-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possibly allow unspecified InResponseTo SAML attribute #1479
Comments
Note that there was some discussion re: using an existing SAML library instead of our handcrafted code in #1295. That said, I've been using Dex with Okta successfully -- The only scenario where it's lacking the |
No, I'm not using IdP. :-) What I'm seeing here is somewhat strange. We have multiple unrelated services sharing a common Okta auth. If I login to some other service and then use the Dex enabled one, the However, if I try to login to the Dex enabled service first (without valid Okta session state in the browser), then everything appears to work the same, apart from |
Sounds like something you could ask okta's support about... :thinking_face: Also, I think on the long run, we'd all be better off to use oidc with okta. Have you tried that? Okta supports that but I don't know if our connector has feature parity. It could be a much better solution in theory, since oidc could do refresh tokens... Our oidc connector doesn't yet, though, I think there's WIP for that. |
So, the problem with a missing I think figuring out the connector that way would also allow for IdP-initated login for SAML. Wouldn't be a bad feature, I guess 😄 |
❌ I was wrong. We use the Lines 402 to 406 in 421c26f
|
In our tests |
InResponseTo
attribute is defined as "optional" in the SAML spec. Indeed, other SAML libraries usually allow for "less strict" mode of operation, whereuponInResponseTo
is only validated when it is actually present in the message, but is allowed not to be (because "optional").I'm dealing with an Okta setup which appears not to include the
InResponseTo
attribute in its SAML response. This works with some SAML libraries, but not with Dex, because Dex always expects this attribute to be present.Related to #869.
The text was updated successfully, but these errors were encountered: