-
Notifications
You must be signed in to change notification settings - Fork 75
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
- Loading branch information
Showing
1 changed file
with
226 additions
and
6 deletions.
There are no files selected for viewing
232 changes: 226 additions & 6 deletions
232
...cript-catalog/person_authentication/super-gluu-external-authenticator/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,12 +1,232 @@ | ||
|
||
## This content is in progress | ||
[Super Gluu](supergluu.md) is a push-notification two-factor authentication (2FA) mobile app built to work with the Janssen Server. | ||
|
||
The Janssen Project documentation is currently in development. Topic pages are being created in order of broadest relevance, and this page is coming in the near future. | ||
### Janssen Server's FIDO U2F endpoint | ||
Super Gluu uses public-key encryption as specified in the [FIDO U2F authentication standard](https://fidoalliance.org/specifications/overview/). Upon device enrollment, Super Gluu registers its public key against the Janssen Server's FIDO U2F endpoint. When authentication happens, there is a challenge response to ensure that the device has the corresponding private key. | ||
|
||
## Have questions in the meantime? | ||
The URI to invoke registeration and authentication of Super Gluu credentials in the Janssen Auth Server can be found at `https://<my.jans.server>/.well-known/fido-configuration` | ||
|
||
### User and Developer Guides | ||
User and Developer Guides can be found on the [Super Gluu docs site](https://gluu.org/docs/supergluu). | ||
|
||
### Prerequisites | ||
- An Internet accessible (non-internal or localhost) Janssen Server with DNS pointing at the public Internet address of the server | ||
|
||
- [Super Gluu interception script](https://github.com/JanssenProject/jans/blob/main/docs/script-catalog/person_authentication/super-gluu-external-authenticator/SuperGluuExternalAuthenticator.py) (included in the default Janssen Server distribution) | ||
|
||
- An Android or iOS device with Super Gluu installed | ||
- [Super Gluu for iOS](https://itunes.apple.com/us/app/super-gluu/id1093479646?mt=8) | ||
- [Super Gluu for Android](https://play.google.com/store/apps/details?id=gluu.org.super.gluu) | ||
|
||
- If the Jannsen Server is using a self-signed certificate, `Trust All` **must** be enabled in Super Gluu (open the app, navigate to `Menu` > `Trust all (SSL)` and enable) | ||
|
||
!!! Note | ||
The Janssen Server and Super Gluu can work in the same network, without a DNS server hostname and with a self-signed certificate. There is only one limitation: both components should belong to the same network. Instead of assigning a hostname during Janssen Server installation, an IP address can be specified. In the Super Gluu mobile app, enable `Trust all (SSL)`. | ||
|
||
### Authentication Workflows | ||
The authentication workflow for Super Gluu is defined in the [Super Gluu interception script](https://github.com/JanssenProject/jans/blob/main/docs/script-catalog/person_authentication/super-gluu-external-authenticator/SuperGluuExternalAuthenticator.py) (included in the default Janssen Server distribution). | ||
### A. Default Two step flow: | ||
#### Enrollment: | ||
By default, users are put through a two-step, two-factor authentication process with username and password first, and then push notification via Super Gluu second. | ||
```mermaid | ||
sequenceDiagram | ||
title SuperGluu Flow Enrollment "Two step" | ||
autonumber 1 | ||
participant User | ||
participant Mobile App | ||
participant Browser | ||
participant Notification server | ||
participant Jans AS | ||
User->> Browser: Log in step1 (userid , pwd) | ||
Browser ->>Jans AS: send userid ,pwd | ||
Jans AS->>Browser: validate, present enrollment (QR code) of SG | ||
User->>Mobile App: Scans the QR code | ||
Mobile App->> Mobile App: Enrollment saved on app \n (username, appId, keyHandle, date) | ||
Mobile App->>Jans AS : Enrollment completed, <br/>enrollment data (registrationData, clientData, deviceData ) sent to Jans AS | ||
Jans AS->>Jans AS: Enrollment entry stored in Database | ||
Jans AS->>Browser: Enrollment completed. | ||
``` | ||
##### A. Client data | ||
An example of the contents of client data are as follows: | ||
``` | ||
{ | ||
"typ": "navigator.id.finishEnrollment", | ||
"challenge": "Bkpin2iUSEQrkuSC_wDlPwzLfVwRGxLbySpVm8jwkuk", | ||
"origin": "https://my.jans.server" | ||
} | ||
``` | ||
|
||
##### B. Device data | ||
An example of the contents of client data are as follows: | ||
|
