-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added SAML authentication support, eg for OneLogin or Okta #461
Conversation
show_google_openid=settings.GOOGLE_OAUTH_ENABLED) | ||
|
||
show_google_openid=settings.GOOGLE_OAUTH_ENABLED, | ||
show_saml_login=settings.SAML_LOGIN_ENABLED) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You set this flag, but I don't see you're using it. Not implemented yet, or just a missing file in the pull request?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good point. I didn't include the section in login.html to redirect to the saml login page. I've just updated the PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
Thanks, this is really great and appreciated! I have a few comments, but should be good to merge soon. |
Added SAML authentication support, eg for OneLogin or Okta
Merged. Thanks! |
Added SAML authentication support, eg for OneLogin or Okta
According to their website (https://www.pycrypto.org) it's no longer maintained. There are some critical vulnerabilities that aren't going to be addressed. Looking at the history of this change it was introduced 7 years ago as part of getredash#461 and hasn’t been touched since then. I can’t see where it’s being used in that PR, nor can I see where it’s being used in the original gist where the author of the PR got the example code from. Avoids CVE-2013-7459
This is not related to the Pull Request directly, but I assume that the author or followers might have SAML enabled for their deployment and should be aware of the following Security Advisory: #5961. This affects all Redash versions and should be patched immediately. |
I've added SAML support as an alternative to Google Apps authentication, eg for OneLogin or Okta.
It adds the REDASH_SAML_METADATA_URL config value which needs to point to the SAML provider metadata url, eg https://app.onelogin.com/saml/metadata/
And an optional REDASH_SAML_CALLBACK_SERVER_NAME which contains the server name of the redash server for the callbacks from the SAML provider (eg demo.redash.io)
On the SAML provider side, example configuration for OneLogin is:
SAML Consumer URL: http://demo.redash.io/saml/login
SAML Audience: http://demo.redash.io/saml/callback
SAML Recipient: http://demo.redash.io/saml/callback
with parameters FirstName and LastName, both configured to be included in the SAML assertion.