doc/authentication.md
Cockpit authorizes users by looking at the Authorization header on requests to /login. Cockpit will attempt to perform the start the authentication command that is configured for the auth scheme contained in the header.
To configure an auth scheme add a section to cockpit.conf for that scheme. For example to configure an command for the "Bearer" auth scheme your cockpit.conf should contain the following section.
[bearer]
command = example-verify-token
timeout = 300
The command is then responsible to:
The default command is cockpit-session it is able to handle Password
([basic]), Kerberos/GSSAPI ([negotiate]), and TLS client certificate
([tls-cert]) authentication.
Authentication commands are called with a single argument which is the host that the user is connecting to. They communicate with their parent process using the cockpit protocol on stdin and stdout.
Instead of Command, it's also possible to specify UnixPath to connect to a unix socket at a
given path. The protocol is the same.
Credentials can then be retrieved by issuing a authorize command with a challenge. The challenge should correspond to the authorization type in header (ei: Basic or Bearer). For example:
{
"command": "authorize",
"cookie": "cookie",
"challenge": "*"
}
The response will look something like this
{
"command": "authorize",
"cookie": "cookie",
"response": "Basic dXNlcjpwYXNzd29yZAo=",
"remote-peer": "1.2.3.4",
}
remote-peer is the IP address of the connecting user, if known (otherwise
unset).
A * challenge requests whatever credentials the parent process has. Most auth
commands will want to begin by issuing a * challenge.
By default cockpit-ws will wait a maximum of 30 seconds to receive this response. The number of seconds to wait can be adjusted by adding a timeout parameter along side the auth schema configuration in your config file. The given value should be a number between 1 and 900.
If more information is needed the command should respond with a X-Conversation challenge.
This takes the following format.
X-Conversation nonce base64(prompt message)
The message will be displayed to the user and the user will be prompted for a response. If the user does not respond within 60 seconds the command will be closed and the login aborted. The number of seconds to wait can be adjusted by adding a response-timeout parameter along side the auth schema configuration in your config file. The given value should be a number between 1 and 900.
Once a result is known a "init" command should be sent. If the login was successful you can usually just let the bridge do this.
If the login was not successful the JSON should include a problem field. Values of
authentication-failed, authentication-unavailable or access-denied
are translated to the appropriate cockpit error codes. Any other values are treated
as generic errors. Additionally a message field may be included as well.
If an process exits without sending a init command, that will be treated as an internal error.
If the authentication command has additional data that it would like to return with a successful response
it can do so by sending a x-login-data challenge. The command should have an additional JSON field
login-data. The string placed there will be returned by along with a successful json response.
For a simple python example see cockpit-auth-ssh-key.
Cockpit also supports logging directly into remote machines. The remote machine to
connect to is provided by using a application name that begins with cockpit+=.
The default command used for this is python3 -m cockpit.beiboot, which
invokes ssh.
The section Ssh-Login defines the options for all ssh commands. The section
has the same options as the other authentication sections with the following additions.
host The default host to log into. Defaults to 127.0.0.1. That host's key
will not be checked/validated.connectToUnknownHosts. By default cockpit will refuse to connect to any machines that
are not already present in ssh's global known_hosts file (usually
/etc/ssh/ssh_known_hosts). Set this to true is to allow those connections
to proceed.After the user authentication with the "*" challenge, if the remote
host is not already present in any local known_hosts file, this will send an
"x-host-key" challenge:
{
"command": "authorize",
"challenge": "x-host-key"
"cookie": "cookie",
}
The caller responds to that with either a valid key like below, or an empty string response if there is no available key.
{
"command": "authorize",
"cookie": "cookie",
"response": "ssh-rsa AAAA1234...",
}
When a machine is joined to an Identity Management domain (like FreeIPA or Active Directory) which has client-side user certificates set up, then these can be enabled for authentication to Cockpit by setting this option in cockpit.conf:
[WebService]
ClientCertAuthentication = yes
This uses the [tls-cert] authentication scheme.
When enabling this mode, other authentication types commonly get disabled. See the next section for details.
See the Certificate/smart card authentication guide for details how to set this up.
Setting an action can modify the behavior for an auth scheme. Currently two actions are supported.
Ssh-Login section instead.To configure an action add the action option. For example to disable basic authentication,
cockpit.conf should contain the following section:
[basic]
action = none
Likewise, if the machine is part of a Kerberos domain, but that should not be used to authenticate to cockpit, create the following section:
[negotiate]
action = none
Cockpit can be configured to limit the number of concurrent login processes. See cockpit.conf for more details. This will affect how many custom authentication processes can be launched.
The following environment variables are set by cockpit-ws when spawning an auth process for SSH connections:
COCKPIT_SSH_CONNECT_TO_UNKNOWN_HOSTS Set to 1 to allow connecting to
hosts that are not present in the current known_hosts files. If not set,
Cockpit will only connect to unknown hosts if either the remote peer is
local, or if the Ssh-Login section in cockpit.conf has an
connectToUnknownHosts option set to a true value (1, yes or true).
COCKPIT_SSH_KNOWN_HOSTS_FILE Path to knownhost files. Defaults to
PACKAGE_SYSCONF_DIR/ssh/ssh_known_hosts
This section entirely ignores cockpit-tls for simplicity, as it is not involved in the authentication. See cockpit-tls docs for details.
Authorization: Basic base64(user:password) headercockpit.conf whether it has a customized session Command or UnixPath for basic. If not, defaults to cockpit-session (via UnixPath = /run/cockpit/session). It parses user/password from the header and spawns the session command with the target host as argument.authorize command with a * challenge (see above) to cockpit-ws, which responds with the user/passwordX-Conversation authorize messages (see above) to cockpit-wssequenceDiagram
participant User
participant cockpit-ws
participant cockpit-session
participant PAM
User->>cockpit-ws: GET https://server:9090
cockpit-ws->>User: 401 + Login page
User->>cockpit-ws: GET with Authorization: Basic
cockpit-ws->>cockpit-session: Spawn
cockpit-session->>cockpit-ws: authorize command with * challenge
cockpit-ws->>cockpit-session: user/password
cockpit-session->>PAM: pam_authenticate()
PAM-->>cockpit-session: Success or conversation
opt 2FA/password change
cockpit-session->>cockpit-ws: X-Conversation challenge
cockpit-ws->>User: Display prompt
User->>cockpit-ws: Response
cockpit-ws->>cockpit-session: Forward response
cockpit-session->>PAM: Continue conversation
end
PAM->>cockpit-session: Success
cockpit-session->>PAM: open_session()
cockpit-ws->>User: 200 OK for the login page
WWW-Authenticate: Negotiate header (if Kerberos is available)Authorization: Negotiate <base64-gssapi-token> headercockpit.conf whether it has a customized session command for negotiate. If not, defaults to cockpit-session and runs it in the same way as above.gss_accept_sec_context() with the GSSAPI token to verify the Kerberos ticketGSS_S_CONTINUE_NEEDED (multi-round negotiation):
Negotiate challenge containing the output token to cockpit-wsWWW-Authenticate: Negotiate <token> to the BrowserAuthorization: Negotiate <token> requestgss_localname() (which applies configured mapping rules), or if that fails, falls back to gss_display_name() which returns the principal name as-is (e.g. [email protected])/run/user/<uid>/cockpit-session-<pid>.ccache and sets KRB5CCNAME in the PAM environment, so that the bridge can use them for accessing other Kerberos-protected services (like SSH to remote machines)Unlike the other sections, this one involves cockpit-tls as well as it provides a crucial part of the authentication.
cockpit-wsinstance-https@<fingerprint> systemd socket/service (starting a dedicated cockpit-ws instance for this certificate if needed). See cockpit-tls docs and systemd units for details./run/cockpit/tls/clients/<fingerprint> (kept as long as there is at least one active connection with that certificate)"client-certificate": "<fingerprint>" in its mini JSON protocol to cockpit-wstls-cert <fingerprint> as the authorization typecockpit.conf whether it has a customized session command for tls-cert. If not, defaults to cockpit-session and runs it in the same way as above.tls-cert <fingerprint> authorization and reads the certificate from /run/cockpit/tls/clients/<fingerprint>org.freedesktop.sssd.infopipe.Users.FindByCertificate) to map the certificate to a usernamehttps://server:9090/=hostname) or sets the "Connect to:" field in the Login page to hostname.Authorization: Basic base64(user:password\0known_hosts) header, where known_hosts contains any previously-stored SSH host keys for the target host from the browser's localStoragecockpit.conf for the [Ssh-Login] section's Command or UnixPath. If not customized, defaults to cockpit.beibootauthorize command with a * challenge to cockpit-ws, which responds with the user/password/known_hosts from the Authorization header (same as User/Password step 5)known_hosts to a temporary file, and configures ssh to use it via -o UserKnownHostsfile=...SSH_ASKPASS mechanism. ferny's interaction agent detects the host key prompt, parses the fingerprint, and cockpit.beiboot sends an X-Conversation challenge to cockpit-ws with the host key fingerprint and hostname.SshChangedHostKeyError. cockpit.beiboot fails with problem=invalid-hostkey. login.js catches this and retries the login without sending the old known_hosts entry, causing SSH to treat it as an unknown host (see above).X-Conversation challenge to the web UIX-Conversation headerX-Conversation messages back and forthcockpit-bridge, or sends its own Python module through the SSH connection (via beipack). It starts bridge on the remote machine and connects its stdio to itknown_hosts file and sends it to the browser in the init message's login-data field as known-hostsknown-hosts entry in localStorage for future connections to this host