mirror of
https://github.com/docker-mailserver/docker-mailserver.git
synced 2024-01-19 02:48:50 +00:00
52c4582f7b
Co-authored-by: Brennan Kinney <5098581+polarathene@users.noreply.github.com>
70 lines
3.1 KiB
Markdown
70 lines
3.1 KiB
Markdown
---
|
|
title: 'Advanced | Basic OAuth2 Authentication'
|
|
---
|
|
|
|
## Introduction
|
|
|
|
!!! warning "This is only a supplement to the existing account provisioners"
|
|
|
|
Accounts must still be managed via the configured [`ACCOUNT_PROVISIONER`][env::account-provisioner] (FILE or LDAP).
|
|
|
|
Reasoning for this can be found in [#3480][gh-pr::oauth2]. Future iterations on this feature may allow it to become a full account provisioner.
|
|
|
|
[gh-pr::oauth2]: https://github.com/docker-mailserver/docker-mailserver/pull/3480
|
|
[env::account-provisioner]: ../environment.md#account_provisioner
|
|
|
|
The present OAuth2 support provides the capability for 3rd-party applications such as Roundcube to authenticate with DMS (dovecot) by using a token obtained from an OAuth2 provider, instead of passing passwords around.
|
|
|
|
## Example (Authentik & Roundcube)
|
|
|
|
This example assumes you have:
|
|
|
|
- A working DMS server set up
|
|
- An Authentik server set up ([documentation](https://goauthentik.io/docs/installation/))
|
|
- A Roundcube server set up (either [docker](https://hub.docker.com/r/roundcube/roundcubemail/) or [bare metal](https://github.com/roundcube/roundcubemail/wiki/Installation))
|
|
|
|
!!! example "Setup Instructions"
|
|
|
|
=== "1. Docker Mailserver"
|
|
Edit the following values in `mailserver.env`:
|
|
```env
|
|
# -----------------------------------------------
|
|
# --- OAUTH2 Section ----------------------------
|
|
# -----------------------------------------------
|
|
|
|
# empty => OAUTH2 authentication is disabled
|
|
# 1 => OAUTH2 authentication is enabled
|
|
ENABLE_OAUTH2=1
|
|
|
|
# Specify the user info endpoint URL of the oauth2 provider
|
|
OAUTH2_INTROSPECTION_URL=https://authentik.example.com/application/o/userinfo/
|
|
```
|
|
|
|
=== "2. Authentik"
|
|
1. Create a new OAuth2 provider
|
|
2. Note the client id and client secret
|
|
3. Set the allowed redirect url to the equivalent of `https://roundcube.example.com/index.php/login/oauth` for your RoundCube instance.
|
|
|
|
=== "3. Roundcube"
|
|
Add the following to `oauth2.inc.php` ([documentation](https://github.com/roundcube/roundcubemail/wiki/Configuration)):
|
|
|
|
```php
|
|
$config['oauth_provider'] = 'generic';
|
|
$config['oauth_provider_name'] = 'Authentik';
|
|
$config['oauth_client_id'] = '<insert client id here>';
|
|
$config['oauth_client_secret'] = '<insert client secret here>';
|
|
$config['oauth_auth_uri'] = 'https://authentik.example.com/application/o/authorize/';
|
|
$config['oauth_token_uri'] = 'https://authentik.example.com/application/o/token/';
|
|
$config['oauth_identity_uri'] = 'https://authentik.example.com/application/o/userinfo/';
|
|
|
|
// Optional: disable SSL certificate check on HTTP requests to OAuth server. For possible values, see:
|
|
// http://docs.guzzlephp.org/en/stable/request-options.html#verify
|
|
$config['oauth_verify_peer'] = false;
|
|
|
|
$config['oauth_scope'] = 'email openid profile';
|
|
$config['oauth_identity_fields'] = ['email'];
|
|
|
|
// Boolean: automatically redirect to OAuth login when opening Roundcube without a valid session
|
|
$config['oauth_login_redirect'] = false;
|
|
```
|