Installation

Experimental Single Sign On server, OAuth2, Openid Connect, multiple factor authentication with, HOTP/TOTP, FIDO2, TLS Certificates, etc. extensible via plugins


Installation

License: CC BY 4.0

  1. Upgrade Glewlwyd
  2. Distribution packages
  3. Docker
  4. Manual install from source
  5. Configure Glewlwyd
  6. Initialise database
  7. Install as a service
  8. Reverse proxy configuration 9 . Fail2ban filter
  9. Front-end application
  10. Run Glewlwyd
  11. Event logs triggered
  12. Getting started with the application
  13. Running Glewlwyd in test mode for integration tests

Upgrade Glewlwyd

Glewlwyd upgrades usually come with database changes. It is highly recommended to backup your database before performing the upgrade. You must perform the database upgrades in the correct order. i.e. if you upgrade from Glewlwyd 2.3 to Glewlwyd 2.6, you must first install the 2.4 upgrade, then the 2.5.

Upgrade to Glewlwyd 2.7.0

If your current version is prior to 2.6.0, first follow the security instructions in the paragraph Upgrade to Glewlwyd 2.5.0.

Some changes were added to the core tables. You must execute the script depending on your database backend:

$ mysql glewlwyd < docs/database/upgrade-2.7-core.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < docs/database/upgrade-2.7-core.sqlite3.sql
$ psql glewlwyd < docs/database/upgrade-2.7-core.postgresql.sql

Upgrade to Glewlwyd 2.6.1

This is a security release, please upgrade your Glewlwyd version.

Upgrade to Glewlwyd 2.6.0

If your current version is prior to 2.5.0, first follow the security instructions in the paragraph Upgrade to Glewlwyd 2.5.0.

Some changes were added to the core tables. You must execute the script depending on your database backend:

$ mysql glewlwyd < docs/database/upgrade-2.6-core.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < docs/database/upgrade-2.6-core.sqlite3.sql
$ psql glewlwyd < docs/database/upgrade-2.6-core.postgresql.sql

Upgrade to Glewlwyd 2.5.4

This is a security release, please upgrade your Glewlwyd version.

Upgrade to Glewlwyd 2.5.0

If your current version is prior to 2.4.0, first follow the security instructions in the paragraph Upgrade to Glewlwyd 2.4.0.

Some changes were added to the core tables. You must execute the script depending on your database backend:

$ mysql glewlwyd < docs/database/upgrade-2.5-core.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < docs/database/upgrade-2.5-core.sqlite3.sql
$ psql glewlwyd < docs/database/upgrade-2.5-core.postgresql.sql

Upgrade to Glewlwyd 2.4.0

If your current version is prior to 2.3.3, first follow the security instructions in the paragraph Upgrade to Glewlwyd 2.3.3.

Mandatory core tables upgrade

Small changes were added to the core tables. You must execute the script depending on your database backend:

$ mysql glewlwyd < docs/database/upgrade-2.4-core.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < docs/database/upgrade-2.3-core.sqlite3.sql
$ psql glewlwyd < docs/database/upgrade-2.4-core.postgresql.sql

Upgrade to Glewlwyd 2.3.3

This is a security release, please upgrade your Glewlwyd version. To mitigate server configuration leaks, I recommend the following actions:

Upgrade to Glewlwyd 2.3.x

Mandatory core tables upgrade

Small changes were added to the core tables. You must execute the script depending on your database backend:

$ mysql glewlwyd < docs/database/upgrade-2.3-core.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < docs/database/upgrade-2.3-core.sqlite3.sql
$ psql glewlwyd < docs/database/upgrade-2.3-core.postgresql.sql

Upgrade to Glewlwyd 2.2.x

Mandatory core tables upgrade

Small changes were added to the core tables. You must execute the script depending on your database backend:

$ mysql glewlwyd < docs/database/upgrade-2.2-core.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < docs/database/upgrade-2.2-core.sqlite3.sql
$ psql glewlwyd < docs/database/upgrade-2.2-core.postgresql.sql

Scheme OAuth2/OIDC

In Glewlwyd 2.2, the new scheme OAuth2/OIDC external login was introduced. To use this module, you must create its required tables by executing the script depending on your database backend:

$ mysql glewlwyd < src/scheme/oauth2.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < src/scheme/oauth2.sqlite3.sql
$ psql glewlwyd < src/scheme/oauth2.postgresql.sql

Upgrade to Glewlwyd 2.1.x

In Glewlwyd 2.1, the plugin module register has appear. In order to use this module, you must add its tables by executing the script depending on your database backend:

$ mysql glewlwyd < src/plugin/register.mariadb.sql
$ sqlite3 /path/to/glewlwyd.db < src/plugin/register.sqlite3.sql
$ psql glewlwyd < src/plugin/register.postgresql.sql

Distribution packages

Packaging status

Glewlwyd is available in some distributions as official package. Check out your distribution documentation to install the package automatically.

$ # Example to install Glewlwyd 2.5.2 on Debian Buster
$ apt install glewlwyd

Docker

The docker page is available at the following address: https://hub.docker.com/r/babelouest/glewlwyd

Quick start for tests only

Run the official docker image babelouest/glewlwyd hosted on docker cloud, example:

docker run --rm -it -p 4593:4593 babelouest/glewlwyd
  • User: admin
  • Password : password

This image configuration uses a SQLite3 database hosted inside the docker instance, so all data will be lost when the docker instance will be stopped. Also, this docker instance can be accessible vie the address http://localhost:4593/.

In this instance, both configuration files glewlwyd.conf (backend) and config.json (front-end) are stored in /etc/glewlwyd.

If you need to make the docker instance available in a network, you must update the configuration files as explained below by updating at least the configuration variable external_url.

Customize configuration without rebuilding the docker image

You can overwrite the configuration files glewlwyd.conf and config.json by mounting a volume on /etc/glewlwyd when you run the docker image. Point this volume to a local directory on the host.

You can use the files docker/config/glewlwyd.conf and docker/config/config.json as a starting point to build your config files for docker.

You can also use environment variables to override config file values.

See Configure Glewlwyd for a complete list of configuration variables.

$ # Run docker instance with a new set of config files
$ docker run -p 4593:4593 -v /path/to/your/config:/etc/glewlwyd

$ # Run docker instance with default config files but override external url and database connection using env variables
$ docker run -p 4593:4593 -e GLWD_EXTERNAL_URL=https://glewlwyd.tld -e GLWD_DATABASE_TYPE=postgre -e GLWD_DATABASE_POSTGRE_CONNINFO="host=dbhost port=5432 dbname=glewlwyd user=glewlwyd password=secret" babelouest/glewlwyd

$ # Run docker instance with a new set of config files and an overwritten external url using env variables
$ docker run -p 4593:4593 -v /path/to/your/config:/etc/glewlwyd -e GLWD_EXTERNAL_URL=https://glewlwyd.tld babelouest/glewlwyd

Docker image builder

Build docker image with last source

The root directory contains a Docker file to build the docker image from the current master branch on github. To build your own docker image, go to Glewlwyd source root directory and run make docker. This will build a docker image called babelouest/glewlwyd:src.

$ make docker
$ docker run --rm -it -p 4593:4593 -v /path/to/your/config:/etc/glewlwyd babelouest/glewlwyd:src

You can use the same options than in the official docker image, including customized configuration.

Build docker image with last release

The docs/docker/ directory contains a Docker file to build the docker image from the last release. To build your own docker image, go to docs/docker/ and run make. This will build a docker image called babelouest/glewlwyd:latest.

Manual install from source

Glewlwyd has been successfully compiled for the following distributions:

  • Fedora 29+
  • OpenSuse Leap 15
  • OpenSuse Tumbleweed
  • Alpine Linux
  • Free BSD

And probably more!

Let me know if Glewlwyd can be installed and working on your distribution by opening an issue, if needed, you can describe the non-documented commands required for your case.

Download the latest source tarball or git clone from master branch in GitHub.

Dependencies

On a Debian based distribution (Debian, Ubuntu, Raspbian, etc.), you can install those dependencies using the following command:

$ sudo apt-get install libmicrohttpd-dev sqlite3 libsqlite3-dev default-libmysqlclient-dev libpq-dev libgnutls28-dev libconfig-dev libldap2-dev liboath-dev libcbor-dev libsystemd-dev libjansson-dev libcurl4-gnutls-dev cmake

Libmicrohttpd 0.9.38 minimum required

With Libmicrohttpd 0.9.37 and older version, there is a bug when parsing application/x-www-form-urlencoded parameters. This is fixed in later version, from the 0.9.38, so if your Libmicrohttpd version is older than that, I suggest getting a newer version of libmicrohttpd.

A bug has been fixed in Libmicrohttpd 0.9.70 related to Jenkins OIDC plugin (see issue #89), and a security issue has fixed in Libmicrohttpd 0.9.71. It is recommended to install Libmicrohttpd 0.9.71 minimum to avoid these problems.

Build Glewlwyd and its dependencies

CMake

Download Glewlwyd from GitHub, then use the CMake script to build the application. CMake will automatically download and build Iddawc, Rhonabwy, Ulfius, Hoel, Yder and Orcania if they are not installed on the system.

# Install Glewlwyd
$ git clone https://github.com/babelouest/glewlwyd.git
$ mkdir glewlwyd/build
$ cd glewlwyd/build
$ cmake ..
$ make 
$ sudo make install

The available options for CMake are:

  • -DDOWNLOAD_DEPENDENCIES=[on|off] (default on): Download some dependencies if missing or using an old version: Orcania, Yder, Ulfius, Rhonabwy, Iddawc and Hoel
  • -DWITH_JOURNALD=[on|off] (default on): Build with journald (SystemD) support
  • -DCMAKE_BUILD_TYPE=[Debug|Release] (default Release): Compile with debugging symbols or not
  • -DWITH_SQLITE3=[on|off] (default on): Enable/disable SQLite3 database backend: This option is passed to Hoel library builder
  • -DWITH_MARIADB=[on|off] (default on): Enable/disable MariaDB/MySQL database backend: This option is passed to Hoel library builder
  • -DWITH_PGSQL=[on|off] (default on): Enable/disable PostgreSQL database backend: This option is passed to Hoel library builder
  • -DWITH_JOURNALD=[on|off] (default on): Build with journald (SystemD) support for logging: This option is passed to Yder library builder
  • -DBUILD_GLEWLWYD_TESTING=[on|off] (default off): Build testing tree
  • -DWITH_MOCK=[on|off] (default off): Build mock modules, for development use only!
  • -DWITH_USER_DATABASE=[on|off] (default on): Build user database backend module
  • -DWITH_USER_LDAP=[on|off] (default on): Build user LDAP backend module
  • -DWITH_USER_HTTP=[on|off] (default on): Build user HTTP auth backend module
  • -DWITH_CLIENT_DATABASE=[on|off] (default on): Build client database backend module
  • -DWITH_CLIENT_LDAP=[on|off] (default on): Build client LDAP backend module
  • -DWITH_SCHEME_RETYPE_PASSWORD=[on|off] (default on): Build authentication scheme retype password
  • -DWITH_SCHEME_EMAIL=[on|off] (default on): Build authentication scheme e-mail code
  • -DWITH_SCHEME_OTP=[on|off] (default on): Build authentication scheme OTP
  • -DWITH_SCHEME_WEBAUTHN=[on|off] (default on): Build authentication scheme WebAuthn
  • -DWITH_PLUGIN_OAUTH2=[on|off] (default on): Build Plugin Glewlwyd OAuth2
  • -DWITH_PLUGIN_OIDC=[on|off] (default on): Build Plugin OpenID Connect

Good ol’ Makefile

Download Glewlwyd and its dependencies hosted on GitHub, compile and install.

# Install Orcania
$ git clone https://github.com/babelouest/orcania.git
$ cd orcania/src/
$ make
$ sudo make install

# Install Yder
$ git clone https://github.com/babelouest/yder.git
$ cd yder/src/
$ make # Or make Y_DISABLE_JOURNALD=1 to disable journald logging
$ sudo make install

# Install Ulfius
$ git clone https://github.com/babelouest/ulfius.git
$ cd ulfius/src/
$ make
$ sudo make install

# Install Hoel
$ git clone https://github.com/babelouest/hoel.git
$ cd hoel/src/
$ make
$ sudo make install

# Install Rhonabwy
$ git clone https://github.com/babelouest/rhonabwy.git
$ cd rhonabwy/src/
$ make
$ sudo make install

# Install Iddawc
$ git clone https://github.com/babelouest/iddawc.git
$ cd iddawc/src/
$ make
$ sudo make install

# Install Glewlwyd
$ git clone https://github.com/babelouest/glewlwyd.git
$ cd glewlwyd/src/
$ make 
$ sudo make install

Note for distribution packaging

Although the cmake script automatically download and install the following dependencies: Orcania, Yder, Ulfius, Rhonabwy, Iddawc and Hoel, it’s highly recommended to package those dependencies separately and not to include those in Glewlwyd package. Use the cmake option -DDOWNLOAD_DEPENDENCIES=OFF when building Glewlwyd for the distribution package.

Configure glewlwyd

Glewlwyd requires several configuration variables to work. You can specify those variables in a configuration file, environment variables, or both. In addition, some variables can be set via command-line arguments.

To run Glewlwyd with the config file, copy glewlwyd.conf.sample to glewlwyd.conf, edit the file glewlwyd.conf with your own settings.

The following paragraphs describe all the configuration parameters.

To enable environment variables in Glewlwyd, you must execute the program with the -e command-line argument.

You can use environment variable configuration, configuration file and command-line arguments at the same time, just keep in mind the following priority order: command-line arguments have the higher priority, followed by the environment variables, then the configuration file.

When you change the configuration file or the environment variables values, you must restart Glewlwyd to use the new configuration.

Note on static files server

Glewlwyd’s static file server isn’t meant to be the most performant nor reliable, if possible you should use a dedicated web server like Apache or NGINX. See reverse proxy configuration for examples.

Port number

  • Config file variable: port
  • Environment variable: GLWD_PORT

Optional, The TCP port the service will listen to incoming connections. The port number must be available to the user running Glewlwyd process. Default value is 4593.

Bind address

  • config file variable: bind_address
  • Environment variable: GLWD_BIND_ADDRESS

Optional, use this address to bind incoming connections, can be use to restrict glewlwyd service to listen to a specific network, or localhost. Must be an IPV4 address. If not set or empty, all addresses will be able to connect to Glewlwyd. Note: this is NOT a listen option, this setting means that Glewlwyd will accept connection sent to this address only, not from it.

External URL

  • Config file variable: external_url
  • Environment variable: GLWD_EXTERNAL_URL

Mandatory, exact value of the external URL where this instance will be accessible to users, ex https://glewlwyd.tld

API Prefix

  • Config file variable: api_prefix
  • Environment variable: GLWD_API_PREFIX

Optional, the URL prefix where Glewlwyd’s APIs will be available. Default value is /api.

Login URL

  • Config file variable: login_url
  • Environment variable: GLWD_LOGIN_URL

Optional, name of the login page. Default value is login.html

Delete profile

  • Config file variable: delete_profile
  • Environment variable: GLWD_PROFILE_DELETE

Optional, whether the user can remove its own account or not. Values available are:

  • no: The user can’t remove its own account
  • disable: If the user removes its own account, the account will be disabled but not removed
  • delete: If the user removes its own account, the account and the schemes registration will be completely removed

Static files path

  • Config file variable: static_files_path
  • Environment variable: GLWD_STATIC_FILES_PATH

Optional, local path to the webapp files. If not set, the front-end application will not be available, only the APIs.

Static files mime types

  • Config file variable: static_files_mime_types
  • Environment variable: GLWD_STATIC_FILES_MIME_TYPES in JSON array format, example '[{"extension":".html","mime_type":"text/html","compress":true}{"extension":".css","mime_type":"text/css","compress":true}{"extension":".png","mime_type":"image/png","compress":false}]'

Optional, list of mime types for the webapp files.

Allow Origin

  • Config file variable: allow_origin
  • Environment variable: GLWD_ALLOW_ORIGIN

Originating IP address header value

  • Config file variable: originating_ip_header
  • Environment variable: GLWD_ORIGINATING_IP_HEADER

Optional, key for the HTTP header value that will contain the originating IP address of the client request. This config value is highly recommended if you expose glewlwyd behind a HTTP proxy. Usually when using a proxy, the originating IP address is replaced by the proxy address, therefore the proxy adds a header value (usually X-Forwarded-For) to specify the originating IP address.

Logs

Log Mode:

  • Config file variable: log_mode
  • Environment variable: GLWD_LOG_MODE
  • Command-line argument: -m<mode> or --log-mode=<mode>

Log Level

  • Config file variable: log_level
  • Environment variable: GLWD_LOG_LEVEL
  • Command-line argument: -l<level> or --log-level=<level>

Log File Path

  • Config file variable: log_file
  • Environment variable: GLWD_LOG_FILE
  • Command-line argument: -f<file_path> or --log-file=<file_path>

Optional. Default no logs.

Log modes available are console, journald, syslog, file. Multiple values must be separated by a comma, example console,syslog. Log levels available are NONE, ERROR, WARNING, INFO, DEBUG.

If log mode file is set, log file path must be set to a file path where Glewlwyd process has write access.

Cookies configuration

  • Config file variable: cookie_domain
  • Environment variable: GLWD_COOKIE_DOMAIN
  • Config file variable: cookie_secure
  • Environment variable: GLWD_COOKIE_SECURE

Optional. Default, cookie_secure is false.

The sample config file has the following cookies configuration:

# cookie domain
cookie_domain="localhost"

# cookie_secure, this options SHOULD be set to 1, set this to 0 to test glewlwyd on insecure connection http instead of https
cookie_secure=0

You must change the value cookie_domain accordingly to the domain name Glewlwyd will be available to. You can disable this option if you need to, but it’s highly NOT recommended:

#cookie_domain="localhost"

The parameter cookie_secure is set to 0 by default, but since you should use Glewlwyd in a https connection, you should set this option to 1.

HTTP header X-Frame-Options

  • Config file variable: add_x_frame_option_header_deny
  • Environment variable: GLWD_ADD_X_FRAME_DENY

Optional. Default, is true.

It’s recommended to leave this value to true, unless you need to embed glewlwyd in an iFrame.

  • Config file variable: session_expiration
  • Environment variable: GLWD_SESSION_EXPIRATION
  • Config file variable: session_key
  • Environment variable: GLWD_SESSION_KEY

Optional, default values are:

session_expiration = 2419200
session_key = GLEWLWYD2_SESSION_ID

Session authentication

Admin session authentication

  • Config file variable: admin_session_authentication
  • Environment variable: GLWD_ADMIN_SESSION_AUTH

Optional, set the authentication method to access admin APIs, values available are cookie for session cookie authentication, api_key for API key authentication, can be combined. To disable admin API access, set a wrong value, like none.

Default value is cookie.

Profile session authentication

  • Config file variable: profile_session_authentication
  • Environment variable: GLWD_PROFILE_SESSION_AUTH

Optional, set the authentication method to access user profile APIs, values available is cookie for session cookie authentication. To disable user profile API access, set a wrong value, like none.

Default value is cookie.

Allow multiple user per session

  • Config file variable: allow_multiple_user_per_session
  • Environment variable: GLWD_MULTIPLE_USER_SESSION

Optional, if set to true, a user can log in using multiple accounts for the same session.

Default is false.

Enable login APIs

  • Config file variable: login_api_enabled
  • Environment variable: GLWD_LOGIN_API_ENABLED

Optional, if set to false, no login API is accessible. Useful to restrict an instance only for admin access via API key, or to allow only client authentication for example. Of course if this is set to false, no user can log in, therefore, no administration tasks can be executed via the Web UI, nor any profile access, nor any token request.

Default is true.

User backend instances enabled

  • Config file variable: user_backend_api_run_enabled
  • Environment variable: GLWD_USER_BACKEND_API_RUN_ENABLED

Optional, specify the list of user backend instances allowed to be executed identified by their name. Multiple values must be separated by a comma ‘,’. If the list is missing or empty, all instances are allowed.

Default is all instances allowed.

User middleware backend instances enabled

  • Config file variable: user_middleware_backend_api_run_enabled
  • Environment variable: GLWD_USER_MIDDLEWARE_BACKEND_API_RUN_ENABLED

Optional, specify the list of user middleware backend instances allowed to be executed identified by their name. Multiple values must be separated by a comma ‘,’. If the list is missing or empty, all instances are allowed.

Default is all instances allowed.

Client backend instances enabled

  • Config file variable: client_backend_api_run_enabled
  • Environment variable: GLWD_CLIENT_BACKEND_API_RUN_ENABLED

Optional, specify the list of client backend instances allowed to be executed identified by their name. Multiple values must be separated by a comma ‘,’. If the list is missing or empty, all instances are allowed.

Default is all instances allowed.

Authentication scheme backend instances enabled

  • Config file variable: scheme_api_run_enabled
  • Environment variable: GLWD_SCHEME_API_RUN_ENABLED

Optional, specify the list of authentication scheme backend instances allowed to be executed identified by their name. Multiple values must be separated by a comma ‘,’. If the list is missing or empty, all instances are allowed.

Default is all instances allowed.

Plugins instances enabled

  • Config file variable: plugin_api_run_enabled
  • Environment variable: GLWD_PLUGIN_API_RUN_ENABLED

Optional, specify the list of plugins instances allowed to be executed identified by their name. Multiple values must be separated by a comma ‘,’. If the list is missing or empty, all plugings are allowed.

Default is all plugins allowed.

Default scope names

Admin scope

  • Config file variable: admin_scope
  • Environment variable: GLWD_ADMIN_SCOPE

Profile scope

  • Config file variable: profile_scope
  • Environment variable: GLWD_PROFILE_SCOPE

Optional, default values are:

admin_scope="g_admin"
profile_scope="g_profile"

Modules paths

User modules path

  • Config file variable: user_module_path
  • Environment variable: GLWD_USER_MODULE_PATH

Mandatory, path to user modules.

Client modules path

  • Config file variable: client_module_path
  • Environment variable: GLWD_CLIENT_MODULE_PATH

Mandatory, path to client modules.

User auth scheme modules path

  • Config file variable: user_auth_scheme_module_path
  • Environment variable: GLWD_AUTH_SCHEME_MODULE_PATH

Mandatory, path to authentication scheme modules.

Plugin modules path

  • Config file variable: plugin_module_path
  • Environment variable: GLWD_PLUGIN_MODULE_PATH

Mandatory, path to plugin modules.

Digest algorithm

  • Config file variable: hash_algorithm
  • Environment variable: GLWD_HASH_ALGORITHM

Optional, default value is SHA256.

Specify in the config file the parameter hash_algorithm to store token and secret digests.

Algorithms available are SHA1, SHA256 and SHA512. Algorithms recommended are SHA256 or SHA512.

SSL/TLS

Use secure connection

  • Config file variable: use_secure_connection
  • Environment variable: GLWD_USE_SECURE_CONNECTION

Secure connection key file

  • Config file variable: secure_connection_key_file
  • Environment variable: GLWD_SECURE_CONNECTION_KEY_FILE

Secure connection pem file

  • Config file variable: secure_connection_pem_file
  • Environment variable: GLWD_SECURE_CONNECTION_PEM_FILE

Secure connection ca file

This configuration is mandatory only if you want to use TLS Certificate authentication schemes in direct access, it must contain the CA certificate file used to authenticate clients certificates. Otherwise you can skip it.

If this option is set, users can still connect to Glewlwyd without TLS certificate.

  • Config file variable: secure_connection_ca_file
  • Environment variable: GLWD_SECURE_CONNECTION_CA_FILE

OAuth 2 specifies that a secured connection is mandatory, via SSL or TLS, to avoid data and token to be stolen, or Man-In-The-Middle attacks. Glewlwyd supports starting a secure connection with a private/public key certificate, but it also can be with a classic non-secure HTTP connection, and be available to users behind a HTTPS proxy for example. Glewlwyd won’t check that you use it in a secure connection, but you should.

These configuration variables are optional. Default is no secure connection.

Maximum request POST size

  • Config file variable: max_post_size
  • Environment variable: GLWD_MAX_POST_SIZE

Optional, The maximum length of a request POST parameter or the POST body, default size is 16778240 (16M+1024)

Database back-end initialisation

Configure your database backend according to the database you will use.

# MariaDB/Mysql configuration file variables
database =
{
  type     = "mariadb"
  host     = "localhost"
  user     = "glewlwyd"
  password = "glewlwyd"
  dbname   = "glewlwyd"
  port     = 0
}
# MariaDB/Mysql environment variables
GLWD_DATABASE_TYPE must be set to "mariadb"
GLWD_DATABASE_MARIADB_HOST
GLWD_DATABASE_MARIADB_USER
GLWD_DATABASE_MARIADB_PASSWORD
GLWD_DATABASE_MARIADB_DBNAME
GLWD_DATABASE_MARIADB_PORT

# SQLite database configuration file variables
database =
{
  type = "sqlite3"
  path = "/var/cache/glewlwyd/glewlwyd.db"
}
# SQLite database environment variables
GLWD_DATABASE_TYPE must be set to "sqlite3"
GLWD_DATABASE_SQLITE3_PATH

# PostgreSQL database configuration file variables
database =
{
  type = "postgre"
  conninfo = "host=localhost port=5432 dbname=glewlwyd user=glewlwyd password=secret"
}
# PostgreSQL database environment variables
GLWD_DATABASE_TYPE must be set to "postgre"
GLWD_DATABASE_POSTGRE_CONNINFO

Database configuration is mandatory.

