Disable internal authentication - allow ONLY OIDC login for admins #5015
dokeraj
started this conversation in
Feature Request
Replies: 1 comment
-
And yes, I am aware that there is the option |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
First Check
Please provide a concise description of the problem that would be addressed by this feature.
For security reasons, the internal authentication should be disabled when exposing the service on the internet. Instead the admins should have an option to be created by OIDC only.
Please provide a concise description of the feature that would resolve your issue.
Option 1. When starting the service for the first time - if you choose the
login with Oauth
button, the user that will be created, should be an admin. (Currently if you click on thelogin with Oauth
button a new regular user is being created.)Option 2. Allow for the admin to be created using internal authentication, but then allow another user that is created using OIDC to become
admin
. And allow the initial admin to be demoted to have no permissions to change anything - basically rendering that account useless to any attacker.Please consider and list out some caveats or tradeoffs made in your design decision
The only downside I can see is that - this will be the only option for the admin to login, so in case of a broken OIDC setup, the admin can be left locked out.
The caveat is that there are extra steps that the admin needs to do, in order to regain access to the account - like opening the sqllite or postgres db and changing the user login credentials.
Additional Information
Beta Was this translation helpful? Give feedback.
All reactions