Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[RFC] Improved session management #1311

Closed
davidlago opened this issue Jan 31, 2023 · 35 comments
Closed

[RFC] Improved session management #1311

davidlago opened this issue Jan 31, 2023 · 35 comments
Labels
enhancement New feature or request triaged

Comments

@davidlago
Copy link

davidlago commented Jan 31, 2023

What is the problem?

OpenSearch uses cookies for session management. Cookies have a size limit (4Kb). Some extremely large session payloads (think of large SAML assertions) hit this limit and we don't currently have a path forward for those use cases.

Additional problems of the current session management implementation (or feature requests) are captured in the issues below. We should aim to solve for the main problem above, but if in doing so we can kill any of these "birds" with that stone, and they can inform the solution for this one, that would be great. Otherwise, we can tackle those separately:

What options could we consider?

There are may ways to skin this cat, from short term stopgaps to larger overhauls of how we manage sessions in the product.

Filter JWT attributes stored in the cookie

Right now, there are a number of attributes coming from the IdP that we store in the cookie, whether they are needed or not. Providing an allow-list of attributes and storing just these in the cookies will make the 4Kb limit go a longer way.

Use compression

Compressing the cookie payloads could relax the constrain of that 4Kb limit, as text attributes from the session are generally highly compressible (are we doing that today already? if so, disregard this option).

Stitch multiple cookies together

Another relatively low effort fix for this would be to split cookie payloads into several chunks, and stitching them together when we receive them. If we have, say, 4 chunks... would 16Kb be a high enough limit to enable even the most extreme SAML assertions?

Server-side session management

Storing the session in the backend (whether in OpenSearch Dashboards' backend or OpenSearch's), will remove the size limit, and could potentially address some of the shortcomings of using cookies such as sessions carrying over from device to device, or the ability to invalidate sessions from server side, but it adds complexity and potential use cases we need to think about carefully:

Next steps

Let's use this issue to have a discussion of options, trade-offs, and come up with a design for what a new session management strategy should look like.

@davidlago davidlago added enhancement New feature or request untriaged triaged and removed untriaged labels Jan 31, 2023
@expani
Copy link
Contributor

expani commented Feb 3, 2023

My 2 cents.

Server side session management

This seems to be the right direction for a long term fix for limitations like large assertions, excessive roles and opens up the avenue for a lot of other user-behaviour related insights.

In the future different plugins would want to extend this to collect data relevant to their use-case. The design would need to take this into consideration. Time will be a constraint here to solve the pain-point quickly.

JWT Attribute filter

The subject key and roles form the largest portion of the JWT we generate from a SAML Response. These can be filtered to reduce the cookie size.

However, there is a corner case where it can still restrict a user from adopting an approach of having a large number of granular roles for their use-case. This would depend on the existing role hierarchy used by the user.

Stitch multiple cookies together

This could be a viable option in the short term.

The entire storage layer of cookie is currently abstracted using the session_storage interface in Dashboards. A child implementation of the existing cookie storage can be created which handles the breaking and re-creation of one cookie into multiple one's and re-uses the existing logic of cookie management.

  • The storage layer to be used can be made configurable via the security config defaulting to the current one. Thus, it will be non-invasive.
  • RFC 2109 mentions the support of 20 cookies per domain. So, this approach can support most of the use-cases by increasing the number of cookies used for storage.
  • It will also provide enough time to eventually move towards server side session management.

@prabhat-chaturvedi
Copy link

prabhat-chaturvedi commented Feb 4, 2023

IMHO, we should identify that Cookie shall not carry the entire token. Better options are to store in the session storage instead or backend.

Demerits of storing the token in Cookie is that Client has to send this Cookie on each request, and if there are multi-cookie - all the cookies will be sent and impact the throughput of the systems.

For the per the best practices we should decouple this into :

Front-end :
Is just a mechanism to challenge the user to fetch. In case of SAML - facilitates the redirection to IDP.
Front-end should just validate the cookie which was directed by the backend. The cookie is the front-end session management, and technically can have different lifetimes from the backend.

Backend:
1)Security Token Services (STS)
The STS is just a token granting party - internally does a job of Authorization Server and Token Server in the OIDC terminology. Based on the token produced be it SAML, OIDC, Basic, etc., it grants the permission to create a session.
2)Session Management
Can be Cache based, index based or externalised totally. All have their own pros and cons. Ideally can be externalised to something like Redis Cache based approach.

@nibix
Copy link

nibix commented Feb 6, 2023

Regarding "Filter JWT attributes stored in the cookie":

This approach is a bit more complicated as it might sound. The Dashboards plugin would be not able to just filter the JWT attrs, as then the backend would no longer trust these JWTs (due to a wrong signature). To overcome this, some module would need to re-issue JWTs which are trusted by the backend. As this is still just a workaround, I am not sure whether this is worth the effort. Also, as mentioned before, there is the chance that it is actually the roles which blow up the JWT size. So, I don't really think that this approach is suitable.

@davidlago
Copy link
Author

The entire storage layer of cookie is currently abstracted using the session_storage interface in Dashboards. A child implementation of the existing cookie storage can be created which handles the breaking and re-creation of one cookie into multiple one's and re-uses the existing logic of cookie management.

  • The storage layer to be used can be made configurable via the security config defaulting to the current one. Thus, it will be non-invasive.
  • RFC 2109 mentions the support of 20 cookies per domain. So, this approach can support most of the use-cases by increasing the number of cookies used for storage.
  • It will also provide enough time to eventually move towards server side session management.

I like this approach, as the abstraction layer exists already and we can eventually point to what @prabhat-chaturvedi suggests as an externalized storage for sessions (and at that point stop the cutting/stitching).

This is the shortest path to solving the immediate problem while allowing some more time for the larger efforts in Dashboards linked above (some of which might even make things easier to build, like the externalized metadata store).

@prabhat-chaturvedi
Copy link

The externalised storage is the best solution, but we will have similar challenged for the Frontend session management, which is where to store the JWT. If its opaque token which is stored as Key:randomString,Value:JWT, then the frontend can just keep a handle of that randomString which maps to the session identifier.

Otherwise, even when the JWT should be stored in the Frontend, Cookie length issue is must to be solved.
What I pointed above as an immediate alternative was to save the token in the Browser "session storage".

Dashboard frontend, can extract the JWT from the browser session storage was the session is governed by JSESSIONID(or such application managed session cookie) and then populate the JWT in a POST param, header or Cookie which ever best suits the security plugin to validate.

Again emphasising the demerits for using Cookie to store the JWT are:

  1. Cookie is sent on each request making the request bloated
  2. MultiCookie may make the request too heavy, even though there was not much in the request, but the Cookies would have to go to backend.
  3. Cookie has limitations of 4MB, but Session Storage can go upto 10MB or more in some browsers

There were some benefits when the Cookie was relayed directly from Dashboard to Security plugin, but it might just be a big change to make in the exit gate of Dashboard to pull from Session Storage and populate in the ongoing request to plugin.

@peternied
Copy link
Member

Use compression

Seems really cheap and easy to check. While we want to target the end state, this might be able to mitigate the user experience for a couple of impacted clusters while we get there. Has anyone looked into this?

@davidlago
Copy link
Author

davidlago commented Feb 7, 2023

Unless I'm missing something, it does not look like we use cookie compression.

It seems like a reasonable high level estimate of gzip's rate of compression of ASCII text is 1:11 [1]. With the cookie size being limited as per this RFC to 4Kb, that could raise the limit to something like 44Kb of uncompressed ASCII text.

@jimishs, I know you have done some research on use cases around SAML assertions. Do you have a sense for what reasonable upper bound for the cookie size we should consider in this design?

@domruf
Copy link

domruf commented Feb 8, 2023

@nibix regarding "Filter JWT attributes stored in the cookie" the backend trusting the JWT:

At least in my case, the the id_token is the big thing, because it contains all the group memberships.
And AFAIK only the access_token is required for authenticating against the backend. So I think it would help to only store the access_token and not storing the id_token in the cookie.

@nibix
Copy link

nibix commented Feb 10, 2023

@domruf Actually, it is the other way round. The id_token is needed by the OpenSearch backend to determine the user's roles from the group membership and thus their authorization. The access_token, on the other hand, is only meaningful to the OIDC IdP service.

@nibix
Copy link

nibix commented Feb 14, 2023

Besides discussing the workarounds, IMHO, we should also have a closer look at how an actual solution might look like. As a kind of kickoff for a discussion, I have drafted the following document which outlines how such a solution could look like.

Any comments are very appreciated!

Proposal: Architecture for session based login in Dashboards

Goals and basic requirements

  • Compact cookie size. Get rid of issues due to excessive cookie size.
  • "Logout" is capable of destroying the session
  • Usable with any authentication type available for Dashboards (i.e., password based auth, OIDC and SAML)
  • Sessions expire after a certain period of inactivity (i.e., an access to a session extends its time to live). However, there shall be also an absolute maximum time, after which a session gets invalidated.
  • Requires no external dependencies.
  • Should not facilitate DOS attacks by unauthenticated users.
  • Usable with OpenSearch Dashboards 2.x

Non-goals

  • Only meant for authentication at OpenSearch via Dashboards. Clients directly authenticating at OpenSearch won't be affected.
  • In order to keep the scope manageable, this does not yet take any plans for OpenSearch 3 into account.
  • The session feature is only meant for authentication. It shall not provide a flexible session storage or similar functionality.

Open: Goals or non-goals

For these items, it needs to be clarified whether it shall be a goal or not:

  • Shall the old session-less authentication mechanism remain available or shall it be replaced by the new mechanism
  • Related: Is it acceptable that users get logged out when switching to the new mechanism?
  • Shall the existing configuration be re-used or shall it change for session login?
  • Besides the default session storage, shall we provide also support for external storage components such as Redis?
  • What about exotic authentication mechanisms in Dashboards such as proxy auth?

Fundamental design

  • Introduce a new REST API which consumes credentials (user name, password or SAML AuthnResponses or OIDC tokens), validates these, creates a session and returns a session handle. This REST API is provided by the security plugin of the OpenSearch backend. The REST API is used by the Dashboards security plugin to create a session when a user is trying to log in.
  • The session handle is actually a signed JWT. In contrast to the current JWT usage of Dashboards, the JWT shall only contain a session ID. It shall not contain information about roles or user attributes. By using a signed JWT, we can avoid a certain class of DOS attacks of unauthenticated users on the session storage, as we can validate the JWT before hitting the session storage.
  • By default, sessions are stored in a private OpenSearch index. Each session is represented by one document. A session document contains: User name, roles, user attributes, session expiry time.
  • Dashboards saves the session JWT at the client side using a cookie.
  • The Dashboards security plugin reads that cookie, extracts the JWT and sends it along with every request it issues to the OpenSearch backend. It is sent inside a HTTP Authentication: bearer header.
  • The OpenSearch backend has a new authentication module that can check the validity of the JWT based on its signature and the private session store. If the JWT is invalid or the session is expired, the OpenSearch backend issues a 401 response.

Open design decisions

  • Dashboards can generate quite a lot requests during a single page load. Is it okay that every single request triggers an access to the internal session index? Or do we need a kind of cache in front of Open Search? We also need to take into account that using a session is supposed to extend the session lifetime. Thus, we actually would need to write information to the index when a session is used.

@davidlago
Copy link
Author

I've run some tests with actual SAML payloads with 200 SAML roles in them, and after compressing them they are still under 4Kb:

80 -rw-r--r--   1 davelago  38091 Feb 15 13:32 saml_response_200_roles.txt
 8 -rw-r--r--   1 davelago   3723 Feb 15 13:32 saml_response_200_roles.txt.gz

For reference, the js I used to test compression was:

const { createGzip } = require('node:zlib');
const { pipeline } = require('node:stream');
const {
  createReadStream,
  createWriteStream,
} = require('node:fs');

const gzip = createGzip();
const source = createReadStream('saml_response_200_roles.txt');
const destination = createWriteStream('saml_response_200_roles.txt.gz');

pipeline(source, gzip, destination, (err) => {
  if (err) {
    console.error('An error occurred:', err);
    process.exitCode = 1;
  }
});

It seems like a worthy fix to add compression to solve the immediate painpoint, and we can tackle the larger server-side session management as part of those ongoing efforts (opensearch-project/OpenSearch-Dashboards#1215, opensearch-project/OpenSearch-Dashboards#1441).

@jimishs
Copy link

jimishs commented Feb 15, 2023

+1 to the idea of cookie compression and optimizing cookie to exclude parameters that arent needed / can be removed.

Regarding the question of upper bound - im aware of customers with 800-1000 workgroup attributes (that may or may not map to one or more OpenSearch security roles). So while the size could vary, 20-30 kb was what was estimated for such large assertions. If we can go upto 44kb, uncompressed, that could solve near term concerns for large customers.

@nibix
Copy link

nibix commented Feb 16, 2023

Just a small clarification regarding SAML responses: The Dashboards security plugin never stores SAML responses in its cookies. Rather, it converts these into a JWT using an API in the OpenSearch backend.

Still, as these JWTs are not encrypted, these should also have a good compression ratio, but maybe not as big as for the XML based and very verbose SAML.

Just looking quickly at the OIDC case:

For OIDC, the id_token is stored in the cookie. The id_token can be compressed as well. However, some IdPs might choose to provide encrypted id_tokens. As encrypted data is not well compressible, this will not provide such a strong benefit (it will bring some benefit by compensating for the base64 encoding size gain).

@nibix
Copy link

nibix commented Feb 21, 2023

I have filed a draft pull request with a first shot at the compression solution. See #1338

Observations so far:

  • The core Dashboards/Hapi session cookie storage mechanism uses JSON to serialize the payload. In order to put compressed data - which is binary - into the JSON payload, we need to base64 encode it. This nullifies a part of the compression effect. We are still looking into serializing the cookie differently to avoid the base64 encoding.
  • In order to verify the actual effectiveness of this change, some real world example (or close to real world example) of a payload triggering the issue would be great.
  • First test with made up test data: JWT with 400 roles: 26 kb raw -> compression: 12 kb binary -> base64 encoding: 16kb -> encryption and additional base64 encoding: 20 kb

We are still looking into other ways to serialize and store the payload to avoid all these encoding losses.

@nibix
Copy link

nibix commented Feb 22, 2023

I have created a sample SAML AuthnResponse to serve as a test case for our research. The AuthnResponse contains 200 roles encoded in a DN format. I understand that even though this is quite a big amount, it is still something that is realistic and must be expected.

The encoded SAML AuthnResponse (28 kb):

<?xml version="1.0" encoding="UTF-8" standalone="no"?><saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" ID="MOCKSAML_1" InResponseTo="ONELOGIN_703ca7c5-2bef-4878-95f9-da533d6b5f9d" IssueInstant="2023-02-22T07:42:54.995Z" Version="2.0"><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" ID="MOCKSAML_2" IssueInstant="2023-02-22T07:42:54.996Z" Version="2.0"><saml2:Issuer>http://test.entity</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
<ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
<ds:Reference URI="#MOCKSAML_2">
<ds:Transforms>
<ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
</ds:Transforms>
<ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
<ds:DigestValue>2Hslx2PjAauggKNDUVQlgpOBNCQJHcvyTOQ+vM3mLZ4=</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>
oZ4zQszT79IrmjmT8xgItD+oQJB8b7PEG9w6duQbr2C5aR5hZNTgFgSKv76e3G4CC6OPIXmdoS93&#13;
7DLunha1hBDm7GADQhz2KN4KdxJ6CqelrYdFkm9aaF3pumA73iCUwN7m5uMYdqzVWm8BzvWV9+nw&#13;
3yg5BrMnFM5td9mQf3ZgMhaBPXsFuayEuFxFyzs/DSZENRxzCWdyCLGZB+LoZXkg3aRxb3IizmWu&#13;
GaWJ2uaGz1MGRYTm9aleAjhOTabhO5/sIQnXmZcmHXUeUMay6crNwDsXbHdvCiVsbgRqdQwp1yz0&#13;
7oDGZ/r0qBxpgdny83C9w1vOom0WCmNOZ66qQw==
</ds:SignatureValue>
</ds:Signature><saml2:Subject><saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">horst</saml2:NameID><saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml2:SubjectConfirmationData InResponseTo="ONELOGIN_703ca7c5-2bef-4878-95f9-da533d6b5f9d" NotOnOrAfter="2023-02-22T07:43:54.997Z" Recipient="http://wherever/saml/acs"/></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore="2023-02-22T07:42:54.998Z" NotOnOrAfter="2023-02-22T07:43:54.998Z"/><saml2:AuthnStatement AuthnInstant="2023-02-22T07:42:54.996Z" SessionIndex="MOCKSAML_3"><saml2:AuthnContext><saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement><saml2:AttributeStatement><saml2:Attribute Name="roles" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml2:AttributeValue>cn=SystemAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=NetworkEngineers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DatabaseAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SecurityAnalysts,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ApplicationDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpDesk,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HumanResources,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Accounting,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Marketing,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Sales,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerService,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Warehouse,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Shipping,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Production,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Research,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Development,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Testing,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=QualityControl,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Legal,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Facilities,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Executive,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerRelations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Procurement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=PublicRelations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Finance,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AccountsPayable,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AccountsReceivable,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Payroll,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Benefits,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Training,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpdeskLevel1,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpdeskLevel2,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpdeskLevel3,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=BackupOperators,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CloudEngineers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DatabaseOperators,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DatabaseDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=WebDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MobileDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SoftwareDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=UIUXDesigners,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProjectManagers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=NetworkAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ServerAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=FirewallAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AntivirusAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SystemEngineers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ApplicationSupport,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=TechnicalSupport,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Operations,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Logistics,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerSupport,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketResearch,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductManagement,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesManagers,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerSuccess,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerExperience,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductDevelopment,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductDesign,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductTesting,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductQuality,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=TechnicalWriters,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ResearchManagers,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ResearchAnalysts,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefTechnologyOfficer,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefOperatingOfficer,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefSalesOfficer,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefMarketingOfficer,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefFinancialOfficer,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefHumanResourcesOfficer,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefExecutiveOfficer,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesSupport,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesEngineers,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesOperations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesAdministration,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesAnalysts,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketingOperations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketingAdministration,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketingAnalysts,ou=SalesDept,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SystemAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=NetworkEngineers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DatabaseAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SecurityAnalysts,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ApplicationDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpDesk,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HumanResources,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Accounting,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Marketing,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Sales,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerService,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Warehouse,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Shipping,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Production,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Research,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Development,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Testing,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=QualityControl,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Legal,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Facilities,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Executive,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerRelations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Procurement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=PublicRelations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Finance,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AccountsPayable,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AccountsReceivable,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Payroll,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Benefits,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Training,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpdeskLevel1,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpdeskLevel2,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HelpdeskLevel3,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=BackupOperators,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CloudEngineers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DatabaseOperators,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DatabaseDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=WebDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MobileDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SoftwareDevelopers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=UI/UXDesigners,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProjectManagers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=NetworkAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ServerAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=FirewallAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AntivirusAdmins,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SystemEngineers,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ApplicationSupport,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=TechnicalSupport,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Operations,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Logistics,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerSupport,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketResearch,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductManagement,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesManagers,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerSuccess,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerExperience,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductDevelopment,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductDesign,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductTesting,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductQuality,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=TechnicalWriters,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ResearchManagers,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ResearchAnalysts,ou=DevelopmentDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefTechnologyOfficer,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefOperatingOfficer,ou=OperationsDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefSalesOfficer,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefMarketingOfficer,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefFinancialOfficer,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefHumanResourcesOfficer,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChiefExecutiveOfficer,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesSupport,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesEngineers,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesOperations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesAdministration,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SalesAnalysts,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketingOperations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketingAdministration,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketingAnalysts,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerRelations,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CustomerRetention,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductMarketing,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ChannelMarketing,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=DigitalMarketing,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ContentMarketing,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=MarketAnalysis,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=BrandManagement,ou=SalesDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=FinancialReporting,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=FinancialPlanning,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AccountsReceivable,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=AccountsPayable,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=PayrollAdministration,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Taxation,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Audit,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=LegalCompliance,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HumanResourcesOperations,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HumanResourcesAdministration,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=TalentManagement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Recruitment,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=EmployeeRelations,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=EmployeeWellness,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=FacilitiesManagement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=OfficeAdministration,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=TravelManagement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Procurement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=SupplyChainManagement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=WarehouseManagement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ProductionPlanning,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=Manufacturing,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=QualityAssurance,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=QualityControl,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=HealthAndSafety,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=EnvironmentalManagement,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ResearchAndDevelopment,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=IntellectualProperty,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CorporateSocialResponsibility,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=CommunityRelations,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=InvestorRelations,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=InternalAuditor,ou=AdminDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=InformationTechnologyOperations,ou=ITDept,dc=company,dc=com</saml2:AttributeValue><saml2:AttributeValue>cn=ApplicationDevelopment,ou=ITDept,dc=company,dc=com</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>

The JWT created by the security plugin from the AuthnResponse (14kb):

eyJhbGciOiJIUzUxMiJ9.{"nbf":1677051775,"exp":1677055375,"sub":"horst","saml_nif":"u","saml_si":"MOCKSAML_3","roles":["cn=SystemAdmins,ou=ITDept,dc=company,dc=com","cn=NetworkEngineers,ou=ITDept,dc=company,dc=com","cn=DatabaseAdmins,ou=ITDept,dc=company,dc=com","cn=SecurityAnalysts,ou=ITDept,dc=company,dc=com","cn=ApplicationDevelopers,ou=ITDept,dc=company,dc=com","cn=HelpDesk,ou=ITDept,dc=company,dc=com","cn=HumanResources,ou=AdminDept,dc=company,dc=com","cn=Accounting,ou=AdminDept,dc=company,dc=com","cn=Marketing,ou=SalesDept,dc=company,dc=com","cn=Sales,ou=SalesDept,dc=company,dc=com","cn=CustomerService,ou=SalesDept,dc=company,dc=com","cn=Warehouse,ou=OperationsDept,dc=company,dc=com","cn=Shipping,ou=OperationsDept,dc=company,dc=com","cn=Production,ou=OperationsDept,dc=company,dc=com","cn=Research,ou=DevelopmentDept,dc=company,dc=com","cn=Development,ou=DevelopmentDept,dc=company,dc=com","cn=Testing,ou=DevelopmentDept,dc=company,dc=com","cn=QualityControl,ou=OperationsDept,dc=company,dc=com","cn=Legal,ou=AdminDept,dc=company,dc=com","cn=Facilities,ou=AdminDept,dc=company,dc=com","cn=Executive,ou=AdminDept,dc=company,dc=com","cn=CustomerRelations,ou=SalesDept,dc=company,dc=com","cn=Procurement,ou=AdminDept,dc=company,dc=com","cn=PublicRelations,ou=SalesDept,dc=company,dc=com","cn=Finance,ou=AdminDept,dc=company,dc=com","cn=AccountsPayable,ou=AdminDept,dc=company,dc=com","cn=AccountsReceivable,ou=AdminDept,dc=company,dc=com","cn=Payroll,ou=AdminDept,dc=company,dc=com","cn=Benefits,ou=AdminDept,dc=company,dc=com","cn=Training,ou=AdminDept,dc=company,dc=com","cn=HelpdeskLevel1,ou=ITDept,dc=company,dc=com","cn=HelpdeskLevel2,ou=ITDept,dc=company,dc=com","cn=HelpdeskLevel3,ou=ITDept,dc=company,dc=com","cn=BackupOperators,ou=ITDept,dc=company,dc=com","cn=CloudEngineers,ou=ITDept,dc=company,dc=com","cn=DatabaseOperators,ou=ITDept,dc=company,dc=com","cn=DatabaseDevelopers,ou=ITDept,dc=company,dc=com","cn=WebDevelopers,ou=ITDept,dc=company,dc=com","cn=MobileDevelopers,ou=ITDept,dc=company,dc=com","cn=SoftwareDevelopers,ou=ITDept,dc=company,dc=com","cn=UIUXDesigners,ou=ITDept,dc=company,dc=com","cn=ProjectManagers,ou=ITDept,dc=company,dc=com","cn=NetworkAdmins,ou=ITDept,dc=company,dc=com","cn=ServerAdmins,ou=ITDept,dc=company,dc=com","cn=FirewallAdmins,ou=ITDept,dc=company,dc=com","cn=AntivirusAdmins,ou=ITDept,dc=company,dc=com","cn=SystemEngineers,ou=ITDept,dc=company,dc=com","cn=ApplicationSupport,ou=ITDept,dc=company,dc=com","cn=TechnicalSupport,ou=ITDept,dc=company,dc=com","cn=Operations,ou=OperationsDept,dc=company,dc=com","cn=Logistics,ou=OperationsDept,dc=company,dc=com","cn=CustomerSupport,ou=SalesDept,dc=company,dc=com","cn=MarketResearch,ou=SalesDept,dc=company,dc=com","cn=ProductManagement,ou=SalesDept,dc=company,dc=com","cn=SalesManagers,ou=SalesDept,dc=company,dc=com","cn=CustomerSuccess,ou=SalesDept,dc=company,dc=com","cn=CustomerExperience,ou=SalesDept,dc=company,dc=com","cn=ProductDevelopment,ou=DevelopmentDept,dc=company,dc=com","cn=ProductDesign,ou=DevelopmentDept,dc=company,dc=com","cn=ProductTesting,ou=DevelopmentDept,dc=company,dc=com","cn=ProductQuality,ou=DevelopmentDept,dc=company,dc=com","cn=TechnicalWriters,ou=DevelopmentDept,dc=company,dc=com","cn=ResearchManagers,ou=DevelopmentDept,dc=company,dc=com","cn=ResearchAnalysts,ou=DevelopmentDept,dc=company,dc=com","cn=ChiefTechnologyOfficer,ou=ITDept,dc=company,dc=com","cn=ChiefOperatingOfficer,ou=OperationsDept,dc=company,dc=com","cn=ChiefSalesOfficer,ou=SalesDept,dc=company,dc=com","cn=ChiefMarketingOfficer,ou=SalesDept,dc=company,dc=com","cn=ChiefFinancialOfficer,ou=AdminDept,dc=company,dc=com","cn=ChiefHumanResourcesOfficer,ou=AdminDept,dc=company,dc=com","cn=ChiefExecutiveOfficer,ou=AdminDept,dc=company,dc=com","cn=SalesSupport,ou=SalesDept,dc=company,dc=com","cn=SalesEngineers,ou=SalesDept,dc=company,dc=com","cn=SalesOperations,ou=SalesDept,dc=company,dc=com","cn=SalesAdministration,ou=SalesDept,dc=company,dc=com","cn=SalesAnalysts,ou=SalesDept,dc=company,dc=com","cn=MarketingOperations,ou=SalesDept,dc=company,dc=com","cn=MarketingAdministration,ou=SalesDept,dc=company,dc=com","cn=MarketingAnalysts,ou=SalesDept,dc=com","cn=SystemAdmins,ou=ITDept,dc=company,dc=com","cn=NetworkEngineers,ou=ITDept,dc=company,dc=com","cn=DatabaseAdmins,ou=ITDept,dc=company,dc=com","cn=SecurityAnalysts,ou=ITDept,dc=company,dc=com","cn=ApplicationDevelopers,ou=ITDept,dc=company,dc=com","cn=HelpDesk,ou=ITDept,dc=company,dc=com","cn=HumanResources,ou=AdminDept,dc=company,dc=com","cn=Accounting,ou=AdminDept,dc=company,dc=com","cn=Marketing,ou=SalesDept,dc=company,dc=com","cn=Sales,ou=SalesDept,dc=company,dc=com","cn=CustomerService,ou=SalesDept,dc=company,dc=com","cn=Warehouse,ou=OperationsDept,dc=company,dc=com","cn=Shipping,ou=OperationsDept,dc=company,dc=com","cn=Production,ou=OperationsDept,dc=company,dc=com","cn=Research,ou=DevelopmentDept,dc=company,dc=com","cn=Development,ou=DevelopmentDept,dc=company,dc=com","cn=Testing,ou=DevelopmentDept,dc=company,dc=com","cn=QualityControl,ou=OperationsDept,dc=company,dc=com","cn=Legal,ou=AdminDept,dc=company,dc=com","cn=Facilities,ou=AdminDept,dc=company,dc=com","cn=Executive,ou=AdminDept,dc=company,dc=com","cn=CustomerRelations,ou=SalesDept,dc=company,dc=com","cn=Procurement,ou=AdminDept,dc=company,dc=com","cn=