Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test Shibboleth #40

Closed
libdgg opened this issue Aug 24, 2020 · 11 comments
Closed

Test Shibboleth #40

libdgg opened this issue Aug 24, 2020 · 11 comments
Assignees
Labels
core systems Flag work for the core systems team infrastructure integrations

Comments

@libdgg
Copy link

libdgg commented Aug 24, 2020

No description provided.

@libdgg libdgg added the core systems Flag work for the core systems team label Aug 24, 2020
@libdgg libdgg added this to the Week 2 Ending 9/4/20 milestone Aug 24, 2020
@libdgg libdgg changed the title Submit Shibboleth IdM Request Test Shibboleth Sep 4, 2020
@libdgg
Copy link
Author

libdgg commented Oct 26, 2020

@lovinscari Needs dependencies added. Needs acceptance criteria. Then move into queued. Do you have any questions or concerns with these next steps?

@AGCooper AGCooper assigned SolomonHD and unassigned libah Nov 5, 2020
@lovinscari
Copy link

@SolomonHD to update ticket with what is missing and/or what is expected. Possibly this is something @devanshu-m can help with.

@SolomonHD
Copy link

SolomonHD commented Nov 9, 2020

Currently we're getting this error when trying to login:

E, [2020-11-09T15:16:11.413078 #21] ERROR -- : (saml) Authentication failure! invalid_ticket: OmniAuth::Strategies::SAML::ValidationError, SAML response missing 'urn:oid:2.5.4.5' attribute

I was also getting this error when trying to use the netid urn.

Right now the SAML response is encrypted so we can't see exactly what we're getting back from the IDP. I plan on sending another metadata to Gerry with encryption disabled, then I'll be able to get a look at exactly what we're getting from the IDP

@SolomonHD
Copy link

I've submitted another ticket for changing the metadata to an unencrypted state: INC03492530

@rotated8
Copy link
Member

I've bumped the estimate up on this to a 13 because two people are working on it.

@SolomonHD and @devanshu-m will continue working on this ticket for today, and if they can't make progress, we'll open two new tickets (one for installing the shibboleth sp in the avalon docker, and one for switching to the omniauth-shibboleth gem).

@devanshu-m
Copy link

devanshu-m commented Nov 12, 2020

After commenting out the uid attribute bit, we could see a better log of the request and omniuath hash. Like we suspected, the urn for uid is missing in the saml response. We do get a provider back which is set correctly to saml, but the uid we get back is a long string which is difficult to decrypt. POA is to see if we can get Gerry to talk to us and show him the logged response we are getting back and if he can guide us in the right direction. It is likely that the response we get from saml/shib is the issue, but I could be wrong and that the issue might be in the request that the app is sending.

@devanshu-m
Copy link

New ticket with Gerry to look into issues with the response we are getting and missing attributes: INC03494888

@devanshu-m
Copy link

@SolomonHD informed me that Gerry is now releasing the attrs correctly; and I can finally see those attrs in the log. Needs a little more tweaking before we can successfully login. Working on that now.

@SolomonHD
Copy link

We were able to login, but we're still having issues with the IsMemberOf attribute. We are only getting on value of this array back. It's due to a setting in ruby saml that by default only returns first element of array. Will work on Monday to get whole array.

@devanshu-m
Copy link

Alex tested his login which was successful.

We need to work on better error handling at some point after user groups ticket is done.

@libdgg
Copy link
Author

libdgg commented Nov 19, 2020

NOTE: per the standup 11/19/2020 it seems that we should use LDAP groups as an approach for the future. Also OmniAuth SAML is not recommended because OmniAuth Sibboleth is a more specific solution that exists.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
core systems Flag work for the core systems team infrastructure integrations
Projects
None yet
Development

No branches or pull requests

7 participants