Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add an Identity Provider for SAML #7

Closed
lonelycode opened this issue May 2, 2017 · 10 comments · Fixed by #103
Closed

Add an Identity Provider for SAML #7

lonelycode opened this issue May 2, 2017 · 10 comments · Fixed by #103

Comments

@lonelycode
Copy link
Member

TIB should be able to validate SAML authentication to provide access to things such as the Portal and the Dashboard

@lonelycode lonelycode added this to the v0.2 milestone May 2, 2017
@nickReyn
Copy link

nickReyn commented Mar 16, 2018

+1 from client - they really need this to be able to stop using Middleware

@asoorm
Copy link
Member

asoorm commented Nov 23, 2018

+1 from client

@egathura
Copy link

looking forward to developments on this

@chchisholm
Copy link

+1 on this guys - SAML is very basic and most companies still use it. It seems to be a pretty big gap compared to other products like 3scale etc which all support SAML.

@buger
Copy link
Member

buger commented Sep 13, 2019

Some useful feedback from one of our users

We have an existing, in-house identity provider (IdP) that we use for SAML SSO for multiple applications. Here are some thoughts about what we would like to see from Tyk for a SAML/SSO integration:

· SAML response from the IdP would include a few common attributes, like:
o Username/user ID.
o First and last name.
o List of groups user is a member of.
· Tyk would take a SAML response from our IdP and autocreate an SSO user if it does not exist, or update the user if it does. Manual user creation by an admin should not be required.
· An administrator should be able to configure mappings between groups in an SSO response and permissions in the application. For example, if a user is in group "web dev team" in SAML response, this would automatically map their Tyk user to have "api creator" user group in Tyk Dashboard.
· Audit detail for configuration changes in the application (e.g. creating a new API) would show the user that made the change.
· We should be able to allow/configure fallback login with a local (non-SSO) accounts, for administrators.
· We prefer POST based SAML (as opposed to REDIRECT).
· SAML based logout is a nice to have but not very important.
· SP-initiated login seems most practical here, though we do have apps with just IdP-initiated login or apps with both.

@devsergiy
Copy link

The most promising library to add SAML support:
https://github.com/crewjam/saml

  • it is in the active state
  • supports both redirect and post bindings
  • have good documentation and samples

For testing purposes, we could use https://samltest.id/

There are not so many saml libs, most of them in abandoned state:
https://github.com/russellhaering/gosaml2 - last commit 1 year ago
https://github.com/edaniels/go-saml - fork of crewjam implementation, last commit 3 years ago
https://github.com/mattbaird/gosaml - last commit 4 years ago
https://github.com/RobotsAndPencils/go-saml - based on mattbaird implementation, last commit 3 years ago

@chchisholm
Copy link

chchisholm commented Dec 2, 2019 via email

@stale
Copy link

stale bot commented Mar 18, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs, please comment if you would like this issue to remain open. Thank you for your contributions.

@stale stale bot added the wontfix label Mar 18, 2020
@stale stale bot closed this as completed Apr 1, 2020
@christtyk
Copy link
Contributor

Definitely not stale

@christtyk christtyk reopened this Apr 14, 2020
@stale stale bot removed the wontfix label Apr 14, 2020
@bmonteiro
Copy link
Contributor

bmonteiro commented Apr 20, 2020

I would say that saml2bearer would be good to have and the sso with the portal it is just nice to have.

https://tools.ietf.org/html/draft-ietf-oauth-saml2-bearer-23

Use case: user -> web app-> azure ad (or other) saml-> web app (auth flow code) -> saml2bearer -> Api call with bearer

@letzya

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

9 participants