Initialise database

Warning: Remember to use script that correspond to your Glewlwyd version

Use the script that fit your database back-end in the database folder:

  • docs/database/init.mariadb.sql
  • docs/database/init.sqlite3.sql
  • docs/database/init.postgre.sql

Note: PostgreSQL requires the extension pgcrypto enabled to encrypt users and clients passwords.

For example, initialise a MariaDB database:

$ mysql
mysql> CREATE DATABASE `glewlwyd`;
mysql> GRANT ALL PRIVILEGES ON glewlwyd.* TO 'glewlwyd'@'%' identified BY 'glewlwyd';
mysql> FLUSH PRIVILEGES;
mysql> USE glewlwyd
mysql> SOURCE docs/database/init.mariadb.sql

Initialise a SQLite3 database:

$ sqlite3 /var/cache/glewlwyd/glewlwyd.db < docs/database/init.sqlite3.sql

Initialize a PostgreSQL database:

Check out PostgreSQL documentation and select your version for more information on the following commands.

$ psql -hlocalhost -Upostgres
postgres=# create role glewlwyd login password 'secret';
postgres=# create database glewlwyd owner glewlwyd;
postgres=# grant connect on database glewlwyd to glewlwyd;
postgres=# \c glewlwyd
glewlwyd=# create extension pgcrypto;
glewlwyd=# \c glewlwyd glewlwyd
glewlwyd=> \i docs/database/init.postgre.sql
glewlwyd=> \q

Security warning!

Those scripts create a valid database that allow to use glewlwyd. But to avoid potential security issues, you must change the admin password when you first connect to the application.

Built-in scope values

If you want to use a different name for admin scope (default is g_admin), or the profile scope (default is g_profile), you must update the init script with your own value before running it, change the lines below accordingly.

Administrator user

An administrator must be present in the back-end to manage the application (manage scopes, users, clients, resources, authorization types).

An administrator in the LDAP back-end is a user who has the admin_scope (default g_admin) in its scope list.

Install as a service

The files docs/glewlwyd-init (SysV init) and docs/glewlwyd.service (SystemD) can be used to run glewlwyd as a daemon. They are fitted for a Raspbian distribution, but can easily be changed for other systems. It’s highly recommended to run Glewlwyd as a user without root access. Glewlwyd requires to be able to open a TCP port connection, a read/write access to the glewlwyd database, read access to the config file glewlwyd.conf and the installed webapp/ folder (typically /usr/share/glewlwyd/webapp.

Install as a SysV init daemon and run

$ sudo cp glewlwyd-init /etc/init.d/glewlwyd
$ sudo update-rc.d glewlwyd defaults
$ sudo service glewlwyd start

Install as a SystemD daemon and run

$ sudo cp glewlwyd.service /etc/systemd/system
$ sudo systemctl enable glewlwyd
$ sudo systemctl start glewlwyd

Reverse proxy configuration

To install Glewlwyd behind a reverse proxy, you must check the following rules:

  • Forward HTTP methods GET, POST, PUT, DELETE and OPTION
  • Forward the entire URL, including query parameters (I’m watching you NGINX!)
  • Forward the session cookies -and optionally the registration cookies-, cookies default keys are GLEWLWYD2_SESSION_ID for session cookie and G_REGISTER_SESSION for registration cookie
  • Forward HTTP headers, including Authorization
  • Optional, add to the request header the value X-Forwarded-For to specify the client IP address, recommended if you use the fail2ban scripts

You can have glewlwyd available at the root of the domain/subdomain, e.g. https://glewlwyd.tld/ or host Glewlwyd in a sub-folder of the domain/subdomain, e.g. https://auth.tld/glewlwyd/.

The following examples directly provide Glewlwyd’s static front-end files, without using internal Glewlwyd static file service. You should disable the static_files_path property in the config file.

Apache mod_proxy example

To use Apache as reverse proxy, you must enable the mods proxy and proxy_http. If you want to use user or client certificate authentication behind a reverse proxy, you must enable the mods ssl and headers.

The following example is a simple Apache reverse proxy configuration on a virtual host https://glewlwyd.tld, the glewlwyd instance is running on localhost.

<VirtualHost *:443>
  ServerName glewlwyd.tld

  ProxyPass /config http://localhost:4593/config
  ProxyPass /api http://localhost:4593/api
  DocumentRoot /usr/share/glewlwyd/webapp/
</VirtualHost>

The following example is an Apache reverse proxy configuration on a virtual host https://glewlwyd.tld, the glewlwyd instance is running on localhost and the proxy forwards the client TLS certificate to Glewlwyd in the header SSL_CLIENT_CERT if the client uses a valid TLS certificate.

<VirtualHost *:443>
  ServerName glewlwyd.tld
  SSLEngine on
  SSLCertificateFile /path/to/your_domain_name.crt
  SSLCertificateKeyFile /path/to/your_private.key
  SSLCertificateChainFile /path/to/your_chain_file.crt
  SSLCACertificateFile /path/to/your_ca.crt
  SSLVerifyClient optional

  RequestHeader set SSL_CLIENT_CERT ""

  ProxyPass /config http://localhost:4593/config
  ProxyPass /api http://localhost:4593/api
  DocumentRoot /usr/share/glewlwyd/webapp/

  <Location /api/>
    RequestHeader set SSL_CLIENT_CERT "%{SSL_CLIENT_CERT}s"
  </Location>
</VirtualHost>

Nginx reverse proxy examples

The following example is an Nginx reverse proxy configuration in which the glewlwyd instance is at the root of the domain that Nginx listens to requests for.

# Glewlwyd
location / {
  proxy_set_header Host $host;
  proxy_pass http://127.0.0.1:4593/config;
  proxy_pass http://127.0.0.1:4593/api;
  root /usr/share/glewlwyd/webapp/;
}

Other headers which may be useful to define as proxy_set_header options here besides Host are X-Forwarded-For and/or X-Real-IP, to pass along the requesting client’s IP rather than the proxy IP for logging purposes. See the Nginx proxy docs for further information.

It is also possible to use Nginx to serve glewlwyd from a sub-folder, which would allow multiple services to share a single proxy listening for requests on a single domain name. Below is an example configuration for doing this with Nginx.

# Glewlwyd
location ^~ /authsrv/ {
  rewrite ^\/authsrv(.*) /$1 break;
  proxy_set_header Host $host;
  proxy_pass http://127.0.0.1:4593;
}

In this example, requests to the sub-folder /authsrv will be sent to glewlwyd instance, and requests to the root domain or other folders can be sent to other applications and services on the same domain name. The rewrite regex in the second line extracts the part of the URL after /authsrv and sends that part of the URL on to the glewlwyd instance without the folder name. In this sub-folder example, the webapp/config.json will need the main URL changed to account for the sub-folder, while the rest of the config can be unchanged from defaults. The main glewlwyd.conf can also be unchanged from defaults, since the rewrite rule is removing the sub-folder name from requests to /api endpoints before passing them to the glewlwyd instance.

Below is the URL configuration of webapp/config.json with Nginx serving glewlwyd in a sub-folder named /authsrv.

{
  "GlewlwydUrl": "https://glewlwyd.tld/authsrv/",
  "ProfileUrl": "profile.html",
  "AdminUrl": "index.html",
  "LoginUrl": "login.html",
  "CallbackPage": "callback.html",
...

In both of the above examples, SSL terminates at the proxy, and Nginx passes unencrypted http traffic on to the glewlwyd instance on the internal/private network. This is not suitable for a proxy which passes traffic across the public internet to the eventual server that the glewlwyd instance lives on. For SSL pass through configurations in which SSL is preserved rather than terminated at the proxy, Nginx users should consider using the ssl_preread stream module for the simplest configuration. The ssl_preread module allows Nginx to read the address from encrypted traffic without decrypting it, and pass along traffic in whatever load balancing scenarios that may be necessary, without having to maintain certificates and encryption settings on the proxy.

Documentation on the ssl_preread module is available here.

Fail2ban filter

You can add specific filter for fail2ban to ban potential attackers.

The glewlwyd.conf file is available in fail2ban/glewlwyd.conf. It will ban the IP addresses using the following rules:

  • Authorization invalid - on a failed auth (user or client)
  • Code invalid - on a invalid code in OAuth2 or OIDC
  • Token invalid - on a invalid token in OAuth2 or OIDC
  • Scheme email - code sent - when an OTP code is sent via e-mail, to avoid spamming users
  • Register new user - code sent to email - when an e-mail verification is sent, to avoid spamming users
  • Verify e-mail - code invalid - when an e-mail verification is invalid
  • Update e-mail - token sent to email - when an e-mail update verification is sent, to avoid spamming users
  • Update e-mail - token invalid - on a invalid update e-mail verification token
  • Reset credentials - token invalid - on a invalid reset credentials e-mail verification token
  • Reset credentials - code invalid - on a invalid reset credentials code

The filter.d/glewlwyd-log.conf config file has the following content if you log to a user-defined log file:

# Fail2Ban filter for Glewlwyd
#
# Author: Nicolas Mora
#

[Definition]

failregex = ^.* - Glewlwyd WARNING: Security - Authorization invalid for username .* at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Authorization invalid for client_id .* at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Code invalid at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Token invalid at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Scheme email - code sent for username .* at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Register new user - code sent to email .* at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Verify e-mail - code invalid at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Update e-mail - token sent to email .* at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Update e-mail - token invalid at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Reset credentials - token invalid at IP Address <HOST>
            ^.* - Glewlwyd WARNING: Security - Reset credentials - code invalid at IP Address <HOST>
ignoreregex =

You can download this file here.

The filter.d/glewlwyd-syslog.conf config file has the following content if you log to syslog:

# Fail2Ban filter for Glewlwyd
#
# Author: Nicolas Mora, Robert Clayton
#

[INCLUDES]
#
# load the 'common.conf' list of fail2ban upstream maintained prefixes
#
before = common.conf

[Definition]
#
# declare the daemon name so common.conf variables will match
#
_daemon = Glewlwyd

failregex = ^.* %(__prefix_line)sSecurity - Authorization invalid for username .* at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Authorization invalid for client_id .* at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Code invalid at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Token invalid at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Scheme email - code sent for username .* at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Register new user - code sent to email .* at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Verify e-mail - code invalid at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Update e-mail - token sent to email .* at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Update e-mail - token invalid at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Reset credentials - token invalid at IP Address <HOST>
            ^.* %(__prefix_line)sSecurity - Reset credentials - code invalid at IP Address <HOST>
ignoreregex =

You can download this file here.

You must place the file glewlwyd-log.conf or glewlwyd-syslog.conf under the fail2ban filter.d directory (On Debian-based distrib it’s located in /etc/fail2ban/filter.d/).

Then, you must update your jail.local file (On Debian-based distrib it’s located in /etc/fail2ban/jail.local) by adding the following paragraph if you log to a user-defined log file:

[glewlwyd]
enabled  = true
filter   = glewlwyd-log
logpath  = /var/log/glewlwyd.log
port     = https,4593 # the TCP port where Glewlwyd is available from outside

…or the following paragraph if you log to syslog:

[glewlwyd]
enabled  = true
filter   = glewlwyd-syslog
logpath  = /var/log/syslog
port     = https,4593 # the TCP port where Glewlwyd is available from outside

You can download this file here.

Check out Fail2ban documentation for more information.

Logrotate configuration

You can add a logrotate configuration file to help you managing Glewlwyd’s logs.

Example of a /etc/logrotate.d/glewlwyd file. This file will create a new log file every week, compress the old files and keep 52 files (1 year archive):

/var/log/glewlwyd.log {
        rotate 52
        weekly
        compress
        copytruncate
        missingok
}

Front-end application

All front-end pages have a minimal design, feel free to modify them for your own need, or create your own application. The source code is available in /webapp-src and requires nodejs and npm or yarn to build.

The built front-end files are located in the webapp/ directory.

Warning: Remember to use front-end files that correspond to your Glewlwyd version

webapp/config.json

The front-end configuration file must be available under webapp/config.json you can copy the file webapp/config.json.sample.

You should update the URLs of the API and the HTML page to match your configuration:

Example:

{
  "GlewlwydUrl": "https://glewlwyd.tld/",
  "ProfileUrl": "https://glewlwyd.tld/profile.html",
  "AdminUrl": "https://glewlwyd.tld/index.html",
  "LoginUrl": "https://glewlwyd.tld/login.html"
}
The front-end application is written in JavaScript using mostly ReactJS and JQuery, ES6 minimum is required. Recent versions of browsers like Firefox, Chrom[e ium], Edge or Safari work fine.

By choice, Glewlwyd isn’t available for Internet Explorer or browser with a poor JavaScript engine. If you really need it you can build the front-end application with babel-polyfill. Check out the webapp-src documentation.

Internationalization

The languages available in the front-end are English, French and Dutch. If you make a language file for another Lang, you can add it in your Glewlwyd installation by adding the file in webapp/{lang}/translation.json where {lang} is the translation language in ISO 639-1 format (2 letters). Then, add your new language 2-letters code in the webapp/config.json file in the lang key, example for adding Korean language:

"lang": ["en","fr","nl","ko"],

Also, feel free to send your new language file if you want to add it in the official project. The new language file must be under MIT license to be added in the project repository.

Login, Admin and Profile pages

These pages are used when a user requires some access to Glewlwyd. They are simple HTML pages with a small JavaScript/JQuery/ReactJS application in it to provide the expected behavior, and vanilla bootstrap 4 for the visual consistency. Glewlwyd front-end source code is under MIT license. Fell free to update them to fit your needs or to adapt the front-end to your identity.

Customize CSS

If you need to customize the CSS only, you can update the following files:

Customize titles and logos

In all pages, the navigation bar has the Glewlwyd logo and the title Glewlwyd. You can change them in each pages individually.

Replace the files in webapp/img/ with your own. Each file is used in each page of the applications. Feel free to use your own organization logo or event.

Change navigation menu title

Change values in the internationalization files located in webapp/locales/*/translations.json:

Each title is identified by the key menu-title in each block specific to a page of the applications, you can change the value with your own title.

  • Admin page:
{
  "admin": {
    [...]
    "menu-title": "Glewlwyd",
    [...]
}
  • Login page:
{
  "login": {
    [...]
    "menu-title": "Glewlwyd",
    [...]
}
  • Profile page:
{
  "profile": {
    [...]
    "menu-title": "Glewlwyd",
    [...]
}

Change HTML page title

Change the tag content value <title> in the following HTML pages:

Event logs triggered

Glewlwyd now logs event messages. These messages can be parsed and used to trigger external actions such as web-hooks or message broadcasting to other Glewlwyd instances for example.

Event log messages have the following format:

<date_timestamp> - Glewlwyd INFO: Event - <event message>

List of events logged

Core events

<date_timestamp> - Glewlwyd INFO: Event - User '<username>' authenticated with password
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' authenticated with scheme '<scheme_type>/<scheme_name>'
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' registered scheme '<scheme_type>/<scheme_name>'
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' registered scheme '<scheme_type>/<scheme_name>' (delegation)
<date_timestamp> - Glewlwyd INFO: Event - User backend module '<module_name>' added (<module_type>)
<date_timestamp> - Glewlwyd INFO: Event - User backend module '<module_name>' updated
<date_timestamp> - Glewlwyd INFO: Event - User backend module '<module_name>' removed
<date_timestamp> - Glewlwyd INFO: Event - User auth scheme module '<module_name>' added (<module_type>)
<date_timestamp> - Glewlwyd INFO: Event - User auth scheme module '<module_name>' updated
<date_timestamp> - Glewlwyd INFO: Event - User auth scheme module '<module_name>' removed
<date_timestamp> - Glewlwyd INFO: Event - Client backend module '<module_name>' added (<module_type>)
<date_timestamp> - Glewlwyd INFO: Event - Client backend module '<module_name>' updated
<date_timestamp> - Glewlwyd INFO: Event - Client backend module '<module_name>' removed
<date_timestamp> - Glewlwyd INFO: Event - Plugin module '<plugin_name>' added (<plugin_type>)
<date_timestamp> - Glewlwyd INFO: Event - Plugin module '<plugin_name>' updated
<date_timestamp> - Glewlwyd INFO: Event - Plugin module '<plugin_name>' removed
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' added
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' updated
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' removed
<date_timestamp> - Glewlwyd INFO: Event - Client '<client_id>' added
<date_timestamp> - Glewlwyd INFO: Event - Client '<client_id>' updated
<date_timestamp> - Glewlwyd INFO: Event - Client '<client_id>' removed
<date_timestamp> - Glewlwyd INFO: Event - Scope '<scope>' added
<date_timestamp> - Glewlwyd INFO: Event - Scope '<scope>' updated
<date_timestamp> - Glewlwyd INFO: Event - Scope '<scope>' removed
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' updated (profile)
<date_timestamp> - Glewlwyd INFO: Event - User '<username>' removed (profile)

OAuth2 plugin events

<date_timestamp> - Glewlwyd INFO: Event oauth2 - Plugin '<plugin_name>' - Refresh token generated for client '<client_id>' granted by user '<username>' with scope list '<scope_list>'
<date_timestamp> - Glewlwyd INFO: Event oauth2 - Plugin '<plugin_name>' - Access token generated for client '<client_id>' granted by user '<username>' with scope list '<scope_list>'
<date_timestamp> - Glewlwyd INFO: Event oauth2 - Plugin '<plugin_name>' - Refresh token generated for client '<client_id>' revoked
<date_timestamp> - Glewlwyd INFO: Event oauth2 - Plugin '<plugin_name>' - Access token generated for client '<client_id>' revoked

OIDC plugin events

<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - Refresh token generated for client '<client_id>' granted by user '<username>' with scope list '<scope_list>'
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - Access token generated for client '<client_id>' granted by user '<username>' with scope list '<scope_list>'
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - id_token generated for client '<client_id>' granted by user '<username>' with scope list '<scope_list>'
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - client '<client_id>' registration updated with redirect_uri <redirect_uri_list>
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - client '<client_id>' registered with redirect_uri <redirect_uri_list>
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - client '<client_id>' deleted
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - Refresh token generated for client '<client_id>' revoked
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - Access token jti '<jti>' generated for client '<client_id>' revoked
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - id_token generated for client '<client_id>' revoked
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - Rich Authorization Request consent type '<type>' set to <true|false> by user '<username>' to client '<client_id>'
<date_timestamp> - Glewlwyd INFO: Event oidc - Plugin '<plugin_name>' - Rich Authorization Request consent type '<type>' deleted by user '<username>' to client '<client_id>'

Register plugin events

<date_timestamp> - Glewlwyd INFO: Event register - Plugin '<plugin_name>' - user '<username>' registered
<date_timestamp> - Glewlwyd INFO: Event register - Plugin '<plugin_name>' - user '<username>' updated its e-mail address to '<e-mail>'
<date_timestamp> - Glewlwyd INFO: Event register - Plugin '<plugin_name>' - user '<username>' opened a reset credential session with e-mail token
<date_timestamp> - Glewlwyd INFO: Event register - Plugin '<plugin_name>' - user '<username>' opened a reset credential session with code

Run Glewlwyd

Run the application using the service command if you installed the init file:

$ sudo service glewlwyd start

You can also manually start the application:

$ # start Glewlwyd using a configuration file
$ glewlwyd --config-file=glewlwyd.conf
$ # start Glewlwyd using environment variables
$ GLWD_PORT=4593 GLWD_EXTERNAL_URL=http://localhost:4593 GLWD_STATIC_FILES_PATH=/usr/share/glewlwyd/webapp [...] glewlwyd --env-variables

By default, Glewlwyd is available on TCP port 4593.

Getting started with the application

When your instance is up and running, you can complete its configuration with the getting started documentation.

Running Glewlwyd in test mode for integration tests

Option 1 - Build your own Glewlwyd in test mode

You can create a Glewlwyd instance suited for integration tests. You need to build Glewlwyd with Mock modules and use a database initialized with the script glewlwyd-test.sql after the script docs/database/init.*.sql. You can use

$ # example with sqlite3 database
$ mkdir build && cd build
$ cmake -DWITH_MOCK=on ..
$ make && sudo make install
$ cd ..
$ sqlite3 /tmp/glewlwyd.db < docs/database/init.sqlite3.sql
$ sqlite3 /tmp/glewlwyd.db < test/glewlwyd-test.sql
$ glewlwyd --config-file=test/glewlwyd-ci.conf

Option 2 - Glewlwyd in test mode on a Docker image

The docker build file Dockerfile-ci builds and generates a docker image called babelouest/glewlwyd:ci. This docker image will execute Glewlwyd in test mode.

  • Build the Docker image for test mode
$ make docker-ci
  • Run the Docker image for test mode
$ docker run --rm -it -p 4593:4593 babelouest/glewlwyd:ci

Glewlwyd in test mode configuration

When you run Glewlwyd in test mode, the Glewlwyd instance uses the modules mock for client and user backend. These backends come with built-in users and clients. The instance also comes with pre configured OAuth2 and OIDC plugins installed.

  • The external URL for this instance is: http://localhost:4593
  • 3 mock schemes are instantiated:
    • mock_scheme_42, expected value to authenticate: 42
    • mock_scheme_88, expected value to authenticate: 88
    • mock_scheme_95, expected value to authenticate: 95
  • The scopes available are:
    • g_admin: access to administration page, available using password only, session timeout 600 seconds
    • g_profile: access to profile page, available using password only, session timeout 600 seconds
    • openid: available using any authentication, no session timeout
    • scope1: available using password and scheme (mock_scheme_42 OR mock_scheme_88) AND mock_scheme_95, no session timeout
    • scope2: available using password and scheme mock_scheme_95, no session timeout
    • scope3: available using password and scheme mock_scheme_88, no session timeout

Mock users list

You can add, edit or remove any user from this backend instance, but there is no persistence, which means that if you restart Glewlwyd, the user list will be back to its original state. All users use the password password. The password is common for all users, which means that if you change the password for a user, the change will apply for all users.

  • username: admin
    • password: password
    • name: The Boss
    • e-mail: boss@glewlwyd.domain
    • scopes: g_admin, g_profile, openid
  • username: user1
    • password: password
    • name: Dave Lopper 1
    • e-mail: dev1@glewlwyd.domain
    • scopes: g_profile, openid, scope1, scope2, scope3
  • username: user2
    • password: password
    • name: Dave Lopper 2
    • e-mail: dev2@glewlwyd.domain
    • scopes: g_profile, openid, scope1
  • username: user3
    • password: password
    • name: Dave Lopper 3
    • e-mail: dev3@glewlwyd.domain
    • scopes: g_profile, scope1, scope2, scope3

Mock clients list

You can add, edit or remove any client from this backend instance, but there is no persistence, which means that if you restart Glewlwyd, the client list will be back to its original state.

  • client_id: client1_id
    • name: client1
    • description: Client mock 1
    • confidential: false
    • authorization_type: code, token, id_token, none, refresh_token, delete_token
    • redirect_uri:
      • ../../test-oauth2.html?param=client1_cb1
      • ../../test-oauth2.html?param=client1_cb2
      • ../../test-oidc.html?param=client1_cb1
    • sector_identifier_uri: https://sector1.glewlwyd.tld
    • scope:
  • client_id: client2_id
    • name: client2
    • description: Client mock 2
    • confidential: false
    • authorization_type: code
    • redirect_uri:
      • ../../test-oauth2.html?param=client2
    • sector_identifier_uri:
    • scope:
  • client_id: client3_id
    • name: client3
    • description: Client mock 3
    • confidential: true
    • password: password
    • authorization_type: code, token, id_token, client_credentials, none, refresh_token, delete_token
    • redirect_uri:
      • ../../test-oauth2.html?param=client3
      • ../../test-oidc.html?param=client3
    • sector_identifier_uri: https://sector1.glewlwyd.tld
    • scope: scope2, scope3
  • client_id: client4_id
    • name: client4
    • description: Client mock 4
    • confidential: true
    • client_secret: secret
    • authorization_type: code, token, id_token
    • redirect_uri:
      • ../../test-oidc.html?param=client4
    • sector_identifier_uri: https://sector4.glewlwyd.tld
    • scope: scope2, scope3

OAuth2 plugin instance

The non specified configuration values are the default ones

  • name: glwd
  • Display Name: OAuth2 Glewlwyd plugin
  • URL API Auth for this instance: http://localhost:4593/api/glwd/auth
  • URL API Token for this instance: http://localhost:4593/api/glwd/token
  • URL API Profile for this instance: http://localhost:4593/api/glwd/profile
  • Tokens signature
    • JWT Type: SHA
    • Key size: 256 bits
    • Secret key: secret

OIDC plugin instance

The non specified configuration values are the default ones

  • name: oidc
  • Display Name: OpenID Connect Glewlwyd plugin
  • URL openid-configuration for this instance: http://localhost:4593/api/oidc/.well-known/openid-configuration
  • URL API Auth for this instance: http://localhost:4593/api/oidc/auth
  • URL API Token for this instance: http://localhost:4593/api/oidc/token
  • URL userinfo for this instance: http://localhost:4593/api/oidc/userinfo
  • Issuer: https://glewlwyd.tld
  • Allow passing request parameter as JWT: true
  • Supported scopes: openid
  • Tokens signature
    • JWT Type: SHA
    • Key size: 256 bits
    • Secret key: secret
  • Allow non OIDC but valid OAuth2 requests: true
  • Authentication types enabled: code, token, id_token, password, client_credentials, none, refresh_token, delete_token