External Authentication#
This page details how Squirro can work with external authentication, authorization, and Single Sign-On (SSO) providers.
It also includes an example LDAP external authentication example.
Overview#
The architecture of how Squirro implements these techniques is covered in Architecture for Authentication.
Single Sign-On#
Squirro supports SAML Single Sign-On out of the box.
See SAML SSO for Squirro on setup instructions.
For specific third-party SSOs, see the following pages:
Squirro LDAP External Authentication Example#
Introduction#
This tutorial will walk you step-by-step through the process of setting up Squirro to authenticate your users against an LDAP directory like OpenLDAP or ActiveDirectory.
The authentication will happen as a basic authentication form.
Installing Apache 2.4#
The LDAP integration will be handled by the Apache Webserver. Its also possible to this directly in NGINX, but you will need to recompile it with –configure options which can break future updates of Squirro. Hence we recommend you use Apache 2.4 which integrates nicely with dynamic modules.
yum install httpd24 httpd24-mod_ldap httpd24-mod_ssl
/etc/init.d/httpd24-httpd start
You should now be able to reach apache on port 80, e.g. http://yourservernameorip
Example:
Configure Apache as Reverse Proxy#
Create the file /opt/rh/httpd24/root/etc/httpd/conf.d/squirro.conf
with this content:
# forward all traffic to squirro
ProxyPass "/" "http://localhost:81/"
ProxyPassReverse "/" ""http://localhost:81/"
Reload the Apache configuration:
/etc/init.d/httpd24-httpd reload
Access the server URL again, and you should now reach the squirro app:
If the server is not setup, you should sign up and create your first user with a safe password.
Configure SSL for Apache#
Since nginx also bind to the SSL HTTPS port tcp 443, we first have to change that.
Edit the file /etc/nginx/conf.d/00-default.conf
Change this line:
listen 443 ssl;
to
listen 8443 ssl;
Then run
/etc/init.d nginx restart
Change /opt/rh/httpd24/root/etc/httpd/conf.d/squirro.conf
to this:
#forward all traffic to squirro
Listen 443
<VirtualHost *:443>
SSLEngine on
SSLCertificateFile "/etc/nginx/ssl/localhost.crt"
SSLCertificateKeyFile "/etc/nginx/ssl/localhost.key"
SSLCipherSuite HIGH:!aNULL:!MD5
<Location "/">
ProxyPass "http://localhost:81/"
ProxyPassReverse "http://localhost:81/"
</Location>
</VirtualHost>
Then restart Apache:
/etc/init.d/httpd24-httpd restart
You can now access Squirro via SSL, e.g. via https://yourservernameorop/
If you don’t use an official ssl certificate that matches the domain, your browser will display a warning, but that you can bypass for now.
LDAP Authentication for Apache 2#
For your reference, this is how the example ldap is set up:
$ ldapsearch -x -LLL -b dc=acme,dc=com
dn: dc=acme,dc=com
objectClass: dcObject
objectClass: organization
dc: acme
o: acme
dn: ou=Users,dc=acme,dc=com
objectClass: organizationalUnit
ou: Users
dn: cn=Bob Jones,ou=Users,dc=acme,dc=com
cn: Bob Jones
sn: Jones
objectClass: inetOrgPerson
mail: [email protected]
uid: bob
dn: cn=Engineering,ou=Users,dc=acme,dc=com
cn: Engineering
objectClass: groupOfNames
member: cn=Bob Jones,ou=Users,dc=acme,dc=com
The username is bob, and his password is: squirro
Change /opt/rh/httpd24/root/etc/httpd/conf.d/squirro.conf
to this:
#forward all traffic to squirro
LDAPSharedCacheSize 500000
LDAPCacheEntries 1024
LDAPCacheTTL 600
LDAPOpCacheEntries 1024
LDAPOpCacheTTL 600
Listen 443
<VirtualHost *:443>
SSLEngine on
SSLCertificateFile "/etc/nginx/ssl/localhost.crt"
SSLCertificateKeyFile "/etc/nginx/ssl/localhost.key"
SSLCipherSuite HIGH:!aNULL:!MD5
<Location "/">
ProxyPass "http://localhost:81/"
ProxyPassReverse "http://localhost:81/"
AuthType Basic
AuthName "LDAP Protected"
AuthBasicProvider ldap
AuthLDAPURL "ldap://127.0.0.1/ou=Users,dc=acme,dc=com?uid"
Require valid-user
</Location>
</VirtualHost>
Restart Apache2:
/etc/init.d/httpd24-httpd restart
Reoad the browser and it will prompt you with the login form:
In our example log in with bob and password squirro or any valid user.
If successfull you should again reach the Squirro application. You’re not logged in as bob yet into Squirro, so you might either see the login screen or if you’ve been logged in before, then you might just be logged in as that previous user.
This is expected. Now we’re ready to configure Squirro to use the apache ldap information.
Forward User Metadata from Apache to Squirro#
Add the following line to to the Location section of /opt/rh/httpd24/root/etc/httpd/conf.d/squirro.conf
:
RequestHeader set X-Remote-User expr=%{REMOTE_USER}
Then restart apache again.
Apache is now with every request sending the authenticated user name to the squirro nginx server as X-Remote-User.
Create a Squirro Group for the LDAP Users#
In the Squirro UI as Admin, create a new Group and call it Employees. Add this Group as a member to at least one of your Squirro projects.
We now need locate the tenant id and the group id for this group.
As root on the server run the following command:
echo "select name, id as group_id, tenant_id from user.groups where name = 'Employees' \\G;" | mysql
You get an output like this:
*************************** 1. row ***************************
name: Employees
group_id: 4L3K5yJJSHqOI_1gQ5cGsA
tenant_id: w7ltekfpTA6MYPLc-dHP8A
Note both the tenant_id and the group_id you get back.
Install the Squirro External Authentication service#
yum install squirro-python-squirro-extauth
Ensure its started:
chkconfig sqextauthd on
/etc/init.d/sqextauthd start
service nginx rest
Configure the Squirro Frontend service to use the external authentication.
Add the following to /etc/squirro/frontend.ini
[security]
sso_enabled = True
sso_endpoint = http://localhost:81/service/extauth/v0/authenticate
Then restart the frontend service:
/etc/init.d/sqfrontendd restart
Deploy the LDAP External Authentication Class#
Edit the file /opt/squirro/virtualenv/lib/python2.7/site-packages/squirro/service/extauth/main.py
and add the following content and replace the tenant_id on line 29 and group on line 32 accordingly.
import logging
import wsgiservice
from squirro.common.format import json
from squirro.common.resource import Resource, StatusResource # noqa
log = logging.getLogger(__name__)
@wsgiservice.mount('/v0/authenticate')
class AuthenticateResource(Resource):
def POST(self):
request = self.request.json_body
log.debug('Received request %r', request)
headers = request.get('headers', {})
if not headers.get('X-Remote-User'):
log.debug('No user provided')
wsgiservice.raise_400(self, 'No user found, check reverse proxy config')
user = headers['X-Remote-User']
retval = {
'user_id': user,
'user_information': {},
'tenant': 'squirro',
'email': '{0}@acme.com'.format(user),
'fullname': user,
'group_ids': ['4L3K5yJJSHqOI_1gQ5cGsA']
}
log.debug('Returning %r', retval)
return retval
app = wsgiservice.get_app(globals())
This is only a very basic example, we’ll extend it further down, but its a great initial test to ensure the integration is working.
Restart the extauth service. You need to do this every time you modify the main.py file.
