Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support handling LogoutResponse from SAML idP (#56316) #58792

Merged
merged 5 commits into from
Jul 1, 2020

Conversation

ywangd
Copy link
Member

@ywangd ywangd commented Jul 1, 2020

SAML idP sends back a LogoutResponse at the end of the logout workflow. It can be sent via either HTTP-Redirect binding or HTTP-POST binding. Currently, the HTTP-Redirect request is simply ignored by Kibana and never reaches ES. It does not cause any obvious issue and the workflow is completed normally from user's perspective.

The HTTP-POST request results in a 404 error because POST request is not accepted by Kibana's logout end-point. This causes a non-trivial issue because it renders an error page in user's browser. In addition, some resources do not seem to be fully cleaned up due to the error, e.g. the username will be pre-filled when trying to login again after the 404 error.

This PR solves both of the above issues from ES side with a new /_security/saml/complete_logout end-point. Changes are still needed on Kibana side to relay the messages.

ywangd added 3 commits July 1, 2020 11:47
SAML idP sends back a LogoutResponse at the end of the logout workflow. It can be sent via either HTTP-Redirect binding or HTTP-POST binding. Currently, the HTTP-Redirect request is simply ignored by Kibana and never reaches ES. It does not cause any obvious issue and the workflow is completed normally from user's perspective.

The HTTP-POST request results in a 404 error because POST request is not accepted by Kibana's logout end-point. This causes a non-trivial issue because it renders an error page in user's browser. In addition, some resources do not seem to be fully cleaned up due to the error, e.g. the username will be pre-filled when trying to login again after the 404 error.

This PR solves both of the above issues from ES side with a new /_security/saml/complete_logout end-point. Changes are still needed on Kibana side to relay the messages.
…#58668)

Fix an error introduced by merging master into the PR branch which accidentally undone the separation of cryption and signature keys used by FIPS tests.
@ywangd ywangd added the backport label Jul 1, 2020
@ywangd
Copy link
Member Author

ywangd commented Jul 1, 2020

@elasticmachine run elasticsearch-ci/2

1 similar comment
@ywangd
Copy link
Member Author

ywangd commented Jul 1, 2020

@elasticmachine run elasticsearch-ci/2

@ywangd
Copy link
Member Author

ywangd commented Jul 1, 2020

@elasticmachine update branch

@ywangd ywangd merged commit 3d49e62 into elastic:7.x Jul 1, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants