This plugin provides authentication based on a http header (default: X_Forwarded_User). The authenticator will fall back to the default JIRA authenticator, so everything external should keep working as expected. WARNING: This plugin is currently not actively developed or maintained. It was created for an organisation that no longer does or uses FOSS, so it was moved. Feel free to use it at your own risk, or to fork and improve it. I hope it is helpful anyway.
This software is distributed under the MIT License. See COPYING for details.
There are a few things you need in order to install this plugin:
- Get the Atlassian SDK as described at Atlassian
- Build the .jar file with the
atlas-package
command in the root folder (containing the pom.xml) - Stop your JIRA instance if it is running
- Copy the target/russo-1.0.jar file to the WEB-INF/libs folder of your JIRA installation
- Modify the WEB-INF/classes/seraph-config.xml file by commenting out existing auth classes and adding
<authenticator class="ch.fuchsnet.seraph.RussoAuthenticator"/>
- Restart your JIRA instance
- If it doesn't work as expected, check your JIRA logs. If you need more verbose information, set useDebug to true and recompile and reinstall the package
In order to get it to work, you need to configure your httpd (e.g. Apache httpd) to do the authentication and set the header. For security reasons you should make sure that user-set headers are removed, otherwise users will be able to spoof authentication and log in as a different user!
Example Apache configuration
<VirtualHost *:443>
SSLEngine on
SSLCertificateFile /etc/pki/tls/certs/mypubliccert.pem
SSLCertificateKeyFile /etc/pki/tls/private/privatekey.pem
ProxyPreserveHost On
ProxyRequests Off
ServerName jira.mycompany.tld
ProxyPass / http://localhost:8080/
ProxyPassReverse / http://localhost:8080/
SSLProxyEngine On
<Location />
AuthType Kerberos
AuthName "Jira Kerberos Auth"
KrbMethodNegotiate On
KrbMethodK5Passwd On
KrbAuthRealms MYREALM
Krb5KeyTab /etc/httpd/httpd.keytab
KrbLocalUserMapping On
require valid-user
RequestHeader set X-Forwarded-User %{REMOTE_USER}s
</Location>
</VirtualHost>