mirror of
https://github.com/sigoden/dufs.git
synced 2026-04-08 16:49:02 +03:00
[GH-ISSUE #260] Add external authenticator header for reverse proxying #135
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @pikaro on GitHub (Aug 29, 2023).
Original GitHub issue: https://github.com/sigoden/dufs/issues/260
Specific Demand
Allow trusting an
X-Remote-Useror similar header which would denote the logged-in user. This is a common feature in environments using reverse proxies where authentication is often externalized to SSO services or similarly more complex than the current authentication scheme allows.The
-aoption would have to be adapted to make the password optional without implying "passwordless" and to accept a%uor similar placeholder for the remotely logged-in user. This would allow settings like "each user can access their own home directory".Adding other settings commonly used in this context, such as
would be useful in a reverse-proxied environment as well.
@sigoden commented on GitHub (Aug 31, 2023):
Use proxy server authentication alone,or use dufs authentication alone,Mixing these together can be both intricate and prone to errors.
@ItalyPaleAle commented on GitHub (Jan 21, 2024):
I would love support for "pass-through authentication" too, where the proxy authenticates users and dufs uses the value supplied by the proxy (e.g. the "x-forwarded-user" header).
Alternatively, support for authentication via OAuth2 ("Bearer" authorization headers) could work too!