You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have configured my AWS account and roles for SAML SSO, configuring the identity provider to be another AWS account. For more info on setting this up see here.
When running with saml_provider = browser, aws-runas is failing with the message illegal base64 data at input byte xxxx.
I have tackled down the issue and found that the issue is in the section where aws-runas is listening to browser events looking for the return of a SAMLResponse=xxxx.
The case is when dealing with the SAML identity provider is AWS itself. The SAML response is bit different and that's why base64 decoding is failing.
The text was updated successfully, but these errors were encountered:
The issue is that the POST request that contains the SAMLResponse=xxxx has other attributes such as RelayState=xxxx. All this data is included when trying the base64 decoding.
The decoding then fails due to the presence of & character.
I have configured my AWS account and roles for SAML SSO, configuring the identity provider to be another AWS account. For more info on setting this up see here.
When running with
saml_provider = browser
,aws-runas
is failing with the messageillegal base64 data at input byte xxxx
.I have tackled down the issue and found that the issue is in the section where
aws-runas
is listening to browser events looking for the return of aSAMLResponse=xxxx
.The case is when dealing with the SAML identity provider is AWS itself. The SAML response is bit different and that's why
base64
decoding is failing.The text was updated successfully, but these errors were encountered: