Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to auto authenticate openfire meetings? #100

Open
aaykmr opened this issue Nov 7, 2019 · 8 comments
Open

How to auto authenticate openfire meetings? #100

aaykmr opened this issue Nov 7, 2019 · 8 comments

Comments

@aaykmr
Copy link

aaykmr commented Nov 7, 2019

I am using Openfire Meetings plugin, and the video call opens up from my webapp when the user clicks a link. On clicking the link Jitsi again asks for username and password. I want to automatically authenticate the users as they are already logged in to the webapp. I have the credentials but can't find a way to auto authenticate Jitsi.

I have tried:

  1. Anonymous login: Not desirable, because then anyone who is not a part of our app can use the service.

  2. Sending keys in the url.

  3. Using jwt: Didn't work but I'd like some help on this.

  4. Debugging the source code on Chrome, code is complex so couldn't find much.

@ageekhere
Copy link

would be nice if it could remember the login details, so you only have to do it once.

@naive924
Copy link

Hi,

It may be because secret is null when new FocusComponent is used.
If this secret is prosody, set as follows.
see https://github.com/jitsi/jitsi-meet/blob/master/doc/manual-install.md

prosodyctl register focus auth.jitsi.example.com SECRET

Is openfire-ofmeet-plugin doing the same process as "prosodyctl register focus"?


  • jicofo new FocusComponent
FocusComponent component
            = new FocusComponent(
                    host, port, componentDomain, componentSubDomain,
                    secret, focusAnonymous, focusUserName + "@" + focusDomain);

see https://github.com/jitsi/jicofo/blob/e87bd05d4b66fe11dabff4b433a7fe9360d6d82f/src/main/java/org/jitsi/jicofo/Main.java#L171

  • openfire-ofmeet-plugin new FocusComponent
jicofoComponent = new FocusComponent( XMPPServer.getInstance().getServerInfo().getHostname(), 0, XMPPServer.getInstance().getServerInfo().getXMPPDomain(), jicofoSubdomain, 
null, focusAnonymous, XMPPServer.getInstance().createJID( "focus", null ).toBareJID() );

see https://github.com/igniterealtime/openfire-ofmeet-plugin/blob/master/offocus/src/main/java/org/jivesoftware/openfire/plugin/ofmeet/JitsiJicofoWrapper.java#L144

@deleolajide
Copy link
Member

The only method I know of is what I use in Pade. Store in localStorage at window.load

localStorage.setItem("xmpp_username_override", "user@domain" );
localStorage.setItem("xmpp_password_override", "pa$$word");

and remove at window.unload events

localStorage.removeItem("xmpp_username_override");
localStorage.removeItem("xmpp_password_override");

@naive924
Copy link

There is such a method, I will try it!

@naive924
Copy link

In this way, the username password query is gone. Thank you!

localStorage.setItem("xmpp_username_override", "user@domain" );
localStorage.setItem("xmpp_password_override", "pa$$word");

As with jitsi meet, we would be happy if we could make the configuration without default authentication.

Looking here (https://github.com/jitsi/jitsi-meet/blob/master/doc/manual-install.md#configure-prosody), Adding an XMPP main domain with "anonymous" seemed to have no default authentication.
(I don't know how to do that ...)

@deleolajide
Copy link
Member

deleolajide commented Mar 29, 2020

Go here in openfire - https://server:9090/reg-settings.jsp

image

@naive924
Copy link

Wonderful! ! Anonymous Login is done.
I like openfire-ofmeet-plugin because it runs on Windows ! !

Thank you in the future.

@deleolajide
Copy link
Member

Openfire Meeting now supports Windows SSO using NTLM
See igniterealtime/openfire-pade-plugin#47

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants