-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
doc updates to include new fields for SAML sig validation #29195
base: main
Are you sure you want to change the base?
doc updates to include new fields for SAML sig validation #29195
Conversation
CI Results: |
…t-SAML-signature-validation
@@ -51,6 +51,15 @@ Configures the auth method with a SAML identity provider. | |||
according to the current logging level. When `verbose_logging` is `true`, | |||
debug-level logs provide user attributes and trace-level logs provide the full | |||
SAML response. | |||
- `validate_response_and_assertion_signatures` `(bool, false)` - Enables validation | |||
of signatures for both response and assertion in the SAML response. If IDP allows | |||
signing both response and assertion then **recommendation** is to opt for this option. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is the recommendation is to opt in
?
signing both response and assertion then **recommendation** is to opt for this option. | |
signing both response and assertion, then **recommendation** is to opt in for this option. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
removed the validate_response_and_assertion_signatures
option
signing both response and assertion then **recommendation** is to opt for this option. | ||
- `validate_response_signature` `(bool, false)` - Enables validation of signature | ||
for at least response in the SAML response. If IDP allows signing both response | ||
and assertion then recommendation is to opt for validating signatures of both. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same question. Should this be opt in
?
and assertion then recommendation is to opt for validating signatures of both. | |
and assertion, then recommendation is to opt in for validating signatures of both. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added opt in
and assertion then recommendation is to opt for validating signatures of both. | ||
- `validate_assertion_signature` `(bool, false)` - Enables validation of signature | ||
for at least assertion in the SAML response. If IDP allows signing both response | ||
and assertion then recommendation is to opt for validating signatures of both. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same question. Should this be opt in
?
and assertion then recommendation is to opt for validating signatures of both. | |
and assertion, then recommendation is to opt in for validating signatures of both. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
added opt in
…t-SAML-signature-validation
Build Results: |
Description
Updating docs for incoming SAML changes in PR for new options for strict SAML validation.
TODO only if you're a HashiCorp employee
backport/
label that matches the desired release branch. Note that in the CE repo, the latest release branch will look likebackport/x.x.x
, but older release branches will bebackport/ent/x.x.x+ent
.of a public function, even if that change is in a CE file, double check that
applying the patch for this PR to the ENT repo and running tests doesn't
break any tests. Sometimes ENT only tests rely on public functions in CE
files.
in the PR description, commit message, or branch name.
description. Also, make sure the changelog is in this PR, not in your ENT PR.