Replies: 11 comments
-
@OlegChuev thanks for the details. May I ask few more details and a way to try out.
|
Beta Was this translation helpful? Give feedback.
-
hey @harikrishna-patnala, thank you for the quick response!
|
Beta Was this translation helpful? Give feedback.
-
Is this considered a blocker cc @Pearl1594 @DaanHoogland ? @OlegChuev our QA server uses https://mocksaml.com/ for testing purposes, is that good enough or should we look at keycloak or some other IdP server? What IdP server are you using? |
Beta Was this translation helpful? Give feedback.
-
@rg9975 It looks like you are using SAML, as you are the author of #10311 |
Beta Was this translation helpful? Give feedback.
-
@rohityadavcloud @OlegChuev
can you re-test ? for your information, below are configurations on qa cloud |
Beta Was this translation helpful? Give feedback.
-
We have not rev'd to 4.19.2 yet. |
Beta Was this translation helpful? Give feedback.
-
My application functions as the IdP server, there’s no external service involved — only the application itself. I believe mocksaml should be more than sufficient in this case |
Beta Was this translation helpful? Give feedback.
-
I’ve tested with both |
Beta Was this translation helpful? Give feedback.
-
however, we cannot remove has the nginx config updated recently ? especially settings for cookie |
Beta Was this translation helpful? Give feedback.
-
@weizhouapache I can confirm that neither the Nginx configs nor the network configuration have changed. We’ve temporarily rolled back to the previous working version (4.19.1.1) Let’s keep this issue open in case anyone else runs into the same problem |
Beta Was this translation helpful? Give feedback.
-
@OlegChuev the behaviour had been changed because of sec issues but then some regressions were introduced. 4.19.2 already had a fix but obviously not for your issue. 4.19.3 and 4.20.1 contain #10311 which might address your issue. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
problem
My application serves as a SAML Identity Provider (IdP) and reverse proxy for accessing the ACS.
After the recent update to version 4.19.2, the SAML integration has stopped working correctly — authorization now fails with a
401 Unauthorized
response (please refer to the attached videos)Flow Overview:
/cloudstack/client/
):/saml/auth
on the app, passing aSAMLRequest
.SAMLRequest
:SAMLRequest
.The change introduced in PR #10047, particularly this line:
…seems to break the flow by setting the
HttpOnly
flag on thesessionkey
cookie.As a result, the
sessionkey
is no longer accessible to the frontend JavaScript (ui/src/api/index.js), which expects to be able to read it (as far as I understood at least).This appears to conflict with an earlier change made in this commit, where it looks like the frontend relies on accessing the
sessionKey
via JSBehavior with
HttpOnly
header:4.19.2_with_header.mov
Behavior without
HttpOnly
header:4.19.2_without_header.mov
I also have tried tweaking
api.sessionkey.check.locations
andapi.sessionkey.cookie.samesite
, but none of the options helped. I also attached an example of my SAML settings, perhaps that might help.I’d really appreciate your thoughts on what might be the most suitable solution in this case.
versions
4.19.2.0
The steps to reproduce the bug
Actual result: 401 unauthorized
Expected result: user is authorized as expected
What to do about it?
I tried removing the
HttpOnly
flag fromresp.addHeader(...)
, and it seems to resolve the issue.To be honest, I’m not entirely sure how to approach this properly since I'm not really familiar with java and ACS logic
Beta Was this translation helpful? Give feedback.
All reactions