Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/user_saml.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-04-08Set proper relaystate urlJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2022-04-07code styleArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2022-04-07fix reading and updated name-id-format selectionArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2022-04-07makes sloWebServerDecode IdP-sensitive as it should beArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2022-04-07Minor fixesCarl Schwan
Signed-off-by: Carl Schwan <carl@carlschwan.eu>
2022-04-07Add regex routes requirement to providerIdJohn Molakvoæ
Signed-off-by: John Molakvoæ <skjnldsv@protonmail.com>
2022-04-07Move SAML configurations to a table of their ownArthur Schiwon
- adds user_saml_configurations table and migrates existing configuration - Controller methods are added since appconfig endpoints cannot be used anymore. THIS IS A BREAKING CHANGE. - Frontend code is adjusted to use new endpoints. - security-sloWebServerDecode was changed from global to provider specific setting. It being global seemed to be unintended. A migration path is yet missing. Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2021-12-10cs:fixJohn Molakvoæ
Signed-off-by: John Molakvoæ <skjnldsv@protonmail.com>
2021-10-21Use effective uid for autoprovisioning new usersJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2021-05-05Actually replace $retrieveParametersFromServer parameterLukas Reschke
Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2021-05-04Allow setting of "retrieveParametersFromServer"Lukas Reschke
Some SAML servers require this type of decoding, otherwise the SLO request fails. Ideally the library would perform both verifications (https://github.com/onelogin/php-saml/issues/466), but it seems upstream doesn't want to perform this change. Until we have considered a better solution for this, this adds a new checkbox that one can configure. Ref https://github.com/nextcloud/user_saml/issues/403 Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2021-03-01Merge pull request #508 from nextcloud/fix/noid/userids-not-sanitizedblizzz
sanitize and test user id received from IdP, if original does not match
2021-02-15Add logging for SLO errorsLukas Reschke
To make debugging SLO errors easier, this adds logging for any encountered error in that phase. This is similar to the logging already done on the ACS handling. Signed-off-by: Lukas Reschke <lukas@statuscode.ch>
2021-01-26adjust to recent merged changesArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2021-01-26introduces a single point of saml attribute interpretationsArthur Schiwon
- solved code duplication on uid mapping attribute determiniation - a single point for user id normalization - slightly reduces logic in the Controller Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2021-01-26sanitize and test user id received from IdP, if original does not matchArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2021-01-12Allow customer directlogin textRoeland Jago Douma
Some people seem to want to have a custom direct login text. This allows them to set it. For now only via occ. But maybe some day we also add a GUI component to it. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-11-24Merge pull request #468 from orandev/patch-1Roeland Jago Douma
Fix incorrect key name in "Login flow fix"
2020-11-06fix missing user_saml.Idp session value which SAMLSettings rely onArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2020-10-13Merge pull request #466 from nextcloud/bugfix/log-invalid-user-idblizzz
Add checked user id to InvalidArgumentException
2020-10-12Merge pull request #432 from nextcloud/enh/noid/saml-response-urlblizzz
optional possibility to provide a URL for SLO Response
2020-10-09Fix incorrect key name in "Login flow fix"orandev
'name' key was put in flowData table, but 'token' key was retrieved from this table, thus triggering the following error: Undefined index: token at /nextcloud/apps/user_saml/lib/Controller/SAMLController.php#306 Signed-off-by: orandev <63342732+orandev@users.noreply.github.com>
2020-10-09Add checked user id to InvalidArgumentExceptionJulius Härtl
Signed-off-by: Julius Härtl <jus@bitgrid.net>
2020-10-05Fix login flow with SAMLRoeland Jago Douma
Because of the strict samesite cookies SAML fails with the login flow. Because the post that comes back is not transfering the proper cookies to use the same session. Hence the token in use gets lost etc. Now we store this all (encrypted) in a cookie. So that when we come back we can restore the proper session. FAQ: * Is it elegant? Nope! * Does it work? Yes! Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-09-25Handle failing SLORoeland Jago Douma
If the SLO throws an error we should catch it. This is so that we do not show an error page. We should also still logout the current session. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-09-10optional possibility to provide a URL for SLO ResponseArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2020-09-08acs endpoint to always return a RedirectResponseArthur Schiwon
* the void statements end up in a useless blank page Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2020-07-10Make work with posts and cookies againRoeland Jago Douma
Requires https://github.com/nextcloud/server/pull/21479 to fully work. Basically don't save this info in the session (which is lax by default starting with NC19 but also soon with new chromes and firefox). We now save it is a cookie that is set to None. This is the best we can do I think. Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2020-03-05Merge remote-tracking branch 'upstream/master' into fix-saml-single-logoutClément OUDOT
2020-01-28fixed login with chrome browserFrank Tröger
- fix 'environment-variable' login problem with chrome browser - problem: using nextcloud behind apache2 mod_auth_mellon, chrome browser gets too many redirects - description: nc_sameSiteCookiestrict is not sent by chrome, because of the origin POST request by idp and the 3xx redirects on nextcloud side
2019-12-16use NameId format, name qualifier and name SP qualifier in SAML logout ↵Soisik Froger
request (fixed SP qualifier typo) Signed-off-by: Clément OUDOT <clement.oudot@worteks.com>
2019-12-16use NameId format, name qualifier and name SP qualifier in SAML logout requestClément OUDOT
Signed-off-by: Clément OUDOT <clement.oudot@worteks.com>
2019-09-19decode objectGUID to their ASCII representation ifArthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2019-06-17Handle SLO logout requests from IdP via POSTFrieder Schrempf
Some IdPs send their SLO logout requests via POST. To handle them we need to add an entry in the routing table. Further, we need to hack around the issue, that php-saml only handles GET by copying the request from $_POST to $_GET. This solves #82. Signed-off-by: Frieder Schrempf <frieder.schrempf@online.de>
2019-06-07fix IDP-initiated Logout #334Dylann Cordel
Signed-off-by: Dylann Cordel <d.cordel@webu.coop>
2019-05-27Load a timezone file if no timezone is setRoeland Jago Douma
Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>
2019-01-24Merge pull request #286 from nextcloud/fix-268Björn Schießle
always create user in the SAML back-end and update the attributes
2019-01-22user might be already known, but was not mapped yet. init on first login.Arthur Schiwon
Signed-off-by: Arthur Schiwon <blizzz@arthur-schiwon.de>
2019-01-20Fixed typo.rakekniven
Reported at Transifex. Signed-off-by: Mark Ziegler <mark.ziegler@rakekniven.de>
2018-12-18create user in the SAML back-end and update the attributes whenBjoern Schiessle
the user was found on another back-end during login Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-11-22Implement mapping of user's home directoryDaniel Klaffenbach
Signed-off-by: Daniel Klaffenbach <daniel.klaffenbach@hrz.tu-chemnitz.de>
2018-11-21Merge pull request #271 from nextcloud/better-error-messagesBjörn Schießle
improve error messages in case SAML is not configured properly
2018-11-20improve error messages in case SAML is not configured properlyBjoern Schiessle
Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-11-19content doesn't have to be a array, e.g. for category=type, content is 'saml'Bjoern Schiessle
Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-11-19first check if it is an array and that the key exists, to avoid error ↵Bjoern Schiessle
messages in the log file Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-11-16log IDP parameters in debug modeBjoern Schiessle
Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-11-14log provisioning errors during sso environment loginRobin Appelman
Signed-off-by: Robin Appelman <robin@icewind.nl>
2018-11-09add a combobox instead of buttons to select the login method if more then 4 ↵Bjoern Schiessle
different IDPs are configured Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-10-24make global scale setup more robustBjoern Schiessle
If this server acts as a global scale master and the user is not a local admin of the server we just create the user and continue no need to update additional attributes. But for local users, e.g. the admins of the global scale master we should complete the user setup with all attributes Signed-off-by: Bjoern Schiessle <bjoern@schiessle.org>
2018-10-11Actually add error pageRoeland Jago Douma
* The base route now has a function as well so it is not just some empty route * We now actually have an error page Signed-off-by: Roeland Jago Douma <roeland@famdouma.nl>