Skip to content

Automated install of Gucamole with options for HTTPS reverse proxy, Active Directory integration, MFA, LetsEncrypt, dark theme, MySQL backup, email alerts & more.

License

Notifications You must be signed in to change notification settings

itiligent/Easy-Guacamole-Installer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🥑 Easy Guacamole Installer

Introduction

This project allows you to easily set up a Guacamole jump-host with optional TLS reverse proxy (self-signed or Let's Encrypt), Active Directory integration, multi-factor authentication, Quick Connect & History Recording Storage UI enhancements, a custom UI dark themed template, auto database backup, email alerts and internal hardening options including fail2ban for defence against brute force attacks. There are also options for enterprise deployments similar to Amazon's Guacamole Bastion Cluster.

Automatic Installation

🚀 Paste the below link into a terminal & follow the prompts (do NOT run as root, the script will prompt for sudo):

wget https://raw.githubusercontent.com/itiligent/Guacamole-Install/main/1-setup.sh && chmod +x 1-setup.sh && ./1-setup.sh

Prerequisites

🔒 A Compatible OS:

  • Debian: 12.x or 11.x
  • Ubuntu LTS variants: 24.04, 23.04, 22.04
  • Raspbian Buster or Bullseye
  • 1 CPU core + 2GB RAM for every 25 users (plus minimum RAM & disk space for your selected OS).
  • Open TCP ports: 22, 80, and 443 (no other services using 80, 8080 & 443)
  • If selecting either of the TLS reverse proxy options, you must create a PRIVATE DNS record for the internal proxy site, and an additional PUBLIC DNS record if selecting the Let's Encrypt option.
  • Sudo & wget packages installed
  • The user running 1-setup.sh must have sudo permissions

Setup Script Menu

🔧 The main 1-setup.sh script guides the installation with the following steps:

  1. Setup the system hostname & local DNS name (Local DNS must be consistent for TLS proxy).
  2. Select either a local MySQL install or use a pre-existing local or remote MySQL instance.
  3. Pick an authentication extension: DUO, TOTP, LDAP/Active Directory, or none.
  4. Select optional console features: Quick Connect & History Recorded Storage UI integrations.
  5. Select the Guacamole front end: Nginx reverse proxy (HTTP or HTTPS) or use the native Guacamole interface on port 8080.
    • If you opt to install Nginx with self-signed TLS:
      • New server & client browser certificates are saved to $HOME/guac-setup/tls-certs/[date-time]/.
      • Optionally follow on-screen instructions for client certificate import to avoid https browser warnings.

Custom Installation Instructions

⚙️ To customize the many available script options:

  • Exit 1-setup.sh at the first prompt.
  • All configurable script options are shown under Silent setup options at the start of 1-setup.sh.
  • Certain combinations of the Silent setup options will allow for a fully unattended install supporting mass deployment or highly customised docker builds.
  • Re-run your edited script locally after making changes (do not re-run the automatic install web link - see below.

Other custom install notes:

  • Caution: Re-running the auto-installer re-downloads the suite of scripts and this will overwrite all your script edits. You must therefore run 1-setup.sh LOCALLY after editing. If any other child scripts are edited, their corresponding download links in the 1-setup.sh script must also be commented out.
  • Upgrade scripts are automatically customised with your specifc installation settings for consistent future updates. (Re-downloading from the auto install link after install will overwrite all custom settings as above.)
  • Nginx reverse proxy is configured to default to at least TLS 1.2. For ancient systems, see commented sections of the /etc/nginx/nginx.conf file after install.
  • A daily MySQL backup job is automatically configured under the script owner's crontab.
  • The Quick Connect option brings some extra security implications, be aware of potential risks in your environment.

Post-install manual hardening options:

  • add-fail2ban.sh: Adds a lockdown policy for Guacamole to guard against brute force password attacks.
  • add-tls-guac-daemon.sh: Wraps internal traffic between the guac server & guac application in TLS.
  • add-auth-ldap.sh: Template script for simplified Active Directory integration.
  • add-smtp-relay-o365.sh: Template script for email alert integration with MSO65 (BYO app password).

Customise & Brand Your Guacamole Theme

🎨 Follow the theme and branding instructions here. To revert to the default theme, simply delete the branding.jar file from /etc/guacamole/extensions, clear your browser cache and restart.

Managing Self-Signed TLS Certs With Nginx

To renew self-signed certificates or change the reverse proxy local DNS name/IP address:

  • Re-run 4a-install-tls-self-signed-nginx.sh to create a new Nginx certificate (accompanying browser client certificates will also be updated). Always clear your browser cache after changing certificates.

Active Directory Integration

🔑 See here.

For SS0 Extensions (Radius, Base, CAS, OpenID, SAML, Dist)

🔑 See here

Upgrading Guacamole

🌐 To upgrade Guacamole, edit upgrade-guacamole.sh to reflect the latest versions of Guacamole & MySQL connector/J before running. This script will automatically update TOTP, DUO, LDAP, Quick Connect, and History Recorded Storage extensions if present.

High Availability Deployment

  • 👔 For a separate DATABASE layer: Use the install-mysql-backend-only.sh here to install a standalone instance of the Guacamole MySQL database.
  • 👔 For a separate APPLICATION layer: Run 1-setup.sh and point new installations to your separate database instance. Just say no to the "Install MySQL locally" option and any other local reverse proxy install options.
  • 👔 For a separate FRONT END layer: Use the included Nginx installer scripts to build out a separate Nginx front end layer, and then apply your preferred TLS load balancing technique. Alternatively, AWS/Azure/GCP load balancers or HA Proxy may provide superior session persistence & affinity compared to Open Source Nginx.

Script Download Manifest

📦 The autorun link downloads these files into $HOME/guac-setup:

  • 1-setup.sh: The parent setup script.
  • 2-install-guacamole.sh: Guacamole source build & installer script.
  • 3-install-nginx.sh: Nginx installation script.
  • 4a-install-tls-self-signed-nginx.sh: Install/refresh self-signed TLS certificates script.
  • 4b-install-tls-letsencrypt-nginx.sh: Let's Encrypt for Nginx installer script.
  • add-auth-duo.sh: Duo MFA extension install script.
  • add-auth-ldap.sh: Active Directory extension installer template script.
  • add-auth-totp.sh: TOTP MFA extension installer script.
  • add-xtra-quickconnect.sh: Quick Connect console extension installer script.
  • add-xtra-histrecstore.sh: History Recorded Storage extension installer script.
  • add-smtp-relay-o365.sh: Script for O365 SMTP auth relay setup (BYO app password).
  • add-tls-guac-daemon.sh: Wrap internal traffic between guacd server & Guacamole web app in TLS.
  • add-fail2ban.sh: Fail2ban (& Guacamole protection policy) installer script.
  • backup-guacamole.sh: MySQL backup setup script.
  • upgrade-guacamole.sh: Guacamole application, extension, and MySQL connector upgrade script.
  • branding.jar: Base template for customizing Guacamole's UI theme.

😄🥑