Ask - Test
RE: Liferay using Google as an LDAP Server
Liferay using Google as an LDAP Server
New Member Posts: 13 Join Date: 12/15/10 Recent PostsHi All,
Liferay is unable to support Google LDAP, google uses a key and certificate for authorisation. If I follow their instructions on combining the key and cert into a pkcs13 format and adding it to the Keystore. This works with standard Java, but for some reason, does not work with Liferay. The support team have provided a workaround, which is to use stunneling, which Liferay have tested, so I will try this, but this means that the connection Liferay is making will have to be done in plain text.
So, I request that Liferay make some changes to support certificate authentication so that Google LDAP can be used as an authentication mechanism directly, and without an stunnel.
Regards
RE: Liferay using Google as an LDAP Server
Expert Posts: 367 Join Date: 9/5/14 Recent PostsFeature Request Created: https://liferay.atlassian.net/browse/LPD-16284
RE: RE: Liferay using Google as an LDAP Server
New Member Posts: 13 Join Date: 12/15/10 Recent PostsI saw the comment on the new feature request asking if SCIM would help with this issue. I read a little about it, and this talks about Identity management, so not really sure how this would help, as I am just wanting to use the Liferay LDAP integration, but with Google! This is a feature that I'd like sooner, rather than later, so not sure waiting for an SCIM implementation will be possible, and the first delivery will likely have issues! Based on previous experience!
I did not comment on the ticket directly, as I seem to not be able to get into the Jira system, I have had this issue before and it seems to stem from Us having our own Jira instance, and I just seem to get stuck in a lop trying to log in.
Regards
RE: RE: Liferay using Google as an LDAP Server
Liferay Master Posts: 764 Join Date: 1/5/10 Recent PostsHi Mark,
Sorry about being sloppy in my comment on the ticket.
One of the purposes of the SCIM is the same as the LDAP, to do the user provisioning. However, SCIM is more flexible. As the LDAP providers can generally act as a SCIM client, this is a way of provisioning user data that can be considered to change to. That may be able to solve such keystore related problems also with delegating that to the SCIM client. We would also support this direction.
That may be quicker, easier and less painful to implement than a properly working LDAP integration with key and certs added to a keystore.
Cannot that work to you?
Regards,
Zsigmond
RE: RE: Liferay using Google as an LDAP Server
New Member Posts: 13 Join Date: 12/15/10 Recent PostsSorry, I somehow missed this reply!
This all became irrelevant for us, as we're now using SAML for SSO and user provisioning, with a custom post login module. And this seems to be working for us.
We were unable to expose the Google LDAP via SCIM, although Google does support SCIM it does, only for specific applications that can be selected from a list! This may have changed, and I'm sure there will eventually be a 'custom' app support for this, but we found another way!
Powered by Liferay™