Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Passthrough auth in UI #4834

Closed
maxsivanov opened this issue Jun 25, 2018 · 3 comments
Closed

Passthrough auth in UI #4834

maxsivanov opened this issue Jun 25, 2018 · 3 comments
Labels

Comments

@maxsivanov
Copy link

Is it possible to fill token field of auth form with token taken from URL like http://127.0.0.1:8200/ui/?token=472b885c-7eb0-2f32-052f-03060c402c09?
The idea is to auth user with some corporate Single Sign On service, issue new token in Vault and redirect user to webpage http://127.0.0.1:8200/ui/?token=472b885c-7eb0-2f32-052f-03060c402c09.
Unfortunately we do not use LDAP, okta or anything else Vault does.

@meirish
Copy link
Contributor

meirish commented Jun 25, 2018

This isn't something we currently support - but this could be useful if the auth form fills on init based on a parameter - with one change - if you sent a wrapped token (and changed the query param to wrapped_token) the UI could unwrap it and then fill the token field with the value and show an error if it can't unwrap it. That way we never expose the real token via the URL.

We're making some changes to the auth page that makes it a bit more user-friendly so you'd also likely have to specify that you want to log in with the token backend - that's currently the with query param - so in the end it'd look more like http://127.0.0.1:8200/ui/?with=token&wrapped_token=472b885c-7eb0-2f32-052f-03060c402c09. Users would also still have to click to login, though maybe it'd be smoother to just submit the form on successful unwrap 🤔- will have to think that over.

@meirish
Copy link
Contributor

meirish commented Jun 29, 2018

I've implemented this and have a PR up - to clarify just specifying ?wrapped_token=<token> is enough to trigger the behavior and we did end up just submitting the form on successful lookup to make any integration smoother.

@palsaurabh2005
Copy link
Contributor

This will be very useful for many diff integration workflows. SSO being one.
Thanks for submitting this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants