-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSO SAML authentication fails with unexpected response payload content coming from AzureAD #87
Comments
Is this an issue with AzureAD? As of today we're getting the same error. Here's the debug output:
|
Yes, AzureAD appears to have changed its request/response content during negotiation. We are looking into it. |
There's a couple of things that are going to hinder me from providing any triage for this:
For the above reasons, I can't be much help here. I need to rely on the people integrating runas with Azure to do some troubleshooting and making PRs to help resolve issues when using Azure AD. |
@mmmorris1975 An AzureAD security policy had changed that in turn changed the flow interaction with MS IDP and its authentication process. This is what caused the breakage, in short. We have hacked a temporary fix that is indeed peculiar to our company's AzureAD security policy environment. What is needed is a more design patterned approach in the AzureAD SAML client area that allows for easy additions and removals of flow element requests, responses, parsing and their associated processing. Patterns of interest likely include encapsulated strategy, chain-of-responsibility, parsers, and factories to decouple flow item state transitions from processing per element, driven by an overall flow, not hard-coded flow and processing as it is now. We realize it was a quick hack to get saml/sso working initially, but maintenance effort needs to be reduced over the long haul. |
In ~/.aws/config. (credentials is empty) and no tainting env variables (reset and clear)
Authentication to AzureAD fails at some during processing and presents the following error message
We get the same response regardless of whether we use v3.1.x, 3.2.0, or 3.4.0. Suggests some SAML assertion or response content as changed in an unexpected way that prevent appropriate login/authentication processing. This problem is widespread across many teams encountered the same error.
The text was updated successfully, but these errors were encountered: