Commit graph

6 commits

Author SHA1 Message Date
Aleh Zasypkin
ffb0b06fa3
Make xpack.security.authc.saml.realm mandatory and completely remove xpack.security.authProviders and xpack.security.public. (#38657) 2019-06-13 17:43:18 +02:00
Aleh Zasypkin
590862ec63
Make SAML realm name configurable (#37346) 2019-06-11 19:05:20 +03:00
Larry Gregory
38eb16d4e6
Security - remove auth scope provider (#36998)
* remove auth scope provider

* handle missing roles

* guard for unauthenticated calls

* update functional tests to not expect a scope property

* there's always money in the banana stand

* revert interceptor optimizations

* protect against missing roles

* address pr feedback

* remove scope as expected property on kerberos auth response
2019-05-29 11:01:35 -04:00
Aleh Zasypkin
580edcd1c1
Introduce Kerberos authentication provider. (#36112) 2019-05-29 10:40:19 +03:00
Ioannis Kakavas
e569fba159
Add OpenID Connect auth provider (#36201)
The OpenID Connect authProvider is the accompanying authProvider for the OpenID Connect authentication realm in Elasticsearch. This is very similar to the saml authProvider in most ways with three noticeable differences:

- We require explicit configuration regarding the Elasticsearch realm name instead of trying to build an environment aware string (like ACS URL in saml) and pass that to Elasticsearch for it to resolve the realm.
- We do not support multiple values for the realm specific nonces (state and nonce) as we do with requestId in the SAML realm. Instead if an existing value ( for state and nonce) is present in the user's session, we pass that to Elasticsearch to be reused. The end goal is the same, allow a better UX for users attempting many requests over different tabs in the same browser context.
- IDP initiated SSO ( Third Party initiated authentication in OIDC-speak ) is implemented but starts as an unsolicited request to initiate the handshake, instead of an unsolicited request with an authentication response (which is not supported here)

This change also adds a fake plugin named oidc_provider to be used in integration tests for mocking calls to the token and userinfo endpoint of an OpenID Connect Provider

This does not support the OpenID Connect Implicit flow as that depends on fragment handling/processing as described for instance in the spec

Co-Authored-By: Brandon Kobel <kobelb@elastic.co>
2019-05-21 20:23:27 +03:00
Aleh Zasypkin
6871157963
Typesciptify Authenticator and move its tests to Jest. (#35750) 2019-05-02 13:32:45 +02:00
Renamed from x-pack/plugins/security/server/lib/authentication/authenticator.js (Browse further)