Skip to main content
Discussion ongoing

Enable fallback / recovery to local authentication when using OIDC / SAML authentication

Related products:Infra Monitoring - Administration
  • December 9, 2025
  • 2 replies
  • 7 views

Forum|alt.badge.img+2

It seems to me that if, for example, I configure OpenID Connect ONLY authentication I have no fallback to local authentication if one day OIDC auth was to fail for whatever reason. For sure “Mixed-mode” exists but that just encourages half of my team to skip the OIDC button and continue authenticating with their LDAP accounts / local accounts (which is what they did in the past) - old habits die hard and while the team SHOULD go through the OIDC flow, do MFA, sign on with our SSO system etc., they often just SEE the Centreon login page and use it - so Mixed mode is not really useful for us.

In the case of an OIDC / SAML failure (imagine after an upgrade of these systems, not impossible) could you not do provide an IP restricted URL that would provide local authentication fallback to the admins of Centreon that come from a certain restricted IP range, or potentially a configuration file that declares the auth type so that it could it temporarily changed until the OIDC problems are fixed.

Auth_type = “local_only | oidc_only | oidc_mixed | saml_only | saml_mixed” etc.

2 replies

rchauvel
Centreonian
Forum|alt.badge.img+18
  • Centreonian
  • December 12, 2025
NewDiscussion ongoing

Forum|alt.badge.img+11

I would say, why not have some automation or admin script on the server that would switch between the oicd only and mixed mode.

That way you can keep the oicd mode enabled, and if you face issue, you switch it back to mixed in an easy way, there is options on the API V2 to do that.