/etc/init.d/sqextauthd restart
You are currently still logged into the Squirro system, force a logout by visiting
https://yourdomainorip/app/#logout
If everything worked, then you now get logged in automatically as Bob:
You can see this in the UI on the top right corner:
In the log file /var/log/squirro/extauth.log
you can see the debug output:
PV:- Thread-1 squirro.service.extauth.main 2017-10-25 06:35:43,091 DEBUG Received request:
{
"headers":{
"Content-Length":"",
"X-Forwarded-Server":"127.0.0.1",
"Accept-Language":"en-US,en;q=0.8,de-DE;q=0.6,de;q=0.4,es;q=0.2",
"Accept-Encoding":"gzip, deflate, br",
"X-Forwarded-Host":"192.168.110.228",
"X-Remote-User":"bob",
"X-Forwarded-For":"192.168.110.1",
"Connection":"Keep-Alive",
"Accept":"text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,image\/apng,*\/*;q=0.8",
"Upgrade-Insecure-Requests":"1",
"Dnt":"1",
"Host":"192.168.110.228",
"Referer":"https:\/\/192.168.110.228\/app\/",
"Pragma":"no-cache",
"Cache-Control":"no-cache",
"User-Agent":"Mozilla\/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/61.0.3163.100 Safari\/537.36",
"Content-Type":"",
"Authorization":"Basic Ym9iOnNxdWlycm8="
}
}
PV:- Thread-1 squirro.service.extauth.main 2017-10-25 06:35:43,091 DEBUG Returning:
{
"group_ids":[
"4L3K5yJJSHqOI_1gQ5cGsA"
],
"user_id":"bob",
"user_information":{
},
"fullname":"bob",
"email":"[email protected]",
"tenant":"squirro"
}
Full Example with LDAP user attribute Retrieval and group mapping#
The above main.py was very simple on purpose to explain how the concept works.
Here is the official main.py
extauth file for a fully featured OpenLDAP integration.
import logging
import redis
import wsgiservice
import json
import hashlib
from squirro.common.format import json
from squirro.common.resource import Resource, StatusResource # noqa
from squirro.common.dependency import get_injected
from squirro.common.config import get_config
from squirro_client import SquirroClient
from ldap3 import Server, Connection, ALL
log = logging.getLogger(__name__)
config_extauth = get_config('squirro.service.extauth')
config_redis = get_injected('config')
@wsgiservice.mount('/v0/authenticate')
class AuthenticateResource(Resource):
def get_config_str(self, name, raise_on_error=True):
value = config_extauth.get('extauth', name)
if not value:
log.error(u'Configuration error, failed to get %s parameter from extauth.ini ' \
'[extauth] section', name)
self.deny()
return value
def get_config_int(self, name, raise_on_error=True):
value = config_extauth.getint('extauth', name)
if not value and value != 0:
log.error(u'Configuration error, failed to get %s parameter from extauth.ini ' \
'[extauth] section', name)
self.deny()
return value
def get_config_bool(self, name, raise_on_error=True):
return config_extauth.getboolean('extauth', name)
def md5(self, data):
digest = hashlib.md5()
digest.update(repr(data))
return digest.hexdigest()
def deny(self, message="Access denied"):
wsgiservice.raise_400(self, message)
def get_ldap_conn(self):
host = self.get_config_str('ldap_host')
port = self.get_config_int('ldap_port')
use_ssl = self.get_config_bool('ldap_use_ssl')
username = self.get_config_str('ldap_username')
password = self.get_config_str('ldap_password')
server = Server(host=host, port=port, use_ssl=use_ssl)
if username and password:
conn = Connection(server=server, user=username, password=password, auto_bind=True)
else:
conn = Connection(server=server, auto_bind=True)
return conn
def get_squirro_client(self, squirro_client):
if squirro_client:
return squirro_client
cluster = self.get_config_str('cluster')
token = self.get_config_str('token')
squirro_client = SquirroClient(None, None, cluster=cluster)
squirro_client.authenticate(refresh_token=token)
return squirro_client
def create_group(self, name, squirro_client, redis_client):
if not squirro_client:
squirro_client = self.get_squirro_client(squirro_client)
group = squirro_client.create_group(name)
log.info('Created group %r with id %s', name, group['id'])
#increment the cache key version
self.cache_version += 1
redis_client.set(self.version_key, self.cache_version)
return group['id']
def get_group_mapping(self, squirro_client, redis_client):
"""gets all groups from squirro and returns a dict with easy name lookup"""
#cache key
group_mapping_key = u"extauth_{0}_groupmapping_{1}".format(self.tenant, self.cache_version)
#try redis cache first
group_mapping = redis_client.get(group_mapping_key)
if group_mapping:
