Skip to content

Include AD/non-AD status in certificate#44549

Merged
probakowski merged 7 commits intomasterfrom
probakowski/ad-and-non-ad
Mar 7, 2025
Merged

Include AD/non-AD status in certificate#44549
probakowski merged 7 commits intomasterfrom
probakowski/ad-and-non-ad

Conversation

@probakowski
Copy link
Copy Markdown
Contributor

@probakowski probakowski commented Jul 23, 2024

This change adds extension to the certificate to signify AD login so it can be checked in auth package.

changelog: Allow AD and non-AD logins to single Windows desktop

@probakowski probakowski requested a review from zmb3 July 23, 2024 15:20
@probakowski probakowski marked this pull request as ready for review February 24, 2025 21:39
Comment thread lib/srv/desktop/windows_server.go Outdated
Comment on lines +1328 to +1329
// ad is true if we're connection to AD-joined desktop
ad bool
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we need an extra field, or can we tell based on domain being empty?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we have domain configured for WDS it will be present for both AD and non-AD hosts (at least in case of static hosts from config), so we'd either have to change that or add new field. New field is cleaner in my opinion

Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

desktop.GetDomain() would return the empty string, even if WDS is configured for AD, right? (Because if you set ad: false in static_hosts then we won't set the domain.

Doesn't really matter though.

Comment thread lib/auth/windows/windows.go Outdated
Comment thread lib/auth/windows/windows.go
Comment thread lib/srv/desktop/windows_server.go Outdated
probakowski and others added 2 commits March 6, 2025 21:39
Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com>
Co-authored-by: Edward Dowling <EdwardDowling@users.noreply.github.com>
@probakowski probakowski added this pull request to the merge queue Mar 7, 2025
Merged via the queue into master with commit e793e1e Mar 7, 2025
@probakowski probakowski deleted the probakowski/ad-and-non-ad branch March 7, 2025 19:05
probakowski added a commit that referenced this pull request Mar 19, 2025
* ad/non-ad

* use separate OID for AD status

* Update lib/auth/windows/windows.go

Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com>

* Update lib/srv/desktop/windows_server.go

Co-authored-by: Edward Dowling <EdwardDowling@users.noreply.github.com>

---------

Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com>
Co-authored-by: Edward Dowling <EdwardDowling@users.noreply.github.com>
github-merge-queue Bot pushed a commit that referenced this pull request Mar 20, 2025
* ad/non-ad

* use separate OID for AD status

* Update lib/auth/windows/windows.go



* Update lib/srv/desktop/windows_server.go



---------

Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com>
Co-authored-by: Edward Dowling <EdwardDowling@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants