### Conclusion
|
||||
And that's it! Assuming all the settings that worked for me, work for you, you should be able to login using OpenID Connect via Authelia. If you find any errors, it's a good idea to keep a document of all your settings from Authelia/Nextcloud/LLDAP etc so that you can easily reference and ensure everything lines up.
|
||||
|
||||
Please comment here if you face any issues and we can test out other settings.
|
||||
|
||||
If you have any issues, please create a [discussion](https://github.com/nitnelave/lldap/discussions) or join the [Discord](https://discord.gg/h5PEdRMNyP).
|
||||
|