log.debug('Cache hit for redis key %s', group_mapping_key)
group_mapping = json.loads(group_mapping)
else:
log.debug('Cache miss for redis key %s', group_mapping_key)
if not squirro_client:
squirro_client = self.get_squirro_client(squirro_client)
groups_list = squirro_client.get_groups()
#build the lookup:
group_mapping = {}
for group in groups_list:
group_mapping[group['name']] = group['id']
#store for future lookups
cache_ttl = self.get_config_str('cache_ttl')
redis_client.set(group_mapping_key, json.dumps(group_mapping), ex=cache_ttl)
log.debug('Squirro Group Mapping: %s', json.dumps(group_mapping, indent=2))
return group_mapping
def POST(self):
squirro_client = None
r = redis.StrictRedis(
host=config_redis.get('redis_cache', 'host'),
port=config_redis.getint('redis_cache', 'port'),
password=config_redis.get('redis_cache', 'password'),
db=15)
self.tenant = self.get_config_str('tenant')
self.version_key = u"extauth_{0}_version".format(self.tenant)
self.cache_version = r.get(self.version_key)
if not self.cache_version:
self.cache_version = 1
else:
self.cache_version = int(self.cache_version)
#extract data from http requests
request = self.request.json_body
log.debug(u'Received request:\n %s', json.dumps(request, indent=2))
headers_dict = request.get('headers', {})
#normalize headers
headers = {}
log.debug('Available http headers:')
for name, value in headers_dict.iteritems():
normalized_name = name.lower().strip()
headers[normalized_name] = value
log.debug(u" - %s: %s", normalized_name, value)
#extract the username from the http headers
username_header = self.get_config_str('username_http_header')
username_header = username_header.lower().strip()
if not username_header:
log.error('Configuration error, set username_http_header option in extauth.ini '\
'[extauth] section')
self.deny()
username = headers.get(username_header)
log.debug(u'Username: %s', username)
if not username:
log.error(u'Cannot find header %s in available header names. Available headers are: %r',
username_header, headers.keys())
self.deny()
#get the list of all squirro groups
squirro_group_mapping = self.get_group_mapping(squirro_client, r)
groups = []
#handle default group
default_group_name = self.get_config_str('default_group_name')
if default_group_name:
default_group_name = default_group_name.strip()
default_group_id = squirro_group_mapping.get(default_group_name)
if default_group_id:
groups.append(default_group_id)
log.debug(u'Granted default group membership %s/%s to user %s', default_group_name,
default_group_id, username)
else:
log.error('Default group %r does not exist in Squirro. Create the group or ' \
'adjust the default_group_name setting in the [extauth] section',
default_group_name)
self.deny()
#establish ldap connection
ldap_conn = self.get_ldap_conn()
#get user attributes from ldap
search_base = self.get_config_str('ldap_user_search_base')
search_filter = self.get_config_str('ldap_user_filter').format(username=username)
fullname_attribute = self.get_config_str('ldap_user_fullname_attribute')
email_attribute = self.get_config_str('ldap_user_email_attribute')
user_attributes = [fullname_attribute, email_attribute]
ldap_conn.search(search_base, search_filter, attributes=user_attributes)
if len(ldap_conn.entries) == 1:
ldap_user = ldap_conn.response[0]
user_dn = ldap_user['dn']
user_id = self.md5(user_dn)
user_fullname = ldap_user['attributes'][fullname_attribute][0]
user_email = ldap_user['attributes'][email_attribute][0]
elif len(ldap_conn.entries) == 0:
log.error('No users found for %r, %r', search_base, search_filter)
self.deny()
else:
log.error('%i users found for %r, %r, a unique user must be matched',
len(ldap_conn.entries), search_base, search_filter)
self.deny()
search_base = self.get_config_str('ldap_group_search_base', raise_on_error=False)
search_filter = self.get_config_str('ldap_group_filter', raise_on_error=False)
name_attribute = self.get_config_str('ldap_group_name_attribute', raise_on_error=False)
#skip this step if not all attributes are there but a default group is already present
if not search_base or not search_filter or not name_attribute:
if len(groups) == 0:
log.error(u'Cannot do group membership query for user %s, missing parameters',
username)
if not search_base:
log.error('Configure ldap_group_search_base in [extauth] section')
if not search_filter:
log.error('Configure ldap_group_filter in [extauth] section')
if not name_attribute:
log.error('Configure ldap_group_name_attribute in [extauth] section')
else:
log.info('Skipping ldap group membership lookup, its not configured, but ' \
'default group is present')
else:
#lookup groups in ldap for this user
user_dict = {
'email': user_email,
'fullname': user_fullname,
'dn': user_dn
}
log.debug('Templating the group search filter with these keys: %s', user_dict.keys())
search_filter = search_filter.format(user=user_dict)
ldap_conn.search(search_base, search_filter, attributes=[name_attribute])
create_groups = self.get_config_bool('create_squirro_groups', raise_on_error=False)
for group in ldap_conn.response:
group_name = group['attributes'][name_attribute][0]
squirro_group_id = squirro_group_mapping.get(group_name)
if squirro_group_id:
groups.append(squirro_group_id)
log.debug(u'Granted group membership %s/%s to user %s', group_name,
squirro_group_id, username)
elif create_groups:
log.warn(u'LDAP group %r not present in Squirro, creating it...', group_name)
squirro_group_id = self.create_group(group_name, squirro_client, r)
log.debug(u'Granted group membership %s/%s to user %s', group_name,
squirro_group_id, username)
else:
log.warn(u'LDAP group %r not present in Squirro, please create it', group_name)
#finally deny access if not at least 1 group is present
if len(groups) == 0:
log.error(u'User %s has no group memberships, denying access', username)
self.deny()
log.info(u'Successful authentication for user %s (%s) with %i groups', username,
user_email, len(groups))
retval = {
'user_id': user_id,
'user_information': {},
'tenant': self.tenant,
'email': user_email,
'fullname': user_fullname,
'group_ids': groups
}
log.debug(u'Returning: \n %s', json.dumps(retval, indent=2))
return retval
app = wsgiservice.get_app(globals())
Its highly configurable to fit your environment.
Email and Fullname are retrieved from LDAP
A key feature is that it can create Squirro groups automatically as new groups are discovered in LDAP.
These groups show up in the Squirro Group UI and you can simply add them as project members at will.
If you don’t want to do any group mapping, then comment out ldap_group_filter and ldap_group_search_base but set a group name under default_group_name.
In this setup, the only check done is if the users exists. You have to create the default group in Squirro manually in this mode.
Here is an example extauth.ini
file that fits the setup we’ve used during this tutorial:
[handler_file]
application = extauth
[extauth]
# squirro tenant name
tenant = squirro
# define which http header contains the user id
# the header name is normalized to lowercase
username_http_header = X-Remote-User
# squirro api token to retrieve group ids automatically
# also used to create new groups automatically if enabled
token = ...
cluster = http://localhost:81
# hostname of the ldap / active directory server
ldap_host = 127.0.0.1
# tcp port of the ldap server
ldap_port = 389
# controls if ldap traffic is ssl encrypted or not
# unless the host is localhost, encryption is highly recommended
ldap_use_ssl = False
# Ldap crendential, required if anonymous access is not allowed.
ldap_username = cn=Manager,dc=acme,dc=com
ldap_password = squirro
# Search base and filter for locating the users
# If 0 matches are found, access is denied
ldap_user_search_base = ou=Users,dc=acme,dc=com
ldap_user_filter = (& (objectclass=inetOrgPerson)(uid={username}))
# Search base and filter for the group memberships
# The query must be formulated so that only the group memberships of
# the current user are returned
# If no groups are found, access is denied or the default group is granted
ldap_group_search_base = ou=Users,dc=acme,dc=com
ldap_group_filter = (&(member={user[dn]})(objectClass=groupOfNames))
# mapping of the users ldap attributes to the squirro attributes
ldap_user_id_attribute = dn
ldap_user_fullname_attribute = cn
ldap_user_email_attribute = mail
# mapping of the group ldap name attribute to the squirro attributes
ldap_group_name_attribute = cn
# default group attributed to all users disregarding of the actual ldap group memberships
# Fully optional, use this if only a valid user is required, but no ldap group membership
default_group_name = Guests
# if set, missing squirro groups are created automatically
create_squirro_groups = True
# how many seconds responses from Squirro and LDAP can be cached
cache_ttl = 60
[logger_root]
level = DEBUG
See the ini file comment lines for details. The log output is very verbose and should make debugging simple.
Here a successful login for another user called bob with a few more groups:
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,636 DEBUG Received request:
{
"headers":{
"Content-Length":"",
"X-Forwarded-Server":"127.0.0.1",
"Accept-Language":"en-US,en;q=0.8,de-DE;q=0.6,de;q=0.4,es;q=0.2",
"Accept-Encoding":"gzip, deflate, br",
"X-Forwarded-Host":"192.168.110.228",
"X-Remote-User":"joe",
"X-Forwarded-For":"192.168.110.1",
"Connection":"Keep-Alive",
"Accept":"text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/webp,image\/apng,*\/*;q=0.8",
"Upgrade-Insecure-Requests":"1",
"Dnt":"1",
"Host":"192.168.110.228",
"Referer":"https:\/\/192.168.110.228\/app\/",
"User-Agent":"Mozilla\/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/61.0.3163.100 Safari\/537.36",
"Content-Type":"",
"Authorization":"Basic am9lOnNxdWlycm8="
}
}
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,636 DEBUG Available http headers:
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,637 DEBUG - content-length:
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,638 DEBUG - x-forwarded-server: 127.0.0.1
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,638 DEBUG - accept-language: en-US,en;q=0.8,de-DE;q=0.6,de;q=0.4,es;q=0.2
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,639 DEBUG - accept-encoding: gzip, deflate, br
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,640 DEBUG - x-forwarded-host: 192.168.110.228
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,640 DEBUG - x-remote-user: joe
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,641 DEBUG - x-forwarded-for: 192.168.110.1
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,641 DEBUG - connection: Keep-Alive
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,641 DEBUG - accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,642 DEBUG - upgrade-insecure-requests: 1
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,642 DEBUG - dnt: 1
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,643 DEBUG - host: 192.168.110.228
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,643 DEBUG - referer: https://192.168.110.228/app/
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,643 DEBUG - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,643 DEBUG - content-type:
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,643 DEBUG - authorization: Basic am9lOnNxdWlycm8=
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,644 DEBUG Username: joe
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,644 DEBUG Cache hit for redis key extauth_squirro_groupmapping_1
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,645 DEBUG Squirro Group Mapping: {
"Sales":"ZervQb5RRne8IcbfFwU6Lw",
"Marketing":"hvlU3UIVTNa_zr2r-4oOng",
"Employees":"4L3K5yJJSHqOI_1gQ5cGsA",
"Support":"teG8tDBkSz2FPjb6WHuqfQ",
"Guests":"V9wGIL6jSYaWuWev_szFmQ"
}
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,645 DEBUG Granted default group membership Guests/V9wGIL6jSYaWuWev_szFmQ to user joe
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,692 DEBUG Templating the group search filter with these keys: ['dn', 'fullname', 'email']
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,694 DEBUG Granted group membership Sales/ZervQb5RRne8IcbfFwU6Lw to user joe
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,694 DEBUG Granted group membership Marketing/hvlU3UIVTNa_zr2r-4oOng to user joe
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,694 DEBUG Granted group membership Support/teG8tDBkSz2FPjb6WHuqfQ to user joe
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,695 INFO Successful authentication for user joe ([email protected]) with 4 groups
PV:- Thread-2 squirro.service.extauth.main 2017-11-05 14:00:41,695 DEBUG Returning:
{
"group_ids":[
"V9wGIL6jSYaWuWev_szFmQ",
"ZervQb5RRne8IcbfFwU6Lw",
"hvlU3UIVTNa_zr2r-4oOng",
"teG8tDBkSz2FPjb6WHuqfQ"
],
"user_id":"0b54ffc786a0534af58cdc333c37f68a",
"user_information":{
},
"fullname":"Joe Builder",
"email":"[email protected]",
"tenant":"squirro"
}
Deploying#
In order to get the full version up and running, replace your existing extauth.ini
and main.py
files.
Adjust the settings to your needs.
The plugin depends on the Python ldap3 module which is not delivered by Squirro out of the box.
Installing it is simple:
source /opt/rh/python27/enable
source /opt/squirro/virtualenv/bin/activate
pip install ldap3
After the files and the module are in play, restart the service and tail all logs to see if there any issues:
systemctl restart sqextauthd
tail -f /var/log/squirro/extauth/*.log
As you refine your extauth.ini
, you have to rerun this command.
To force a reauthentication of your user, you can simply visit /app/#logout on the Squirro site. This will destroy the current session and re-initalize the extauth process for the user. You should then see activity in the extauth log.