[General] #510
Replies: 3 comments 2 replies
-
Sorry... While browsing the discussion topics again, I just came across this one: #271 I will read it carefully. However, I remain with my final question:
Sincerely |
Beta Was this translation helpful? Give feedback.
-
the question is clear enough. First about frontends url, you have still pointed all the primary entry points. But you can add few ones which are specific to Collect, ESX & Deploy tasks. These entry points are used to retrieve the jobs to run after the agent is notified the server has such jobs for him. If you don't use these tasks, you can ignore them:
So yes, the first method is to implement Basic authentication on all these pages. And this is the protection we can use for GLPI Cloud Network instances. You can also secure these pages by configuring SSL client certificate authentication. On the agent-side, you will have to deploy the certificate in a file and configure agent to use |
Beta Was this translation helpful? Give feedback.
-
Hi @g-bougard, Thank you for this exchange. After having parsed the content of the GIPIInventory plugin, should we also control access (ideally by CA_cert client authent) to this file: It seems to be the fallback for the basic inventory within the plugin as well as for compatibility with Fusion? |
Beta Was this translation helpful? Give feedback.
-
Your question
Hello / Good evening g-bougard,
Hello / Good evening everyone.
translated from Google Translate
I don't know if this is the right place to bring up this subject, but is there a guideline regarding securing GLPI-Agent connections?
This subject has apparently been the subject of a thread on the forum, but I don't think I have found an answer.
Situation :
A GLPI is hosted “On Premise” and exposed, in HTTPS with a public authority SSL/TLS certificate (DigiCert… Sectigo… GlobalSign) by an Apache server, on the Internet.
Anyone with an account can connect to it, from wherever they are (no public IP filtering, no VPN, etc.)...
I am waiting for OTP – 2FA in the Core with great attention.
The GLPI-Agent are deployed on the computers (desktop or laptop) of the different Entities (multi structures / multi sites) in service execution mode.
Need :
How to “secure” JSON (or XML) “injections” to Inventory front-ends, whatever they may be:
It is easy to do (via the Apache VHOST) a “Location Deny” to the native inventory URL to be certain that only the GLPIInventory plugin will be accessed.
Afterwards, it is of course authentication by client certificate (coming from an internal CA this time) on Apache from the GLPI-Agent request which would be the privileged access control mechanism.
But if for the native inventory, a single front-end PHP file would need to be protected, for the GLPIInventory plugin it seems more delicate.
What are the entry points requested by a GLPI-Agent to which we could or should control access without preventing the operation of the entire WEB part of the plugin (/glpiinventory/front/*).
I don't know the question presented here is well structured, but overall... how GLPI Network Cloud instances are protected against possible illegitimate JSON injection?
Thanks in advance for a little enlightenment :-)
Beta Was this translation helpful? Give feedback.
All reactions