Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding sso_integration as valid app type + documentation for SSO integrations via SAMLP clients #221

Merged
merged 6 commits into from
Jul 7, 2022

Conversation

willvedd
Copy link
Contributor

@willvedd willvedd commented Jul 6, 2022

Description

Issue #37 highlighted an issue around how to implement SSO integrations, specifically around the Tableau Server type. Turns out, this could be quickly supported because Tableau Server and other SSO integrations and implemented via the samlp client type. The only missing piece is allowing sso_integrations to the allowable app types in the provider validation. There does not appear to be any other additional work needed to accommodate SSO integrations.

This PR also attempts to make it a bit more clear through the documentation about how to implement SSO integrations with SAMLP connection type.

Checklist

Note: Checklist required to be completed before a PR is considered to be reviewable.

Auth0 Code of Conduct

Auth0 General Contribution Guidelines

Changes include test coverage?

  • Yes
  • Not needed

Does the description provide the correct amount of context?

  • Yes, the description provides enough context for the reviewer to understand what these changes accomplish

Have you updated the documentation?

  • Yes, I've updated the appropriate docs
  • Not needed

Is this code ready for production?

  • Yes, all code changes are intentional and no debugging calls are left over

@willvedd willvedd requested a review from a team as a code owner July 6, 2022 22:26
@codecov-commenter
Copy link

codecov-commenter commented Jul 6, 2022

Codecov Report

Merging #221 (ef58623) into main (0c02ddf) will not change coverage.
The diff coverage is 100.00%.

@@           Coverage Diff           @@
##             main     #221   +/-   ##
=======================================
  Coverage   83.92%   83.92%           
=======================================
  Files          35       35           
  Lines        6189     6189           
=======================================
  Hits         5194     5194           
  Misses        785      785           
  Partials      210      210           
Impacted Files Coverage Δ
auth0/resource_auth0_client.go 94.20% <100.00%> (ø)

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 0c02ddf...ef58623. Read the comment docs.

@willvedd willvedd changed the title Adding documentation for SSO integrations via SAMLP clients Adding sso_integration as valid app type + documentation for SSO integrations via SAMLP clients Jul 6, 2022
Comment on lines +625 to +644
const testAccClientSSOIntegrationCreate = `
resource "auth0_client" "my_client" {
name = "Acceptance Test - SSO Integration - {{.testName}}"
app_type = "sso_integration"
addons{
samlp {
audience= "http://tableau-server-test.domain.eu.com/audience"
destination= "http://tableau-server-test.domain.eu.com/destination"
digest_algorithm= "sha256"
lifetime_in_seconds= 3600
mappings= {
email= "username"
}
name_identifier_format= "urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
passthrough_claims_with_no_mapping= false
recipient= "http://tableau-server-test.domain.eu.com/recipient"
}
}
}
`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sweeet! 👍🏻

@willvedd willvedd merged commit d95e2d2 into main Jul 7, 2022
@willvedd willvedd deleted the samlp-sso-clients-documentation branch July 7, 2022 23:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants