-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTPS Redirect Issue while SSO Url is embedded in iFrame #406
Comments
@robotdan , @jerryhopper .. I've raised a bug as suggested, to identify the source of this issue and if there can be any suggested workarounds to immediately get this working. I've tried upgrading requests by setting Content Security Policy and also as mentioned nginx conf..Both only work on chrome and firefox of desktops. Safari and other iOS devices have problem loading the page in all browsers. Could you please help me with this issue. |
Ensure your proxy is adding the appropriate X-Forwarded-Proto header. |
@robotdan ..yes that is added in already, coz when we remove that we get a notification on the fusion auth admin portal. |
|
These seems likely an issue with your proxy configuration. I am not an nginx expert, but if you post your config I may be able to review it. |
Will send it out as soon as I get the info from the Devops team Dan. Thanks a ton |
I had the exact same issue. @prasanna10021991 's suggested solution to add
solved the problem for me. So apparently the X-Forwarded-Proto header which resolves other redirect issues was not enough for this particular function, which seems kind of strange. |
@robotdan ..Is this something we're missing on our end in nginx configurations, or something's getting missed out during the communication with FusionAuth as the urls being sent out become http instead of https. |
@prasanna10021991 When we build a redirect URI we prefer the value provided in the I don't know a lot about NGINX proxy config, perhaps they don't always add the |
X-Forwarded- headers aren't working at all for me with nginx. And I've confirmed with wireshark that nginx is really adding them. I see these headers and broken redirect when I do curl https://login.mydomain.com: tshark -V -i lo port 9011 | egrep 'X|ocation:|Host:' |
The workaround for me in nginx is these two lines: This doesn't actually fix FusionAuth, it just makes nginx rewrite the broken Location header from FusionAuth. |
Please re-open if you believe there is still a bug in FusionAuth causing this issue. |
The FusionAuth SSO server returning an HTTP response instead of an HTTPS response during a SAML request
Description
Fusion auth is giving me the response in http for the SAML request even though my request was
This causes the page which authenticates using the SAML request to be blocked as the browser identifies it as a page loading mixed content.
The nginx server on which the fusionauth app is hosted, returns proper 301 redirects with http requests upgraded to https but only fails on this fusionAuth authorize requests.
Upon enforcing a nginx conf change to redirect all http to https, the issue is temporarily handled in few browsers like chrome and firefox, but still fails in safari and ios versions of chrome and safari.
There is something odd that is happening with these versions of browsers as the SAML request keeps getting repeated in a loop and never stops thereby not loading the page in this instance too.
Steps to reproduce
Steps to reproduce the behavior:
Expected behavior
Response from FusionAuth server to be https url instead of http url
Platform
Screenshots
The text was updated successfully, but these errors were encountered: