You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We received this report when our product went through pen testing
The empty default configuration of the SAML authentication workflow would break due to the lack of an entry point URL, causing an infinite redirect loop. However, a valid SAML Request was still generated with the default configuration values.
The SAMLRequest parameter shown above was generated by the product and was intended to be sent to an SAML endpoint. Since the authentication method is not fully configured with a certificate, any SAML SSO service can respond to the request. Atredis set up a simple SSO service to validate this finding. The SSO service handled the request and posted a valid SAML response to the F callback URL, which was considered a successful login attempt.
The following snippet shows that a saml request is still generated.
What we call entryPoint is used for the Destination attribute in AuthnRequest. According to the SAML spec, Destination is required to be spec-compliant when the request is signed:
So if we are failing to require the Destination attribute when the spec requires it, that's a bug.
On the other hand, if your case involves un-signed requests with a missing Destination attribute, it appears that' a weakness in the SAML spec itself, this project is compliant, developers need to understand to avoid that case to be safe.
Help with updated code or docs to deal with this case in a spec-compliant way is welcome.
We received this report when our product went through pen testing
The following snippet shows that a saml request is still generated.
The text was updated successfully, but these errors were encountered: