Possibility Of Login with Both Ldap and Open ID to same account #4097

Closed
opened 2025-11-02 05:37:44 -06:00 by GiteaMirror · 4 comments
Owner

Originally created by @kstan79 on GitHub (Oct 11, 2019).

  • Gitea version (or commit ref):
  • Git version:
  • Operating system:
  • Database (use [x]):
    • PostgreSQL
    • [x ] MySQL
    • MSSQL
    • SQLite
  • Can you reproduce the bug at https://try.gitea.io:
    • Yes (provide example URL)
    • No
    • [x ] Not relevant
  • Log gist:

Description

I wish to allow user to login via openid from web console, but clone checkout/push/etc using ldap password. The reason behind is we have internal keycloak server which bind to ldap.
At this moment, gitea require to maintain internal password when I bind account to openid server. I know there is alternative way like using certificate file but that is not preferable option due to it added complexity of deployment.

Screenshots

Originally created by @kstan79 on GitHub (Oct 11, 2019). <!-- NOTE: If your issue is a security concern, please send an email to security@gitea.io instead of opening a public issue --> <!-- 1. Please speak English, this is the language all maintainers can speak and write. 2. Please ask questions or configuration/deploy problems on our Discord server (https://discord.gg/gitea) or forum (https://discourse.gitea.io). 3. Please take a moment to check that your issue doesn't already exist. 4. Please give all relevant information below for bug reports, because incomplete details will be handled as an invalid report. --> - Gitea version (or commit ref): - Git version: - Operating system: - Database (use `[x]`): - [ ] PostgreSQL - [x ] MySQL - [ ] MSSQL - [ ] SQLite - Can you reproduce the bug at https://try.gitea.io: - [ ] Yes (provide example URL) - [ ] No - [x ] Not relevant - Log gist: ## Description I wish to allow user to login via openid from web console, but clone checkout/push/etc using ldap password. The reason behind is we have internal keycloak server which bind to ldap. At this moment, gitea require to maintain internal password when I bind account to openid server. I know there is alternative way like using certificate file but that is not preferable option due to it added complexity of deployment. ## Screenshots <!-- **If this issue involves the Web Interface, please include a screenshot** -->
GiteaMirror added the issue/confirmedtype/proposal labels 2025-11-02 05:37:44 -06:00
Author
Owner

@stale[bot] commented on GitHub (Dec 10, 2019):

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs during the next 2 weeks. Thank you for your contributions.

@stale[bot] commented on GitHub (Dec 10, 2019): This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs during the next 2 weeks. Thank you for your contributions.
Author
Owner

@strk commented on GitHub (Feb 20, 2020):

Sounds like a great idea, any chance you'll be able to think about how it could be implemented ?
Right now OpenID accounts are considered "local" so I guess we could switch from local to LDAP to do that. See also https://github.com/go-gitea/gitea/issues/1124 as I think it's somewhat related

@strk commented on GitHub (Feb 20, 2020): Sounds like a great idea, any chance you'll be able to think about how it could be implemented ? Right now OpenID accounts are considered "local" so I guess we could switch from local to LDAP to do that. See also https://github.com/go-gitea/gitea/issues/1124 as I think it's somewhat related
Author
Owner

@flortsch commented on GitHub (Jan 6, 2021):

For me, this actually works. In Gitea, I setup an LDAP backend (FreeIPA) and OpenID provider (Keycloak). I can login with LDAP information, and on first login with OpenID, I can link to the existing Gitea account from the LDAP backend. With this, both OpenID via browser and repo interactions on the terminal via LDAP login work.

@flortsch commented on GitHub (Jan 6, 2021): For me, this actually works. In Gitea, I setup an LDAP backend (FreeIPA) and OpenID provider (Keycloak). I can login with LDAP information, and on first login with OpenID, I can link to the existing Gitea account from the LDAP backend. With this, both OpenID via browser and repo interactions on the terminal via LDAP login work.
Author
Owner

@lunny commented on GitHub (Jan 14, 2021):

As @flortsch said, I will close this and please feel free to reopen it.

@lunny commented on GitHub (Jan 14, 2021): As @flortsch said, I will close this and please feel free to reopen it.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/gitea#4097