PublicRelations,ou=SalesDept,dc=company,dc=com","cn=Finance,ou=AdminDept,dc=company,dc=com","cn=AccountsPayable,ou=AdminDept,dc=company,dc=com","cn=AccountsReceivable,ou=AdminDept,dc=company,dc=com","cn=Payroll,ou=AdminDept,dc=company,dc=com","cn=Benefits,ou=AdminDept,dc=company,dc=com","cn=Training,ou=AdminDept,dc=company,dc=com","cn=HelpdeskLevel1,ou=ITDept,dc=company,dc=com","cn=HelpdeskLevel2,ou=ITDept,dc=company,dc=com","cn=HelpdeskLevel3,ou=ITDept,dc=company,dc=com","cn=BackupOperators,ou=ITDept,dc=company,dc=com","cn=CloudEngineers,ou=ITDept,dc=company,dc=com","cn=DatabaseOperators,ou=ITDept,dc=company,dc=com","cn=DatabaseDevelopers,ou=ITDept,dc=company,dc=com","cn=WebDevelopers,ou=ITDept,dc=company,dc=com","cn=MobileDevelopers,ou=ITDept,dc=company,dc=com","cn=SoftwareDevelopers,ou=ITDept,dc=company,dc=com","cn=UI/UXDesigners,ou=ITDept,dc=company,dc=com","cn=ProjectManagers,ou=ITDept,dc=company,dc=com","cn=NetworkAdmins,ou=ITDept,dc=company,dc=com","cn=ServerAdmins,ou=ITDept,dc=company,dc=com","cn=FirewallAdmins,ou=ITDept,dc=company,dc=com","cn=AntivirusAdmins,ou=ITDept,dc=company,dc=com","cn=SystemEngineers,ou=ITDept,dc=company,dc=com","cn=ApplicationSupport,ou=ITDept,dc=company,dc=com","cn=TechnicalSupport,ou=ITDept,dc=company,dc=com","cn=Operations,ou=OperationsDept,dc=company,dc=com","cn=Logistics,ou=OperationsDept,dc=company,dc=com","cn=CustomerSupport,ou=SalesDept,dc=company,dc=com","cn=MarketResearch,ou=SalesDept,dc=company,dc=com","cn=ProductManagement,ou=SalesDept,dc=company,dc=com","cn=SalesManagers,ou=SalesDept,dc=company,dc=com","cn=CustomerSuccess,ou=SalesDept,dc=company,dc=com","cn=CustomerExperience,ou=SalesDept,dc=company,dc=com","cn=ProductDevelopment,ou=DevelopmentDept,dc=company,dc=com","cn=ProductDesign,ou=DevelopmentDept,dc=company,dc=com","cn=ProductTesting,ou=DevelopmentDept,dc=company,dc=com","cn=ProductQuality,ou=DevelopmentDept,dc=company,dc=com","cn=TechnicalWriters,ou=DevelopmentDept,dc=company,dc=com","cn=ResearchManagers,ou=DevelopmentDept,dc=company,dc=com","cn=ResearchAnalysts,ou=DevelopmentDept,dc=company,dc=com","cn=ChiefTechnologyOfficer,ou=ITDept,dc=company,dc=com","cn=ChiefOperatingOfficer,ou=OperationsDept,dc=company,dc=com","cn=ChiefSalesOfficer,ou=SalesDept,dc=company,dc=com","cn=ChiefMarketingOfficer,ou=SalesDept,dc=company,dc=com","cn=ChiefFinancialOfficer,ou=AdminDept,dc=company,dc=com","cn=ChiefHumanResourcesOfficer,ou=AdminDept,dc=company,dc=com","cn=ChiefExecutiveOfficer,ou=AdminDept,dc=company,dc=com","cn=SalesSupport,ou=SalesDept,dc=company,dc=com","cn=SalesEngineers,ou=SalesDept,dc=company,dc=com","cn=SalesOperations,ou=SalesDept,dc=company,dc=com","cn=SalesAdministration,ou=SalesDept,dc=company,dc=com","cn=SalesAnalysts,ou=SalesDept,dc=company,dc=com","cn=MarketingOperations,ou=SalesDept,dc=company,dc=com","cn=MarketingAdministration,ou=SalesDept,dc=company,dc=com","cn=MarketingAnalysts,ou=SalesDept,dc=company,dc=com","cn=CustomerRelations,ou=SalesDept,dc=company,dc=com","cn=CustomerRetention,ou=SalesDept,dc=company,dc=com","cn=ProductMarketing,ou=SalesDept,dc=company,dc=com","cn=ChannelMarketing,ou=SalesDept,dc=company,dc=com","cn=DigitalMarketing,ou=SalesDept,dc=company,dc=com","cn=ContentMarketing,ou=SalesDept,dc=company,dc=com","cn=MarketAnalysis,ou=SalesDept,dc=company,dc=com","cn=BrandManagement,ou=SalesDept,dc=company,dc=com","cn=FinancialReporting,ou=AdminDept,dc=company,dc=com","cn=FinancialPlanning,ou=AdminDept,dc=company,dc=com","cn=AccountsReceivable,ou=AdminDept,dc=company,dc=com","cn=AccountsPayable,ou=AdminDept,dc=company,dc=com","cn=PayrollAdministration,ou=AdminDept,dc=company,dc=com","cn=Taxation,ou=AdminDept,dc=company,dc=com","cn=Audit,ou=AdminDept,dc=company,dc=com","cn=LegalCompliance,ou=AdminDept,dc=company,dc=com","cn=HumanResourcesOperations,ou=AdminDept,dc=company,dc=com","cn=HumanResourcesAdministration,ou=AdminDept,dc=company,dc=com","cn=TalentManagement,ou=AdminDept,dc=company,dc=com","cn=Recruitment,ou=AdminDept,dc=company,dc=com","cn=EmployeeRelations,ou=AdminDept,dc=company,dc=com","cn=EmployeeWellness,ou=AdminDept,dc=company,dc=com","cn=FacilitiesManagement,ou=AdminDept,dc=company,dc=com","cn=OfficeAdministration,ou=AdminDept,dc=company,dc=com","cn=TravelManagement,ou=AdminDept,dc=company,dc=com","cn=Procurement,ou=AdminDept,dc=company,dc=com","cn=SupplyChainManagement,ou=AdminDept,dc=company,dc=com","cn=WarehouseManagement,ou=AdminDept,dc=company,dc=com","cn=ProductionPlanning,ou=AdminDept,dc=company,dc=com","cn=Manufacturing,ou=AdminDept,dc=company,dc=com","cn=QualityAssurance,ou=AdminDept,dc=company,dc=com","cn=QualityControl,ou=AdminDept,dc=company,dc=com","cn=HealthAndSafety,ou=AdminDept,dc=company,dc=com","cn=EnvironmentalManagement,ou=AdminDept,dc=company,dc=com","cn=ResearchAndDevelopment,ou=AdminDept,dc=company,dc=com","cn=IntellectualProperty,ou=AdminDept,dc=company,dc=com","cn=CorporateSocialResponsibility,ou=AdminDept,dc=company,dc=com","cn=CommunityRelations,ou=AdminDept,dc=company,dc=com","cn=InvestorRelations,ou=AdminDept,dc=company,dc=com","cn=InternalAuditor,ou=AdminDept,dc=company,dc=com","cn=InformationTechnologyOperations,ou=ITDept,dc=company,dc=com","cn=ApplicationDevelopment,ou=ITDept,dc=company,dc=com"]}.oM0VAgxeElWHtohYbOt4VnisE3Ne87ZRdXKvngQPytpP7jHAFDQIK6akRzyXOcYy0_3IHbpwdFCieNei64m9wQ

When using the compression solution in #1338 this JWT goes through the following stages:

  • Deflate to binary data: 2326 byte
  • Base 64 encoded data (because we need to store in in JSON): 3104 byte
  • Embedded in JSON and iron encrypted and base 64 encoded (in order to store binary encrypted data as cookie): 4409 byte

Maximum cross-browser safe cookie size is 4093 bytes. Thus, the solution in #1338 won't work with the reference AuthnResponse.

Still, this size is blown up due to the double base64 encoding. We are still investigating ways to avoid the double encoding.

@prabhat-chaturvedi
Copy link

I guess in my previous post there was a confusion on Long term solution on Server based session management Vs Local Browser Session storage(another short term solution).
Not in complete favour of cookie compression apart from other issues stated above, cookie goes in each request thereby increasing the payload overhead.

Can we look into immediate short term solution alternative - using Local Session storage, as Cookie has limitations of 4MB, but Session Storage can go upto 10MB or more in some browsers.

The effort required are still the same, the place of compression and decompression - we need to put logic to put in browser session storage and pull out at the same entry and exit points.
Please don't confuse with Long term solution of server side session management, this proposal is for short term Browser session storage. This is the best practice as per the industry standard for session management and not storing details in the cookie as much as possible.

@nibix
Copy link

nibix commented Feb 22, 2023

@prabhat-chaturvedi

Not in complete favour of cookie compression apart from other issues stated above, cookie goes in each request thereby increasing the payload overhead.

As the possibly bloated JWT is the authentication token, we must pass it to Dashboards (and the OpenSearch backend) for every request. Otherwise, these requests are unauthenticated.

@prabhat-chaturvedi
Copy link

True, @nibix - all that remains as is, instead of storing the JWT in the cookie, store in something like session.setAttribute("autheticatedJWT", actualJWT).

  1. Only storage changes as a short term solution
  2. logic to send to backend remains same.
  3. code changes only around the place where we currently read and write cookie.

@expani
Copy link
Contributor

expani commented Feb 22, 2023

@prabhat-chaturvedi If we use local storage or any other means of storing the data instead of Cookie on browser side, then we need to read it and attach in every request sent from Dashboards front-end to Dashboards backend.

Currently, browser takes care of attaching the cookie with every request for us.

@prabhat-chaturvedi
Copy link

@anijain-Amazon I will have to dig deep onto it and limited to my knowledge specific to OpenSearch.
Generally assuming, there are two security context(sessions) which are talking about here.

Session 1 : User session at Dashboard frontend - where I propose to use browser session storage and passed on to below
Session 2 : Take info from above and Dashboard (acting as browser) to Security plugin - populate and send as a Authorization "Bearer" Header(as the best practices to send Bearer JWT for OAuth/OIDC) or other custom header.

@peternied
Copy link
Member

@nibix Great details with the reference cookie, 4409 byte is on the order of 4093 bytes.

If we employed a cookie splitter, seems like the base case without implementing the server side solution. Do you think that is a viable approach for the near term?

(Even setting aside the double base64 encoding issue - which means there might be even more headroom!)

@nibix
Copy link

nibix commented Feb 22, 2023

@peternied

If we employed a cookie splitter, seems like the base case without implementing the server side solution. Do you think that is a viable approach for the near term?

I believe that cookie splitting/stitching would be viable - but also tricky. The base solution linked in the PR above has the advantage that it is limited to the Dashboards security plugin. For more intrusive solutions, it is likely that we need to make changes in core Dashboards.

@expani
Copy link
Contributor

expani commented Feb 22, 2023

Session 1 : User session at Dashboard frontend - where I propose to use browser session storage and passed on to below

@prabhat-chaturvedi If we use Browser Session storage, then passing the credentials to every request to backend will require code changes at lots of places.

@jochen-kressin
Copy link
Contributor

jochen-kressin commented Feb 28, 2023

We have added a second PR to investigate the viability of splitting up a large payload into multiple cookies. See #1352

For this PR the focus was on doing this without any modifications to core Dashboards. This approach comes with some drawbacks though. There are some more details in the PR, but in short, creating a cookie from a plugin is a bit harder because of the abstraction layer on top of Hapi and the PR breaks this abstraction in a somewhat hacky way:

  • Registering cookies with the server by using the internal SessionStorage object's reference to the Hapi server
  • Writing the cookies via the raw Hapi requests cookie decorator (cookieAuth.set())

This could be improved a little by using a separate instance of Hapi Statehood, which manages the cookies for Hapi under the hood, but even with this I haven't (yet) been able to find a better way to write the cookie values.

Anyhow, I hope this PR at least serves as a basis for further discussions.

@jochen-kressin
Copy link
Contributor

A short status update on this:
We're working on cleaning up the PoC we started in #1352.

We've implemented this for OIDC as well, and we've made the number of additional cookies configurable.

One interesting finding that probably should be mentioned in the docs when this goes live is that if the id token from the IdP is very large, we may run into the following error:

server    log   [13:38:20.110] [error][plugins][securityDashboards] OpenId authentication failed: Error: [too_long_http_header_exception] HTTP header is larger than 8192 bytes. server    log   [13:38:23.333] [error][plugins][securityDashboards] OpenId authentication failed: Error: Request Timeout after 30000ms

I ran into this while testing an id token containing 200 roles. After receiving the token from the IdP, the authinfo endpoint is called with the token in the authorization header.
Luckily, this can be mitigated by changing the following value in opensearch.yml:
http.max_header_size: 16kb

I believe this is something that the customers would need to configure together with the cookie compression/splitting, otherwise the request will fail before we squeeze the token into the additional cookies.

Not sure if changing this setting has any negative side effects...?

@jochen-kressin
Copy link
Contributor

We've updated the pull request with the cookie stitching: #1352

The main difference is that it is now implemented for both OpenId and SAML.
I updated the description in the PR to reflect the changes, and I also added some questions to which I would appreciate your feedback.

The main questions going forward whether you would like the number of cookies to be configurable. There are some drawbacks to that, mainly related to if the customer changes the number of cookies.

We could also give making the number of used cookies dynamic another try. In other words don't register any cookies with the Hapi server, and instead try to write as many cookies as needed by the actual content.
The issue we ran into with that was that we weren't able to delete the cookies completely, e.g. when logging out...

Anyhow, happy for suggestions for improvements!

@expani
Copy link
Contributor

expani commented Apr 1, 2023

We can consider keeping this implementation as optional via configuration since most of the users of OpenSearch might not have a requirement of cookies more than 4Kb.

Also, we might be introducing some overhead in latency by extra base64 encoding, so turning this off if required can be desirable.

@nibix
Copy link

nibix commented Apr 2, 2023

@anijain-Amazon

Also, we might be introducing some overhead in latency by extra base64 encoding, so turning this off if required can be desirable.

This base64 encoding also occurs now and is kind of essential as the encrypted data is likely binary and cannot be stored as such in a cookie. Also, I don't believe that such a overhead is significant here.

@expani
Copy link
Contributor

expani commented Apr 3, 2023

@nibix I believe there was an additional layer of encoding added for spilt cookie approach. Agree that the latency might not be very high but the functionality of cookie splitting can be behind a configuration flag and disabled by default.

@nibix
Copy link

nibix commented Apr 3, 2023

The only additional encoding step is the compression.

@davidlago
Copy link
Author

We can consider keeping this implementation as optional via configuration since most of the users of OpenSearch might not have a requirement of cookies more than 4Kb.

Also, we might be introducing some overhead in latency by extra base64 encoding, so turning this off if required can be desirable.

Given that the ones turning this off would be users with small cookies to pass around, the overhead in their case would be quite negligible, and IMHO not worth the additional settings and code paths (that would also need to be tested) to make this an optional feature.

@nobletrout
Copy link

I am one of the many sufferers of getting booted out of dashboards after an hour. I have tried making the two recommended changes of extending the JWT time and cookie session length, but neither appears to make any meaningful change. Is there anything I can do as an admin/user today to increase this timeout value before getting kicked out to my IDP and having to re-auth. Other SAML based applications don't seem to suffer from this issue.

@expani
Copy link
Contributor

expani commented Apr 5, 2023

@nobletrout
For SAML Authentication, the expiry of the cookie is determined using the expiry of the JWT Token ( generated by Security Plugin by parsing the SAML Response ) CodePointer

The expiry of the JWT Token is determined using the SAML Response. CodePointer

Maybe you can try increasing the Session TTL at your IdP.

PS at the first glance, your issue seems to be not related to this RFC. Please feel free to open a separate Github issue for the same, so that the discussion can be continued there.

@davidlago
Copy link
Author

I believe #828 is the one you might be thinking of @anijain-Amazon... this issue links it at the top as one of the many things we'd like to fix with better session management. The cookie splitting work addresses just a few of these and more as a workaround for now, but yeah, there are still plenty of the ones linked above that won't be fixed this upcoming release.

@davidlago
Copy link
Author

Closing this RFC after #1352 got released in 2.7.0. If we decide to further improve session management (for example, adding server-side session management) we can track that as a separate issue/feature.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request triaged
Projects
None yet
Development

No branches or pull requests