||
``` | ||
{ | ||
"uuid": "BBA72798-9A1C-4866-819F-819C011ED129", | ||
"type": "iPhone", | ||
"platform": "ios", | ||
"name": "ABC’s iPhone", | ||
"os_name": "iOS", | ||
"os_version": "15.4", | ||
"custom_data": null, | ||
"push_token": "8fc4bd31e2ddbc5c5d83e4955cfd36f663ab37b426d0a4ec5c685c3a6335dd2c" | ||
} | ||
``` | ||
The push_token is used by the Notification server. | ||
|
||
##### C. Device data | ||
This data contains following information: counter, status, rp-application, userInum, keyHandle, Public Key, attestation certificates | ||
|
||
#### Authentication: | ||
```mermaid | ||
sequenceDiagram | ||
title Super Gluu Authentication flow "Two step" | ||
autonumber 1 | ||
User->>Browser: Login | ||
Browser->>Jans AS: username and pwd | ||
Jans AS->>Jans AS: Authenticate | ||
Jans AS->>Notification server:call push API, use push token from device entry | ||
Notification server->>Mobile App: Sends push to mobile device | ||
Jans AS->>Browser: Present option of authenticating with QR code | ||
User->>Mobile App: Approve / Reject Push | ||
Mobile App->>Jans AS: Complete (finish) authentication process, send push_token for storing in Device entry of Gluu server | ||
Jans AS->Jans AS: validate response, If successful, update device entry, | ||
``` | ||
|
||
### B. One step flow | ||
An alternative authentication workflow, password-less authentication, can be configured by adjusting the script property `authentication_mode`. | ||
|
||
```mermaid | ||
sequenceDiagram | ||
title SuperGluu Flow Enrollment "One step" | ||
autonumber 1 | ||
participant User | ||
participant Mobile App | ||
participant Browser | ||
participant Notification server | ||
participant Jans AS | ||
User->> Browser: RP page which invokes /authorize call | ||
Jans AS->>Browser: validate, present enrollment (QR code) of SG | ||
User->>Mobile App: Scans the QR code | ||
Mobile App->> Mobile App: Enrollment saved on app \n ( appId, keyHandle, date) | ||
Mobile App->>Jans AS : Enrollment completed, <br/>enrollment data (registrationData, clientData, deviceData ) sent to Jans AS | ||
Jans AS->>Jans AS: Enrollment entry stored temp entry in database under ou=registered_devices | ||
Jans AS->>Browser: Prompt user to login page, to attach the enrollment to a user | ||
Browser->>Jans AS: send user creds | ||
Jans AS->>Jans AS: create enrollment entry attached to the user and delete temp entry under ou=registered_device | ||
Jans AS->>Browser: enrollment completed | ||
``` | ||
```mermaid | ||
sequenceDiagram | ||
title Super Gluu Authentication flow "One step" | ||
autonumber 1 | ||
participant User | ||
participant Mobile App | ||
participant Browser | ||
Browser->>Jans AS: /authorize request | ||
Jans AS->>Browser: Present QR code for scanning | ||
Mobile App->>Browser: Code is scanned | ||
User->>Mobile App: Approve / Reject | ||
Mobile App->> Jans AS:Send authentication request | ||
Jans AS->> Jans AS: no username, search by keyhandle | ||
Jans AS->> Jans AS: verify Super Gluu credentials, If successful, update device entry | ||
Jans AS->>Browser: Authentication completed | ||
``` | ||
|
||
### Custom script Properties | ||
The Super Gluu authentication script has the following properties: | ||
|
||
| Property | Description | Example | | ||
|-----------------------|-------------------------------|---------------| | ||
|authentication_mode |Determine factor of authentication - `two_step` or `one_step`|two_step | | ||
|credentials_file |JSON file for SuperGluu |/etc/certs/super_gluu_creds.json| | ||
|label |The name of the application | Super Gluu| | ||
|notification_service_mode | Service used to enable push notifications | gluu| | ||
|qr_options| Size of the QR code that is used for enrollment and/or authentication|{ size: 500, mSize: 0.05 }| | ||
|registration_uri | Registration endpoint of the IDP| https://idp.example.com/identity/register| | ||
|supergluu_android_download_url| Android app download link, used in the login page | https://play.google.com/store/apps/details?id=gluu.super.gluu| | ||
|supergluu_ios_download_url| iOS app download link, used in the login page | https://itunes.apple.com/us/app/super-gluu/id1093479646| | ||
|
||
|
||
### Notes for administrator: | ||
#### A. Configure `/etc/certs/super_gluu_creds.json`: | ||
for each Android and apple app: | ||
* a. GCM API key **OR** | ||
* b. SNS platform_arn **OR** | ||
* c. Access key / Secret key of oxNotify server (which hides the creds of GCM or SNS) | ||
|
||
#### B. Notification server: | ||
Configure `accessKeyId` and `secretAccessKey` which allows access to SNS services / GCM services - `/etc/gluu/conf/oxnotify-access.json` | ||
|
||
|
||
### Enable Sign-in with Super-Gluu Authentication script | ||
Using the OpenID Connect acr_values parameter, web and mobile clients can request any enabled authentication mechanism. To enable Super Gluu as an authentication method, follow the steps below: | ||
|
||
1. Obtain the json contents of `super_gluu` custom script by using a jans-cli command like `get-config-scripts-by-type`, `get-config-scripts-by-inum` etc. | ||
|
||
e.g : `/opt/jans/jans-cli/config-cli.py --operation-id get-config-scripts-by-type --url-suffix type:PERSON_AUTHENTICATION `, `/opt/jans/jans-cli/config-cli.py --operation-id get-config-scripts-by-inum --url-suffix inum:6122281b-b55d-4dd0-8115-b098eeeee2b7` | ||
|
||
2. Update the custom script and change the enabled attribute to `true` | ||
Now Sign-in with Super-Gluu is an available authentication mechanism for your Janssen Server. This means that, using OpenID Connect acr_values, applications can now request Super-Gluu authentication for users. | ||
|
||
!!! Note To make sure `super_gluu` has been enabled successfully, you can check your Janssen's Auth Server OpenID Connect configuration by navigating to the following URL: https://<hostname>/.well-known/openid-configuration. Find "acr_values_supported": and you should see "super_gluu". | ||
|
||
### Make Sign-in with Super-Gluu Script as default authentication script: | ||
|
||
Use this [link](https://github.com/JanssenProject/jans-cli/blob/main/docs/cli/cli-default-authentication-method.md) as a reference. | ||
|
||
Steps: | ||
1. Create a file say `sg-auth-default.json` with the following contents | ||
``` | ||
{ | ||
"defaultAcr": "super_gluu" | ||
} | ||
``` | ||
2.Update the default authentication method to super_gluu | ||
``` | ||
/opt/jans/jans-cli/config-cli.py --operation-id put-acrs --data /tmp/sg-auth-default.json | ||
``` | ||
|
||
### Test the feature | ||
To test, enter the complete URL for authorization in a browser or create a simple webpage with a link that simulates the user sign-in attempt. If the server is configured properly, the first page for the selected authentication method will be displayed to the user. | ||
|
||
An example of a complete URL looks like this - | ||
``` | ||
https://<your.jans.server>/jans-auth/authorize.htm?response_type=code&redirect_uri=https://<your.jans.server>/admin&client_id=<replace_with_inum_client_id>&scope=openid+profile+email+user_name&state=faad2cdjfdddjfkdf&nonce=dajdffdfsdcfff | ||
``` | ||
|
||
### Customizations to Super Gluu Login Pages | ||
|
||
The Gluu Server includes a [default public-facing pages for Super Gluu ](https://github.com/JanssenProject/jans/blob/main/jans-auth-server/server/src/main/webapp/auth/super-gluu/login.xhtml) for enrollment and authentication. | ||
|
||
To customize the look and feel of the pages, follow the [customization guide](https://github.com/JanssenProject/jans/blob/main/docs/admin/developer/customization/customize-web-pages.md). | ||
|
||
### Self-service | ||
To offer end-users a portal where they can manage their own account security preferences, including two-factor authentication credentials like Super Gluu, check out our new app, [Gluu Casa](https://casa.gluu.org). | ||
|
||
### Manual Device Management | ||
![image](https://user-images.githubusercontent.com/12072533/207616512-d4486a9d-f4cf-4d56-9256-d558e2ab567f.png) | ||
|
||
A user's Super Gluu device(s) can be removed by a Janssen administrator by directly locating the user entry in LDAP. For example, let's say user `abc` loses their device and wants to enroll a new device to use Super Gluu. | ||
|
||
1. Find the `DN` of the user in LDAP | ||
|
||
1. Find the `jansId DN` associated with the user | ||
|
||
1. Remove the `jansId DN` | ||
|
||
Now the old device is gone and the user can enroll a new device | ||
|
||
### Device management using SCIM | ||
See the [SCIM documentation](...) for a discussion on how to manage FIDO devices, including Super Gluu, using the SCIM protocol. | ||
|
||
While this documentation is in progress, you can ask questions through [GitHub Discussions](https://github.com/JanssenProject/jans/discussion) or the [community chat on Gitter](https://gitter.im/JanssenProject/Lobby). Any questions you have will help determine what information our documentation should cover. | ||
|
||
## Want to contribute? | ||
|
||
If you have content you'd like to contribute to this page in the meantime, you can get started with our [Contribution guide](https://docs.jans.io/head/CONTRIBUTING/). |