This ports the auth provider to the new module API of Synapse 1.46+.
Docs: https://matrix-org.github.io/synapse/latest/modules/password_auth_provider_callbacks.html
Based on 6c29f4dedd
by @anishihara
Fixes https://github.com/ma1uta/matrix-synapse-rest-password-provider/issues/9
144 lines
4.3 KiB
Markdown
144 lines
4.3 KiB
Markdown
# Synapse REST Password provider
|
|
- [Overview](#overview)
|
|
- [Install](#install)
|
|
- [Configure](#configure)
|
|
- [Integrate](#integrate)
|
|
- [Support](#support)
|
|
|
|
## Overview
|
|
This synapse's password provider allows you to validate a password for a given username and return a user profile using an existing backend, like:
|
|
|
|
- Forums (phpBB, Discourse, etc.)
|
|
- Custom Identity stores (Keycloak, ...)
|
|
- CRMs (Wordpress, ...)
|
|
- self-hosted clouds (Nextcloud, ownCloud, ...)
|
|
|
|
It is mainly used with [ma1sd](https://github.com/ma1uta/ma1sd), the Federated Matrix Identity Server, to provide
|
|
missing features and offer a fully integrated solution (directory, authentication, search).
|
|
|
|
**NOTE:** This module doesn't provide direct integration with any backend. If you do not use mxisd, you will need to write
|
|
your own backend, following the [Integration section](#integrate). This module simply translate an anthentication result
|
|
and profile information into actionables in synapse, and adapt your user profile with what is given.
|
|
|
|
## Install
|
|
Copy in whichever directory python can pick it up as a module.
|
|
|
|
```
|
|
sudo pip install git+https://github.com/ma1uta/matrix-synapse-rest-password-provider
|
|
```
|
|
|
|
If the command fail, double check that the python version still matches. If not, please let us know by opening an issue.
|
|
|
|
## Configure
|
|
Add or amend the `modules` entry like so:
|
|
```yaml
|
|
modules:
|
|
- module: "rest_auth_provider.RestAuthProvider"
|
|
config:
|
|
endpoint: "http://change.me.example.com:12345"
|
|
```
|
|
Set `endpoint` to the value documented with the endpoint provider.
|
|
|
|
**NOTE:** This requires Synapse 1.46 or later! If you migrate from the legacy `password_providers`, make sure
|
|
to remove the old `RestAuthProvider` entry. If the `password_providers` list is empty, you can also remove it completely or
|
|
comment it out.
|
|
|
|
## Use
|
|
1. Install, configure, restart synapse
|
|
2. Try to login with a valid username and password for the endpoint configured
|
|
|
|
## Next steps
|
|
### Lowercase username enforcement
|
|
**NOTE**: This is no longer relevant as synapse natively enforces lowercase.
|
|
|
|
To avoid creating users accounts with uppercase characters in their usernames and running into known
|
|
issues regarding case sensitivity in synapse, attempting to login with such username will fail.
|
|
|
|
It is highly recommended to keep this feature enable, but in case you would like to disable it:
|
|
```yaml
|
|
config:
|
|
policy:
|
|
registration:
|
|
username:
|
|
enforceLowercase: false
|
|
```
|
|
|
|
### Profile auto-fill
|
|
By default, on first login, the display name is set to the one returned by the backend.
|
|
If none is given, the display name is not set.
|
|
Upon subsequent login, the display name is not changed.
|
|
|
|
If you would like to change the behaviour, you can use the following configuration items:
|
|
```yaml
|
|
config:
|
|
policy:
|
|
registration:
|
|
profile:
|
|
name: true
|
|
login:
|
|
profile:
|
|
name: false
|
|
```
|
|
|
|
3PIDs received from the backend are merged with the ones already linked to the account.
|
|
If you would like to change this behaviour, you can use the following configuration items:
|
|
```yaml
|
|
config:
|
|
policy:
|
|
all:
|
|
threepid:
|
|
update: false
|
|
replace: false
|
|
```
|
|
If update is set to `false`, the 3PIDs will not be changed at all. If replace is set to `true`, all 3PIDs not available in the backend anymore will be deleted from synapse.
|
|
|
|
## Integrate
|
|
To use this module with your back-end, you will need to implement a single REST endpoint:
|
|
|
|
Path: `/_matrix-internal/identity/v1/check_credentials`
|
|
Method: POST
|
|
Body as JSON UTF-8:
|
|
```json
|
|
{
|
|
"user": {
|
|
"id": "@matrix.id.of.the.user:example.com",
|
|
"password": "passwordOfTheUser"
|
|
}
|
|
}
|
|
```
|
|
|
|
If the credentials are accepted, the following JSON answer will be provided:
|
|
```json
|
|
{
|
|
"auth": {
|
|
"success": true,
|
|
"mxid": "@matrix.id.of.the.user:example.com",
|
|
"profile": {
|
|
"display_name": "John Doe",
|
|
"three_pids": [
|
|
{
|
|
"medium": "email",
|
|
"address": "john.doe@example.org"
|
|
},
|
|
{
|
|
"medium": "msisdn",
|
|
"address": "123456789"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
}
|
|
```
|
|
`auth.profile` and any sub-key are optional.
|
|
|
|
---
|
|
|
|
If the credentials are refused, the following JSON answer will be provided:
|
|
```json
|
|
{
|
|
"auth": {
|
|
"success": false
|
|
}
|
|
}
|
|
```
|