-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot open default log in page if SAML authentication is enabled #25257
Comments
Pinging @elastic/kibana-security |
Just to give more context on what's going on here:
Whenever user tries to access The only workaround for that right now is to get rid of this cookie either by logging out or opening Kibana in a private tab. To fix this we should stop relying on the presence of the cookie only and rather check if we can get current user using it (e.g. via calling |
Hello, Is there any ETA on a fix for this, as having an alternate auth mechanism to Azure is a requirement in our environment for support / operations reasons. |
@MrBones757 No ETA yet, but it's on my short list. Don't workarounds mentioned above work for you or it's just that it's cumbersome (either private tab, or go to |
We're rolling this tool out more broadly across the organisation to both technical and non technical users - so a workaround in this case is fine for the more technical team/s but may not be in the other case. As far as the workaround goes though - I can't seem to be presented with the kibana basic auth login when SAML is enabled - regardless fo which URL i go to (/login, /logout etc) it always reditects to SSO. is there a particular URL that should be used for basic auth? |
I see. SAML/OIDC/Kerberos (any SSO basically) support in Kibana is designed to be the primary/sole authentication method for users of that Kibana instance. And we assumed that in SSO case alternative basic auth would mostly be used by admins and more technical people in general and hence they will be fine using
I explained what happens in your case here #25257 (comment): if you have
|
Fixed in #53010 and will be available since 7.7.0. |
Kibana version: 6.4.2
Elasticsearch version: 6.4.2
Server OS version: Ubuntu 14.04 (Cloud)
Browser version: Chrome 70.0.3538.77, Safari 12.0 (14606.1.36.1.9), Opera 55.0.2994.61
Browser OS version: macOs Mojave 10.14
Original install method (e.g. download page, yum, from source, etc.): Cloud
Describe the bug:
Kibana is configured to support both authentication methods: SAML and basic
always redirects to SAML IDP even if a user explicitly goes to
/login
page.Steps to reproduce:
/login
. It displays log in page./
. It redirects to SAML IDP/login
. It redirects to SAML IDPExpected behavior:
The
/login
should always display login page.Any additional context:
It looks like the browser caches login request which redirects to IDP and then just reuse it.
The text was updated successfully, but these errors were encountered: