Loading...
 
Skip to main content

History: External Authentication

Source of version: 50

Copy to clipboard
            ! Login & External Authentication

!! Overview of Login Methods
Tiki allows you to use several different login authentication methods.  For standalaone sites (not connected to a central authentication server), you can use "Just Tiki" or "Web Server".  For sites that are part of a larger environment Tiki offers Apache (basic HTTP auth), LDAP (Active Directory), CAS, and Shibboleth authentication. 

The installation environment plays a role in determining the authentication method to be used.  On a fully accessible server, an administrator has a choice of any/all of the authentication methods listed on this page.    

!!Authentication With Shared Hosting
In a shared hosting environment (FTP access only) the authentication options become severely limited.   While it is possible to setup an OpenID server with FTP access (Community-ID is one such project) it is not well documented.  As of 4/09, setting up OpenLDAP, Shibboleth, or CAS are effectively impossible with FTP access only and may be impossible (depending on access rights) with a shell access account.

!! Just Tiki
The __Just Tiki__ authentication method uses the usernames and passwords stored in the tiki database for authentication.  This is best used for sites that are not part of a larger intranet.

!! OpenId and Tiki
OpenID authentication has been introduced in ((Tiki 2.0)). OpenID is an open and decentralized identity system, designed "not to crumble if one company turns evil or goes out of business".  
  Selecting OpenID in Tiki 3.0 will ad an OpenID login module below the regular login module.
More information on ((OpenID))

!! Web Server (HTTP)
A common way of protecting webpages is through Basic HTTP authentication. The web server sends a "401 Authentication Required" header when a protected page is requested. The browser would then prompt the user for a username and password. Access is allowed if the username password pair are valid; else, the web server sends a HTTP 401 error, meaning "access denied." HTTP authentication is usually used by creating a .htaccess file. (Only in Apache?)

Tiki is able to detect when a visitor to the site is currently logged in using Basic HTTP Authentication. If the username of the user matches a username within Tiki's database, Tiki will automatically log the user in and, of course, grant all the assigned permissions.

Using Web Server authentication can be convenient for a shared hosting installation of Tiki. User management becomes more of a challenge if multiple Tiki's are to be installed. However, in Tiki 3.0 group information and users will still need to be added to each and every sub-Tiki inside the authorized domain.

!! Options

!!! LDAP (Active Directory)
((LDAP authentication))

!!! IMAP
((IMAP Authentication))

!!! POP3
POP3 Authentication

!!! Vpopmail
Vpopmail Authentication

!! Tiki and Pam
((PAM authentication))

!! CAS
((CAS Authentication))

!! Shibboleth
((Shibboleth Authentication))

!! SAML
* ((SAML))

!! phpBB
((phpBB Authentication))

!!Future Plans (please help!)
*[https://browserid.org/|BrowserID]
*[https://secure.cacert.org/index.php?id=4|CACert (or other) Client Certificates]
*[http://www.gnupg.org/|GPG]/PGP PKI, including tools such as WebPG ([https://chrome.google.com/ webstore/ detail/ hhaopbphlojhnmbomffjcbnllcenbnih|here] and [https://github.com/kylehuff/webpg-chrome|here])
*2-Factor authentication, such as [http://code.google.com/p/google-authenticator/|Google Authenticator] or [http://stackoverflow.com/questions/5785781/two-factor-authentication-system|SMS]
*Post-Login Security Question?  Like when logging into a bank website.

!!Future Delusions
*[http://www.yubico.com/yubikey|YubiKey] or, egads, [https://store.yubico.com/store/catalog/product_info.php?products_id=56&osCsid=fbc8790cd428b8e949bdf4497c53145b|YubiHSM!]
*[http://directory.apache.org/triplesec/|Apache TripleSec]
-=From here=-
{toc}



-=alias=-
* (alias(Login Authentication Methods))
* (alias(Login Authentication Method))

        

History

Information Version
Marc Laporte 54
Marc Laporte 53
Marc Laporte Cleaning up 52
Marc Laporte 51
Marc Laporte 50
Marc Laporte 49
Marc Laporte 48
Yves Kipondo 47
E.W. Peter Jalajas 46
E.W. Peter Jalajas 45
E.W. Peter Jalajas petjal added Yubi 44
E.W. Peter Jalajas petjal add SMS, Security Question 43
E.W. Peter Jalajas petjal added 2-factor 42
E.W. Peter Jalajas petjal added PKI, WebPG 41
E.W. Peter Jalajas petjal added future, browserid, cacert client certs 40
Marc Laporte 39
Marc Laporte 37
Marc Laporte 36
Marc Laporte 35
Marc Laporte 34
Marc Laporte 33
Marc Laporte 32
Marc Laporte 28
lindon changed wanted pages into regular text 27
mizraith 26
mizraith 25
mizraith 24
mizraith 23
mizraith 22
mizraith 21
lindon removed double colons which was causing the left column to disappear 20
Marc Laporte 19
Marc Laporte 18
Xavier de Pedro 17
Xavier de Pedro 16
Xavier de Pedro 15
Marc Laporte were missing pop3 and Vpopmail 14
Marc Laporte 13
Marc Laporte refactoring 12
Marc Laporte refactoring 11
Marc Laporte 10
Marc Laporte moved to LDAP page 9
dthacker Update of PearAuth form and explanations of table 8
dthacker added Shibboleth 7
dthacker moved Pear::Auth 6
dthacker re-arrange items 5
dthacker Added CAS 4
dthacker 3
dthacker save work in progress 2
dthacker page created 1