Closed TheOneWithTheBraid closed 3 years ago
I guess it is.
Following steps may get you what you need:
Little advice: check FreeIPA. Any LDAP server by itself is more pain in the ass than advantage. It should work in conjunction with bunch of other software and services. Or you can try KeyCloak / JetBrains Hub (free, project-oriented, but not foss) that are more handy if you need SSO or won't ever need HBAC (host based access control), PAM and other kerberos stuff to controll access to numerous linux-operated vm fleet or employee desktops.
I will give FreeIPA a try.
Anyway, if I set up the new user accounts on the LDAP server, there's no way to import the existing passwords, right? All users are forced to re-create their passwords that way, right.
Yes, there is no way to do so as passwords are normally hashed.
If you gonna give FreeIPA a try start with CentOS 8 as a host OS for FreeIPA and check very well maintained ansible modules and roles for FreeIPA: https://github.com/freeipa/ansible-freeipa
Do you know which password hashing algorithm Synapse uses? Maybe it's possible to manually import them...
bcrypt, and if I read correctly rounds == salt rounds == 12 (default)
For anyone else coming here, I can recommend checking out glauth. While it probably has the features you'd want from an LDAP server (and other services can take responsibility for other parts of your ID/auth stack), it has way less features then FreeIPA and is orders of magnitude simpler to configure and maintain.
FreeIPA is still a great project and has its use-cases but it may be way more than you're bargaining for.
Is there any way to migrate locally created (aka inside Synapse's DB) users to an LDAP server like openLDAP ?
In my case, we started a small Matrix service which is now expanding to more and more tools for which we would like to provide unified authentication. Hence, we would like to migrate Synapse's users to an LDAP provider.
Is this somehow possible?