-
Notifications
You must be signed in to change notification settings - Fork 163
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] v2.1 security plugin is still using _opendistro/_security/saml/acs #1031
Comments
I think that is the cause: private String buildAssertionConsumerEndpoint(String dashboardsRoot) {
if (dashboardsRoot.endsWith("/")) {
return dashboardsRoot + "_opendistro/_security/saml/acs";
} else {
return dashboardsRoot + "/_opendistro/_security/saml/acs";
}
} |
Thanks @agabrys , now i see where it is being set. Will there be any fix soon? |
I'm not a mantainer 🙂 I've just checked what could be the cause, but I don't have time to work on it. Feel free to create a PR 🙂 |
Thanks for filing @opensearch-project/security is looking into the path forward with our upcoming releases. @hpkuppuraj @agabrys if you are interested in become a maintainer it's open to everyone. |
The PR in security plugin is needed to resolve this issue: opensearch-project/security#1936. |
The endpoints need to be updated in both security plugin and security dashboards plugin in 3.0.0 as a breaking change as it would break existing SAML setup. labeling for 3.0.0. |
This is already a breaking change in 2.x. Currently there is no way to use SAML as far as I can tell. Is there a recommended workaround until 3.0.0 comes out? |
Use _opendistro for SAML endpoint (https://example.com/_opendistro/_security/saml/acs)
|
This should be updated from For a little history on this issue, a PR was merged in security-dashboards-plugin prior to 2.1 without the corresponding PR in the security repo. Since only half was released, the setup would never work because the frontend would try to call the assertion consumer service endpoint at We should eliminate legacy language from the codebase, but this will be a breaking change since these endpoints need to be added to Dashboards installations that have the config: |
@cwperks thanks for spending the time to pull in the details, could you update the description to have clear exit criteria or should we create other issues? Based on your recommendation its more complex than just changing out the url which is how the description reads. |
@peternied I think the issue is actionable from the description on this issue but there should be a parent tracking issue to associate the one in this repo, the one in the security repo and a documentation issue to explain how to migrate to the new endpoint in the next major version. |
I am setting up v2.1 cluster with saml authentication, all the configuration seems to be correct however when i try to login and found out that saml authrequest still builds ACS URL with _opendistro/_security/saml/acs instead of /_plugin/_security/saml/acs.
Below is what we extracted from the saml tracer plugin.
The text was updated successfully, but these errors were encountered: