Kerberos Authentication #4464

Open
opened 2026-02-05 08:56:50 +03:00 by OVERLORD · 2 comments
Owner

Originally created by @PiRomant on GitHub (Feb 15, 2024).

Describe the feature you'd like

Option to authenticate using Kerberos, a widely used network authentication protocol.

Describe the benefits this would bring to existing BookStack users

This will enhance security and streamline the authentication process for users who are already using Kerberos in their environment.

Can the goal of this request already be achieved via other means?

Using the AD FS with SAML

Have you searched for an existing open/closed issue?

  • I have searched for existing issues and none cover my fundamental request

How long have you been using BookStack?

Under 3 months

Additional context

No response

Originally created by @PiRomant on GitHub (Feb 15, 2024). ### Describe the feature you'd like Option to authenticate using Kerberos, a widely used network authentication protocol. ### Describe the benefits this would bring to existing BookStack users This will enhance security and streamline the authentication process for users who are already using Kerberos in their environment. ### Can the goal of this request already be achieved via other means? Using the AD FS with SAML ### Have you searched for an existing open/closed issue? - [X] I have searched for existing issues and none cover my fundamental request ### How long have you been using BookStack? Under 3 months ### Additional context _No response_
OVERLORD added the 🔨 Feature Request label 2026-02-05 08:56:50 +03:00
Author
Owner

@ssddanbrown commented on GitHub (Feb 15, 2024):

Thanks for the suggestion @PiRomant,
From my view, I wouldn't be keen to support additional auth systems without there being a clear and significant demand/requirement from the user-base, and since I've had very little request for this in the last 8 years, I don't think it's evident that such a demand/requirement is there.

@ssddanbrown commented on GitHub (Feb 15, 2024): Thanks for the suggestion @PiRomant, From my view, I wouldn't be keen to support additional auth systems without there being a clear and significant demand/requirement from the user-base, and since I've had very little request for this in the last 8 years, I don't think it's evident that such a demand/requirement is there.
Author
Owner

@aSysadminStory commented on GitHub (Oct 10, 2025):

Hi,
First of all, thank you for your amazing work on Bookstack — it’s an excellent wiki platform: simple, stable, and very well designed 👏
I understand your position on authentication systems, but in a modern Active Directory environment, Kerberos isn’t an optional feature — it’s the foundation of security.

Once an account is part of the Protected Users group, simple LDAP authentication (even over LDAPS) is no longer allowed.
This means Bookstack becomes unusable for any user account that follows Microsoft’s recommended security standards.

In short, without Kerberos (or GSSAPI) support, Bookstack cannot be properly integrated into a secure AD environment.
That’s unfortunate, because your solution is excellent in every other way.

@aSysadminStory commented on GitHub (Oct 10, 2025): Hi, First of all, thank you for your amazing work on Bookstack — it’s an excellent wiki platform: simple, stable, and very well designed 👏 I understand your position on authentication systems, but in a modern Active Directory environment, Kerberos isn’t an optional feature — it’s the foundation of security. Once an account is part of the Protected Users group, simple LDAP authentication (even over LDAPS) is no longer allowed. This means Bookstack becomes unusable for any user account that follows Microsoft’s recommended security standards. In short, without Kerberos (or GSSAPI) support, Bookstack cannot be properly integrated into a secure AD environment. That’s unfortunate, because your solution is excellent in every other way.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/BookStack#4464