Project

General

Profile

Alternativecustom authentication HowTo » History » Version 9

Mischa The Evil, 2013-11-08 05:03
Adding right-aligned TOC.

1 1 Andrew R Jackson
h1. Alternative (custom) Authentication HowTo
2
3 9 Mischa The Evil
{{>toc}}
4
5 1 Andrew R Jackson
h2. Intro
6
7
This page explains how to get Redmine to authenticate users against a different database. Perhaps you're running (and even wrote) an app that already stores account records, and you want Redmine to use those. Presumably that app doesn't support OpenID, else you'd be configuring that.
8
9
Having Redmine defer authentication to your other app is helpful to users--they only have to remember one set of passwords and the accounts can't get out-of-sync. And if they are registered with your main app, Redmine can be configured to automatically add them to its own table (without storing any password info) when they first log in there.
10
11
h2. Redmine Support For Alternative Authentication
12
13
Redmine has specific support for alternative/custom authentication which makes implementing it very easy.
14
* +@auth_sources@ table+
15
** You will add a record here specific to your custom authentication.
16
* +@AuthSource@ class+
17
** You will create your own subclass of this, and implement the @authenticate()@ method.
18
19
Redmine's authentication process is along these lines (LDAP & OpenID assumed to be disabled):
20
# First, try to authenticate @login@ & @password@ against Redmine's internal table (@users@).
21
# If that fails, try each alternative authentication source registered in the @auth_sources@ table, stopping when one of the sources succeeds.
22
# If that fails, reject the login attempt.
23
24
_Note: Redmine will make a note of which source successfully authenticated a specific user. That source will be tried first the next time that user tries to login. Administrators can manually set/override that on a user-by-user basis via @Administration -> Users -> {user} -> Authentication mode@._
25
26
h2. Implementing An Alternative Authentication Source
27
28
This article assumes the alternative authentication involves querying a table (or tables) in some other database. However, the approach can be generalized to authenticate against pretty much anything else (some secret file, some network service, whatever fun scenario you have); you may want to examine the Redmine code in @app/models/auth_source_ldap.rb@ for a non-database alternative authentication example.
29
30
h3. Insert a Sensible @auth_sources@ Record
31
32
First, we should decide what our @auth_sources@ record will look like. Redmine core and our @AuthSource@ subclass code will make use of that info, so it's good to figure this out up front.
33
34 2 Eric Davis
For reference, here is the (Redmine 0.9) @auth_sources@ table:
35 1 Andrew R Jackson
36
<pre>
37
+-------------------+--------------+------+-----+---------+----------------+
38
| Field             | Type         | Null | Key | Default | Extra          |
39
+-------------------+--------------+------+-----+---------+----------------+
40
| id                | int(11)      | NO   | PRI | NULL    | auto_increment |
41
| type              | varchar(30)  | NO   |     |         |                |
42
| name              | varchar(60)  | NO   |     |         |                |
43
| host              | varchar(60)  | YES  |     | NULL    |                |
44
| port              | int(11)      | YES  |     | NULL    |                |
45
| account           | varchar(255) | YES  |     | NULL    |                |
46
| account_password  | varchar(60)  | YES  |     | NULL    |                |
47
| base_dn           | varchar(255) | YES  |     | NULL    |                |
48
| attr_login        | varchar(30)  | YES  |     | NULL    |                |
49
| attr_firstname    | varchar(30)  | YES  |     | NULL    |                |
50
| attr_lastname     | varchar(30)  | YES  |     | NULL    |                |
51
| attr_mail         | varchar(30)  | YES  |     | NULL    |                |
52
| onthefly_register | tinyint(1)   | NO   |     | 0       |                |
53
| tls               | tinyint(1)   | NO   |     | 0       |                |
54
+-------------------+--------------+------+-----+---------+----------------+
55
</pre>
56
57
How our @AuthSource@ subclass code will make use of these fields is more-or-less up to us, but there are two key constraints from Redmine:
58
# +@type@ must be the name of your @AuthSource@ subclass+
59
#* Redmine will use this field to instantiate your class and call its @authenticate()@ method when attempting to authenticate a login attempt using your custom source.
60
#* This class name should begin with @AuthSource@.
61
#* We'll put "@AuthSourceMyCustomApp@"
62
# +@onthefly_register has a 1 or 0@+
63
#* Redmine will use this field to determine if unknown users (logins Redmine doesn't know about yet) can be registered within Redmine using this authentication source. Otherwise, if you put "0" here, an Administrator will first have to register the user manually (and presumably set their @Authentication mode@)--Redmine won't add them automatically.
64
65
Here's how we'll use these fields (substitute your own values):
66
67
| *Field* | *Our Value* | *Comment* |
68
| id | @NULL@ | Let the database engine provide the id. |
69
| type | "AuthSourceMyCustomApp" | Name of your @AuthSource@ subclass |
70
| name | "MyCustomApp" | Name of this alternative authentication source. Will be displayed in Administration UI pages.|
71
| host | "myApp.other.host.edu" | Host name where the other database lives. This article doesn't assume that's the same host as where your Redmine database is. |
72
| port | 3306 | Port for the database on that other host. |
73
| account | "myDbUser" | Account name for accessing that other database. |
74
| account_password | "myDbPass" | Password for that account for accessing the other database. |
75 8 Olivier Pinette
| base_dn | "mysql:myApp" | This field sounds very LDAP-ish. Sorry. We will interpret it to mean "BASic Database Name data" and store within a string of the form "@{dbAdapterName}:{dbName}@".|
76 1 Andrew R Jackson
| attr_login | "name" | What field in your other database table contains the login? |
77
| attr_firstname | "firstName" | What field in your other database table contains the user's first name? |
78
| attr_lastname | "lastName" | What field in your other database table contains the user's last name? |
79
| attr_mail | "email" | What field in your other database table contains the user's email? |
80
| onthefly_register | 1 | Yes, if this source authenticates the user then Redmine should create an internal record for them (w/o password info). |
81
| tls | 0 | Dunno. 0 for "no". |
82
83 3 Eric Davis
_Note: The @attr_*@ fields are not always needed. They are used by the LDAP authentication source to map LDAP attributes to Redmine attributes. I recommend using them, however, since they make the @authentication()@ code more widely applicable (fewer changes necessary for you to use the code in your specific situation)._
84 1 Andrew R Jackson
85
So we insert the record into our Redmine's @auth_sources@ table with SQL like the following:
86
87
<pre>
88
<code class="Sql">
89
INSERT INTO auth_sources VALUES (NULL, 'AuthSourceGenboree', 'Genboree', 'myApp.other.host.edu', 3306, 'myDbUser', 'myDbPass', 'mysql:myApp', 'name', 'firstName', 'lastName', 'email', 1, 0)
90
</code>
91
</pre>
92
93
h3. Implement Your @AuthSource@ Subclass
94
95
Create a new file for your @AuthSource@ subclass in @app/models/@, following the naming scheme of the existing @auth_source.rb@ and @auth_source_ldap.rb@.
96
* Here we'll use @app/models/auth_source_myApp.rb@
97
98
Implement the class such that a call to its @authenticate()@ method will contact the other database and use the table there to check the provided login credentials. The values in your @auth_sources@ table record above are available via instances variables (e.g. @self.host@, @self.base_dn@, @self.attr_firstname@). 
99
100
Here's our commented class:
101
102
<pre>
103
<code class="ruby">
104
# Redmine MyApp Authentication Source
105
#
106
# Copyright (C) 2010 Andrew R Jackson
107
#
108
# This program is free software; you can redistribute it and/or
109
# modify it under the terms of the GNU General Public License
110
# as published by the Free Software Foundation; either version 2
111
# of the License, or (at your option) any later version.
112
#
113
# This program is distributed in the hope that it will be useful,
114
# but WITHOUT ANY WARRANTY; without even the implied warranty of
115
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
116
# GNU General Public License for more details.
117
#
118
# You should have received a copy of the GNU General Public License
119
# along with this program; if not, write to the Free Software
120
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
121
122
# Let's have a new class for our ActiveRecord-based connection
123
# to our alternative authentication database. Remember that we're
124
# not assuming that the alternative authentication database is on
125
# the same host (and/or port) as Redmine's database. So its current
126
# database connection may be of no use to us. ActiveRecord uses class
127
# variables to store state (yay) like current connections and such; thus,
128
# dedicated class...
129
class MyAppCustomDB_ActiveRecord < ActiveRecord::Base
130
  PAUSE_RETRIES = 5
131
  MAX_RETRIES = 50
132
end
133
134
# Subclass AuthSource
135
class AuthSourceMyCustomApp < AuthSource
136
137
  # authentication() implementation
138
  # - Redmine will call this method, passing the login and password entered
139
  #   on the Sign In form.
140
  #
141
  # +login+ : what user entered for their login
142
  # +password+ : what user entered for their password
143
  def authenticate(login, password)
144
    retVal = nil
145
    unless(login.blank? or password.blank?)
146
      # Get a connection to the authenticating database.
147
      # - Don't use ActiveRecord::Base when using establish_connection() to get at
148
      #   your alternative database (leave Redmine's current connection alone).
149
      #   Use class you prepped above.
150
      # - Recall that the values stored in the fields of your auth_sources
151
      #   record are available as self.fieldName
152
153
      # First, get the DB Adapter name and database to use for connecting:
154
      adapter, dbName = self.base_dn.split(':')
155
156
      # Second, try to get a connection, safely dealing with the MySQL<->ActiveRecord
157
      # failed connection bug that can still arise to this day (regardless of 
158
      # reconnect, oddly).
159
      retryCount = 0
160
      begin
161
        connPool = MyAppCustomDB_ActiveRecord.establish_connection(
162
          :adapter  => adapter,
163
          :host     => self.host,
164
          :port     => self.port,
165
          :username => self.account,
166
          :password => self.account_password,
167
          :database => dbName,
168
          :reconnect => true
169
        )
170
        db = connPool.checkout()
171
      rescue => err # for me, always due to dead connection; must retry bunch-o-times to get a good one if this happens
172
        if(retryCount < MyAppCustomDB_ActiveRecord::MAX_RETRIES)
173
          sleep(1) if(retryCount < MyAppCustomDB_ActiveRecord::PAUSE_RETRIES)
174
          retryCount += 1
175
          connPool.disconnect!
176
          retry # start again at begin
177
        else # too many retries, serious, reraise error and let it fall through as it normally would in Rails.
178
          raise
179
        end
180
      end
181
182
      # Third, query the alternative authentication database for needed info. SQL
183
      # sufficient, obvious, and doesn't require other setup/LoC. Even more the
184
      # case if we have our database engine compute our digests (here, the whole
185
      # username is a salt). SQL also nice if your alt auth database doesn't have
186
      # AR classes and is not part of a Rails app, etc.
187
      resultRow = db.select_one(
188
        "SELECT #{self.attr_login}, #{self.attr_firstname}, #{self.attr_lastname}, #{self.attr_mail} " +
189
        "FROM genboreeuser " +
190
        "WHERE SHA1(CONCAT(#{self.attr_login}, password)) = SHA1(CONCAT('#{db.quote_string(login)}', '#{db.quote_string(password)}'))"
191
      )
192
193
      unless(resultRow.nil? or resultRow.empty?)
194
        user = resultRow[self.attr_login]
195
        unless(user.nil? or user.empty?)
196
          # Found a record whose login & password digest matches that computed
197
          # from Sign Inform parameters. If allowing Redmine to automatically
198
          # register such accounts in its internal table, return account
199
          # information to Redmine based on record found.
200
          retVal =
201 6 Anibal Sanchez
          {
202 1 Andrew R Jackson
            :firstname => resultRow[self.attr_firstname],
203
            :lastname => resultRow[self.attr_lastname],
204
            :mail => resultRow[self.attr_mail],
205
            :auth_source_id => self.id
206 6 Anibal Sanchez
          } if(onthefly_register?)
207 1 Andrew R Jackson
        end
208
      end
209
    end
210
    # Check connection back into pool.
211
    connPool.checkin(db)
212
    return retVal
213
  end
214
215
  def auth_method_name
216
    "MyCustomApp"
217
  end
218
end
219
220
</code>
221
</pre>
222
223
h2. Deploy & Test
224
225
Save your new class in @app/model/@ and restart Redmine.
226
227
* You ought to be able to try to log in as a use that exists in your alternative database but that doesn't exist in your Redmine instance.
228
* Existing Redmine accounts (and passwords) should continue to work.
229
* If you examine Redmine's @users@ table, you should see records appear after each successful login that used your alternative database.
230
** @hashed_password@ will be empty for those records.
231
** @auth_source_id@ will have the @id@ from @auth_sources@ which worked to authenticate the user; @NULL@ means "use internal Redmine authentication". The Administrator can also manually set this value via the @Authentication mode@ UI widget I mentioned above.
232
* Users authenticated with an alternative source will not be able to change their passwords using Redmine (great check by the core code) and will see an error message if they try to do so.
233
234
h2. Follow-Up
235
236
If you want to ONLY use your alternative authentication source for Redmine Sign In, remove the "Register" button. We did this by removing the @menu.push :register@ line in @lib/redmine.rb@. And we turned off the "Lost Password" feature via @Administration -> Settings -> Authentication -> Lost password@.
237
238 4 Paco Alcaide
<pre>
239 1 Andrew R Jackson
This was all pretty fast and simple to set up, thanks to how Redmine is organized and that some thought about permitting this kind of thing had been made. Quality. I hope I didn't get anything too wrong.
240
</pre>
241
242 6 Anibal Sanchez
h2. Joomla
243
244 7 Glen Vanderhel
We've customized the code to integrate Redmine with Joomla. Please, check the attachment to review an implementation for Joomla 2.5 and Redmine 2.0.3.
245 6 Anibal Sanchez
246
As Joomla does not have lastname in the users table, we have added a Html tag to show an icon in Redmine.
247
248
Remember to change the DB prefix (line 84) and the lastname customization (line 98).
249
250 5 Julien Recurt
h2. Bugs
251
252
 * In 1.0.1 if you got an error like "undefined method `stringify_keys!' for #<Array:...>) when logging" in see #6196
253
<pre>
254
<code class="ruby">
255
# Lines 97 from previous script
256
          retVal =
257
          {
258
            :firstname => resultRow[self.attr_firstname],
259
            :lastname => resultRow[self.attr_lastname],
260
            :mail => resultRow[self.attr_mail],
261
            :auth_source_id => self.id
262
          } if(onthefly_register?)
263
# ...
264 1 Andrew R Jackson
</code>
265
</pre>
266 6 Anibal Sanchez
267
 * In 2.0.3, the codefix for #6196 is still required, we've fixed the original code.