-
-
Notifications
You must be signed in to change notification settings - Fork 3.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
V5 SAML token validation fails when Snipe-it is behind a reverse proxy #8584
Comments
👋 Thanks for opening your first issue here! If you're reporting a 🐞 bug, please make sure you include steps to reproduce it. We get a lot of issues on this repo, so please be patient and we will get back to you as soon as we can. |
After some research I was able to resolve the problem by myself :)
|
15 tasks
snipe
pushed a commit
that referenced
this issue
Nov 21, 2020
* Let onelogin/php-saml know to use 'X-Forwarded-*' headers if it is from a trusted proxy * Gracefully handle the case where openssl_csr_new fails when openssl.cnf is invalid/missing * Improve ui of saml sp metadata by displaying it's url and a download button
2 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Please confirm you have done the following before posting your bug report:
Describe the bug
After configuring SAML and attempt to login via SAML, the following error is displayed on the login screen.
I used the following SAML configuration:
Entity-ID: https://asstes.example.com
ACS-URL: https://asstes.example.com/saml/acs
Logout-URL: https://asstes.example.com/saml/sls
A token from debug logs states, that the SAML response was ok.
Reverse Proxy settings are working fine, since all resources and links are generated using
https://assets.example.com
as base url and IP of proxy is set properly (APP-URL & APP_TRUSTED_PROXIES env parameters are set acccordingly).To Reproduce
Steps to reproduce the behavior:
Expected behavior
The SAML login mechanism uses the correct "frontend" URL (in this case using
https
) to validate SAML tokensServer (please complete the following information):
Desktop (please complete the following information):
Error Messages
The debug bar displays the following messages:
The error message was created by the OneLogin SAML response validation of the
Destination
value (see OneLogin_Saml2_Response).Additional context
It's an upgrade from 4.9.5 to 5.0.1
It is a docker installation (in combination with docker-compose & mariadb)
No errors so far
Database was not touched at all
The text was updated successfully, but these errors were encountered: