This way, the "installing" sections would cover from beginners to advanced (professional) readers. Signed-off-by: Suguru Hirahara <acioustick@noreply.codeberg.org>
8.8 KiB
Setting up ma1sd Identity Server (optional)
⚠️Note: ma1sd itself has also been unmaintained for years (the latest commit and release being from 2021). The role of identity servers in the Matrix specification also has an uncertain future. We recommend not bothering with installing it unless it's the only way you can do what you need to do. For example, certain things like LDAP integration can also be implemented via the LDAP provider module for Synapse.
The playbook can configure the ma1sd Identity Server for you. It is a fork of mxisd which was pronounced end of life 2019-06-21.
ma1sd is used for 3PIDs (3rd party identifiers like E-mail and phone numbers) and some enhanced features. It is private by default, potentially at the expense of user discoverability.
See the project's documentation to learn what it does and why it might be useful to you.
Note: enabling ma1sd, means that the openid
API endpoints will be exposed on the Matrix Federation port (usually 8448
), even if federation is disabled. It's something to be aware of, especially in terms of firewall whitelisting (make sure port 8448
is accessible).
Adjusting DNS records
To make the ma1sd Identity Server enable its federation features, set up a SRV record that looks like this:
- Name:
_matrix-identity._tcp
(use this text as-is) - Content:
10 0 443 matrix.example.com
(replaceexample.com
with your own)
See ma1sd's documentation for information on the privacy implications of setting up this SRV record.
Note: This _matrix-identity._tcp
SRV record for the identity server is different from the _matrix._tcp
that can be used for Synapse delegation. See howto-server-delegation.md for more information about delegation.
Adjusting the playbook configuration
To enable ma1sd, add the following configuration to your inventory/host_vars/matrix.example.com/vars.yml
file:
matrix_ma1sd_enabled: true
Matrix.org lookup forwarding
To ensure maximum discovery, you can make your identity server also forward lookups to the central matrix.org Identity server (at the cost of potentially leaking all your contacts information).
Enabling this is discouraged and you'd better learn more before proceeding.
To enable matrix.org forwarding, add the following configuration to your inventory/host_vars/matrix.example.com/vars.yml
file:
matrix_ma1sd_matrixorg_forwarding_enabled: true
Additional features
What this playbook configures for your is some bare minimum Identity Server functionality, so that you won't need to rely on external 3rd party services.
A few variables can be toggled in this playbook to alter the ma1sd configuration that gets generated.
Still, ma1sd can do much more. You can refer to the ma1sd website for more details and configuration options.
To use a more custom configuration, you can define a matrix_ma1sd_configuration_extension_yaml
string variable and put your configuration in it. To learn more about how to do this, refer to the information about matrix_ma1sd_configuration_extension_yaml
in the default variables file of the ma1sd component.
Customizing email templates
If you'd like to change the default email templates used by ma1sd, take a look at the matrix_ma1sd_threepid_medium_email_custom_
variables (in the roles/custom/matrix-ma1sd/defaults/main.yml
file.
ma1sd-controlled Registration
To use the Registration feature of ma1sd, you can make use of the following variables:
-
matrix_synapse_enable_registration
- to enable user-initiated registration in Synapse -
matrix_synapse_enable_registration_captcha
- to validate registering users using reCAPTCHA, as described in the enabling reCAPTCHA documentation. -
matrix_synapse_registrations_require_3pid
- a list of 3pid types (among'email'
,'msisdn'
) required by the Synapse server for registering -
variables prefixed with
matrix_ma1sd_container_labels_
(e.g.matrix_ma1sd_container_labels_matrix_client_3pid_registration_enabled
) - to configure the Traefik reverse-proxy to capture and send registration requests to ma1sd (instead of Synapse), so it can apply its additional functionality -
matrix_ma1sd_configuration_extension_yaml
- to configure ma1sd as required. See the Registration feature's docs for inspiration. Also see the Additional features section below to learn more about how to usematrix_ma1sd_configuration_extension_yaml
.
Note: For this to work, either the homeserver needs to federate or the openid
APIs need to exposed on the federation port. When federation is disabled and ma1sd is enabled, we automatically expose the openid
APIs (only!) on the federation port. Make sure the federation port (usually https://matrix.example.com:8448
) is whitelisted in your firewall (even if you don't actually use/need federation).
Authentication
Authentication provides the possibility to use your own Identity Stores (for example LDAP) to authenticate users on your Homeserver.
To enable authentication against an LDAP server, add the following configuration to your inventory/host_vars/matrix.example.com/vars.yml
file:
matrix_synapse_ext_password_provider_rest_auth_enabled: true
# matrix-ma1sd is the hostname of the ma1sd Docker container
matrix_synapse_ext_password_provider_rest_auth_endpoint: "http://matrix-ma1sd:8090"
matrix_ma1sd_configuration_extension_yaml: |
ldap:
enabled: true
connection:
host: ldapHostnameOrIp
tls: false
port: 389
baseDNs: ['OU=Users,DC=example,DC=org']
bindDn: CN=My ma1sd User,OU=Users,DC=example,DC=org
bindPassword: TheUserPassword
Example: SMS verification
If your use case requires mobile verification, it is quite simple to integrate ma1sd with Twilio, an online telephony services gateway. Their prices are reasonable for low-volume projects and integration can be done with the following configuration:
matrix_ma1sd_configuration_extension_yaml: |
threepid:
medium:
msisdn:
connectors:
twilio:
account_sid: '<secret-SID>'
auth_token: '<secret-token>'
number: '+<msisdn-number>'
Example: Open Registration for every Domain
If you want to open registration for any domain, you have to setup the allowed domains with ma1sd's blacklist
and whitelist
. The default behavior when neither the blacklist
, nor the whitelist
match, is to allow registration. Beware: you can't block toplevel domains (aka .xy
) because the internal architecture of ma1sd doesn't allow that.
matrix_ma1sd_configuration_extension_yaml: |
register:
policy:
allowed: true
threepid:
email:
domain:
blacklist: ~
whitelist: ~
Installing
After configuring the playbook, run it with playbook tags as below:
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
The shortcut commands with the just
program are also available: just install-all
or just setup-all
just install-all
is useful for maintaining your setup quickly (2x-5x faster than just setup-all
) when its components remain unchanged. If you adjust your vars.yml
to remove other components, you'd need to run just setup-all
, or these components will still remain installed. Note these shortcuts run the ensure-matrix-users-created
tag too.
Troubleshooting
If email address validation emails sent by ma1sd are not reaching you, you should look into Adjusting email-sending settings.
If you'd like additional logging information, temporarily enable verbose logging for ma1sd.
To enable it, add the following configuration to your inventory/host_vars/matrix.example.com/vars.yml
file:
matrix_ma1sd_verbose_logging: true