Open Authentication v2.0 database

New in version v2.2.28.

This database works with a oauth2 provider such as google or facebook. You are recommended to use xoauth2 or oauthbearer Authentication (SASL) Mechanisms with this. The responses from endpoints must be JSON objects.

Configuration

Common

In dovecot.conf put

auth_mechanisms = $auth_mechanisms oauthbearer xoauth2

passdb {
  driver = oauth2
  mechanisms = xoauth2 oauthbearer
  args = /etc/dovecot/dovecot-oauth2.conf.ext
}

Backend

Configuration file example for Google

tokeninfo_url = https://www.googleapis.com/oauth2/v3/tokeninfo?access_token=
introspection_url = https://www.googleapis.com/oauth2/v2/userinfo
#force_introspection = yes
username_attribute = email
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt

Configuration file example for WSO2 Identity Server

introspection_mode = post
introspection_url = https://client_id:client_secret@server.name:port/oauth2/introspect
username_attribute = username
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt
active_attribute = active
active_value = true

Configuration file example for Microsoft Identity Platform <https://learn.microsoft.com/en-us/entra/identity-platform/userinfo>

introspection_mode = auth
introspection_url = https://graph.microsoft.com/v1.0/me
# this can vary on your settings
username_attribute = mail
tls_ca_cert_file = /etc/ssl/certs/ca-certificates.crt

Proxy

If you want to forward oauth2 authentication to your backend, you can use various ways

Without proxy authentication

passdb {
  driver = static
  args = nopassword=y proxy=y proxy_mech=%m ...
}

or with proxy authentication, put into dovecot-oauth2.conf.ext

pass_attrs = proxy=y proxy_mech=%m

Proxy with password grant

New in version v2.3.6.

If you want to configure proxy to get token and pass it to backend

passdb settings

passdb {
  driver = oauth2
  mechanisms = oauthbearer xoauth2
  args = /usr/local/etc/dovecot/dovecot-oauth2.token.conf.ext
}

passdb {
  driver = oauth2
  mechanisms = plain login
  args = /usr/local/etc/dovecot/dovecot-oauth2.plain.conf.ext
}

put into dovecot-oauth2.token.conf.ext

grant_url = http://localhost:8000/token
client_id = verySecretClientId
client_secret = verySecretSecret
tokeninfo_url = http://localhost:8000/oauth2?oauth=
introspection_url = http://localhost:8000/introspect
introspection_mode = post
use_grant_password = no
debug = yes
username_attribute = username
pass_attrs = pass=%{oauth2:access_token}

put into dovecot-oauth2.plain.conf.ext

grant_url = http://localhost:8000/token
client_id = verySecretClientId
client_secret = verySecretSecret
introspection_url = http://localhost:8000/introspect
introspection_mode = post
use_grant_password = yes
debug = yes
username_attribute = username
pass_attrs = host=127.0.0.1 proxy=y proxy_mech=xoauth2 pass=%{oauth2:access_token}

Local validation

New in version 2.3.11.

Local validation allows validating tokens without connecting to an oauth2 server. This requires that key issuer supports JWT tokens (RFC 7519).

You can put the validation keys into any dictionary. The lookup key used is /shared/<azp:default>/<alg>/<keyid:default>. If there is no azp element in token body, then default is used. The alg field is always uppercased by Dovecot. If there is no kid element in token header, default is used. Keys are cached into memory when they are fetched, to evict them from cache you need to restart Dovecot. If you want to do key rotation, it is recommended to use a new key id.

Example:

{"kid":"Zm9vb2Jhcgo","alg":"ES256","typ":"JWT"}.{"sub":"testuser@example.org","azp":"issuer.net-dovecot"}

Would turn into

/shared/issuer.net-dovecot/ES256/Zm9vb2Jhcgo

And would expect, when using fs posix, key at

/etc/dovecot/keys/issuer.net-dovecot/ES256/Zm9vb2Jhcgo

In key id and AZP field, / are escaped with %2f and % are escaped with %25 with any driver. This is because / is a dict key component delimiter.

Changed in version v2.3.14.1.

When using dict-fs driver, if the path starts with . it will be escaped using two more dots. So any . turns into ..., and any .. turns into .....

For example, token

{"kid":""./../../../../etc,"alg":"ES256","typ":"JWT"}.{"sub":"testuser@example.org","azp":"attack"}

Would turn into

/etc/dovecot/keys/attack/ES256/...%2f....%2f....%2f....%2f....%2fetc%2fpasswd

Local validation can be enabled with other oauth2 options, so that if key validation fails for non-JWT keys, then online validation is performed.

You can use local validation with password grants too. This will save you introspection round to oauth2 server.

To use local validation, put into dovecot-oauth2.conf.ext

introspection_mode = local
local_validation_key_dict = fs:posix:prefix=/etc/dovecot/keys/

Currently Dovecot oauth2 library implements the following features of JWT tokens:

  • IAT checking

  • NBF checking

  • EXP checking

  • ISS checking

  • ALG checking

  • SUB support

  • AUD support (this is checked against scope, if provided)

  • AZP support

Changed in version 2.3.21: AUD check now checks client_id, not scope. If the token has scope field, this is checked for scope. KTY checking has been removed completely.

The following algorithms are supported

  • HS256, HS384, HS512

  • RS256, RS384, RS512

  • PS256, PS384, PS512

  • ES256, ES384, ES512

There is currently no support for EdDSA algorithms. ES supports any curve supported by OpenSSL for this purpose.

OpenID.Discovery

New in version v2.3.16.

Support for RFC 7628 OpenID Discovery (OIDC) can be achieved with openid_configuration_url setting. Setting this causes Dovecot to report OIDC configuration URL as openid-configuration element in error JSON.

Changed in version 2.3.21: OAuth2 error handling was made to always use OAUTH2 mechanisms errors, so openid-configuration would be emitted always.

Full config file

### OAuth2 password database configuration

## url for verifying token validity. Token is appended to the URL
# tokeninfo_url = http://endpoint/oauth/tokeninfo?access_token=

## introspection endpoint, used to gather extra fields and other information.
# introspection_url = http://endpoint/oauth/me

## How introspection is made, valid values are
##   auth = GET request with Bearer authentication
##   get  = GET request with token appended to URL
##   post = POST request with token=bearer_token as content
##   local = Attempt to locally validate and decode JWT token
# introspection_mode = auth

## Force introspection even if tokeninfo contains wanted fields
## Set this to yes if you are using active_attribute
# force_introspection = no

## Validation key dictionary, turns on local validation
# local_validation_key_dict =

## A space separated list of scopes of validity (optional)
# scope = something

## username attribute in response (default: email)
# username_attribute = email

## username normalization format (default: %Lu)
# username_format = %Lu

## Attribute name for checking whether account is disabled (optional)
# active_attribute =

## Expected value in active_attribute (empty = require present, but anything goes)
# active_value =

## Expected issuer(s) for the token (space separated list)
# issuers =


## URL to RFC 7628 OpenID Provider Configuration Information schema
# openid_configuration_url =

## Extra fields to set in passdb response (in passdb static style)
# pass_attrs =

## Timeout in milliseconds
# timeout_msecs = 0

## Enable debug logging
# debug = no

## Max parallel connections (how many simultaneous connections to open, increase this to
## increase performance)
# max_parallel_connections = 10

## Max pipelined requests (how many requests to send per connection, requires server-side support)
# max_pipelined_requests = 1

## HTTP request raw log directory
# rawlog_dir = /tmp/oauth2

## TLS settings
# tls_ca_cert_file = /path/to/ca-certificates.txt
# tls_ca_cert_dir = /path/to/certs/
# tls_cert_file = /path/to/client/cert
# tls_key_file = /path/to/client/key
# tls_cipher_suite = HIGH:!SSLv2
# tls_allow_invalid_cert = FALSE