Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Do not set a NameID format in Policy by default #44090

Merged
merged 4 commits into from
Jul 9, 2019

Conversation

jkakavas
Copy link
Member

@jkakavas jkakavas commented Jul 8, 2019

This commit changes the behavior of our SAML realm to not set a
Format element in the NameIDPolicy of a SAML Authentication
request if one has not been explicitly configured by the user
with nameid_format. We select to not include a format, rather
than setting it to
urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified which would
have the same effect, in order to maximize interoperability with
IdP implementations. AllowCreate is not removed as this has a
default value (false) in the specification.

Relates: #40353

This commit changes the behavior of our SAML realm to not set a
Format element in the NameIDPolicy of a SAML Authentication
request if one has not been explicitly configured by the user
with `nameid_format`. We select to not include a format, rather
than setting it to
`urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified` which would
have the same effect, in order to maximize interoperability with
IdP implementations. `AllowCreate` is not removed as this has a
default value (false) in the specification.

Relates: elastic#40353
@jkakavas jkakavas added >breaking :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) v8.0.0 labels Jul 8, 2019
@jkakavas jkakavas requested a review from tvernum July 8, 2019 21:20
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security

Copy link
Contributor

@tvernum tvernum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@jkakavas jkakavas merged commit 6ec2647 into elastic:master Jul 9, 2019
jkakavas added a commit to jkakavas/elasticsearch that referenced this pull request Sep 15, 2021
We changed the default for `nameid_format` in 8.0 in elastic#44090 but
did not add anything to the breaking changes in the release notes.
This change amends that.
masseyke added a commit that referenced this pull request Sep 15, 2021
In 8.0 the behavior of an unset saml nameid_format setting. This commit adds a check to the deprecation
info API that warns users of this change, if they are using saml without nameid_format being set.
Relates #42404 #44090
lockewritesdocs pushed a commit that referenced this pull request Oct 19, 2021
* Add note in breaking changes for nameid_format

We changed the default for `nameid_format` in 8.0 in #44090 but
did not add anything to the breaking changes in the release notes.
This change amends that.

* remove reference to settings

* Fix docs build

* Accepting most of James' suggested changes

Thanks James!

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>

* Incorporating changes from Ioannis

* Apply suggestions from code review

Co-authored-by: Tim Vernum <tim@adjective.org>

* Apply suggestions from code review

Co-authored-by: Ioannis Kakavas <ikakavas@protonmail.com>

Co-authored-by: James Rodewig <40268737+jrodewig@users.noreply.github.com>
Co-authored-by: Adam Locke <adam.locke@elastic.co>
Co-authored-by: Tim Vernum <tim@adjective.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>breaking :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) v8.0.0-alpha1
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants