- General Information
- Server Administration
- Mission Database
- Data Management
- Data Links
- Processors
- Commanding
- Services
- Security
- Web Interface
- Programs
Yamcs Release Notes
Yamcs HTTP API
Source Code Documentation
AuthModulesΒΆ
The security subsystem is modular by design and allows combining different AuthModules together. This allows for scenarios where for example you want to authenticate via LDAP, but determine privileges via YAML files.
The default set of AuthModules include:
- LDAP AuthModule
Authenticates against an LDAP directory. Also capable of mapping LDAP groups to Yamcs roles.
- YAML AuthModule
Reads Yaml files to verify the credentials of the user, or assign privileges.
- Kerberos AuthModule
Supports authenticating against a Kerberos server.
- Remote User AuthModule
Supports authentication based on a custom HTTP header.
- IP Address AuthModule
Supports authentication based on the remote IP address.
- SPNEGO AuthModule
Supports authenticating against a Kerberos server using Single Sign On from a web context.
- OpenID Connect AuthModule
Supports authenticating against an OpenID Connect server.
AuthModules have an order. When a login attempt is made, AuthModules are iterated a first time in this order. Each AuthModule is asked if it can authenticate with the provided credentials. The first matching AuthModule contributes the user principal. A second iteration is done to then contribute privileges to the identified user. During both iterations, AuthModules reserve the right to halt the global login process for any reason.
Some AuthModules are only useful for specific flows. For example OpenID Connect (which in a nutshell redirects to an external login form) would need to be accompanied with other AuthModules in case not all target clients are browser-based.