Skip to content
Snippets Groups Projects
Unverified Commit ac9561d5 authored by Thijs Kinkhorst's avatar Thijs Kinkhorst Committed by GitHub
Browse files

Fix markdown syntax

parent 35f5d85e
No related branches found
No related tags found
No related merge requests found
...@@ -51,7 +51,7 @@ client. ...@@ -51,7 +51,7 @@ client.
All configuration is handled in authsources.php: All configuration is handled in authsources.php:
'weblogin' => array( 'weblogin' => [
'negotiate:Negotiate', 'negotiate:Negotiate',
'keytab' => '/path/to/keytab-file', 'keytab' => '/path/to/keytab-file',
'fallback' => 'ldap', 'fallback' => 'ldap',
...@@ -59,19 +59,18 @@ All configuration is handled in authsources.php: ...@@ -59,19 +59,18 @@ All configuration is handled in authsources.php:
'base' => 'cn=people,dc=example,dc=com', 'base' => 'cn=people,dc=example,dc=com',
'adminUser' => 'cn=idp-fallback,cn=services,dc=example,dc=com', 'adminUser' => 'cn=idp-fallback,cn=services,dc=example,dc=com',
'adminPassword' => 'VerySecretPassphraseHush' 'adminPassword' => 'VerySecretPassphraseHush'
), ],
'ldap' => array( 'ldap' => [
'ldap:LDAP', 'ldap:LDAP',
'hostname' => 'ldap.example.com', 'hostname' => 'ldap.example.com',
'enable_tls' => TRUE, 'enable_tls' => TRUE,
'dnpattern' => 'uid=%username%,cn=people,dc=example,dc=com', 'dnpattern' => 'uid=%username%,cn=people,dc=example,dc=com',
'search.enable' => FALSE 'search.enable' => FALSE
), ],
`php_krb5` ### `php_krb5`
++++++++++
The processing involving the actual Kerberos ticket handling is done The processing involving the actual Kerberos ticket handling is done
by php_krb5. The package is not yet labeled stable but has worked well by php_krb5. The package is not yet labeled stable but has worked well
...@@ -80,7 +79,7 @@ during testing. ...@@ -80,7 +79,7 @@ during testing.
NOTE! php_krb5 hardcodes the service name in the keytab file to 'HTTP' NOTE! php_krb5 hardcodes the service name in the keytab file to 'HTTP'
as of php_krb5-1.0rc2. To change this you need to edit the module code. as of php_krb5-1.0rc2. To change this you need to edit the module code.
Be wary of how much space is allocated to the string in Be wary of how much space is allocated to the string in
negotiate_auth.c:101. `negotiate_auth.c:101`.
Depending on you apache config you may need a rewrite rule to allow Depending on you apache config you may need a rewrite rule to allow
php_krb5 to read the HTTP_AUTHORIZATION header: php_krb5 to read the HTTP_AUTHORIZATION header:
...@@ -94,40 +93,38 @@ Test the Kerberos setup with the following script: ...@@ -94,40 +93,38 @@ Test the Kerberos setup with the following script:
<?php <?php
if(!extension_loaded('krb5')) { if(!extension_loaded('krb5')) {
die('KRB5 Extension not installed'); die('KRB5 Extension not installed');
} }
if(!empty($_SERVER['HTTP_AUTHORIZATION'])) { if(!empty($_SERVER['HTTP_AUTHORIZATION'])) {
list($mech, $data) = explode(' ', $_SERVER['HTTP_AUTHORIZATION']); list($mech, $data) = explode(' ', $_SERVER['HTTP_AUTHORIZATION']);
if(strtolower($mech) == 'basic') { if(strtolower($mech) == 'basic') {
echo "Client sent basic"; echo "Client sent basic";
die('Unsupported request'); die('Unsupported request');
} else if(strtolower($mech) != 'negotiate') { } else if(strtolower($mech) != 'negotiate') {
echo "Couldn't find negotiate"; echo "Couldn't find negotiate";
die('Unsupported request'); die('Unsupported request');
} }
$auth = new KRB5NegotiateAuth('/path/to/keytab'); $auth = new KRB5NegotiateAuth('/path/to/keytab');
$reply = ''; $reply = '';
if($reply = $auth->doAuthentication()) { if($reply = $auth->doAuthentication()) {
header('HTTP/1.1 200 Success'); header('HTTP/1.1 200 Success');
echo 'Success - authenticated as ' . $auth->getAuthenticatedUser() . '<br>'; echo 'Success - authenticated as ' . $auth->getAuthenticatedUser() . '<br>';
} else { } else {
echo 'Failed to authN.'; echo 'Failed to authN.';
die(); die();
} }
} else { } else {
header('HTTP/1.1 401 Unauthorized'); header('HTTP/1.1 401 Unauthorized');
header('WWW-Authenticate: Negotiate',false); header('WWW-Authenticate: Negotiate',false);
echo 'Not authenticated. No HTTP_AUTHORIZATION available.'; echo 'Not authenticated. No HTTP_AUTHORIZATION available.';
echo 'Check headers sent by the browser and verify that '; echo 'Check headers sent by the browser and verify that ';
echo 'apache passes them to PHP'; echo 'apache passes them to PHP';
} }
?>
`LDAP` ### LDAP
++++++
LDAP is used to verify the user due to the lack of metadata in LDAP is used to verify the user due to the lack of metadata in
Kerberos. A domain can contain lots of kiosk users, non-personal Kerberos. A domain can contain lots of kiosk users, non-personal
...@@ -146,15 +143,14 @@ be a DN to an object with access to search for all relevant user ...@@ -146,15 +143,14 @@ be a DN to an object with access to search for all relevant user
objects and to look up attributes needed by the SP. objects and to look up attributes needed by the SP.
`Subnet filtering` ### Subnet filtering
++++++++++++++++++
Subnet is meant to filter which clients you subject to the Subnet is meant to filter which clients you subject to the
WWW-Authenticate request. WWW-Authenticate request.
Syntax is: Syntax is:
'subnet' => array('127.0.0.0/16','192.168.0.0/16'), 'subnet' => [ '127.0.0.0/16','192.168.0.0/16' ],
Browsers, especially IE, behave erratically when they encounter a Browsers, especially IE, behave erratically when they encounter a
WWW-Authenticate from the webserver. Included in RFC4559 Negotiate is WWW-Authenticate from the webserver. Included in RFC4559 Negotiate is
...@@ -167,18 +163,16 @@ currently in the domain should be the only ones that are promted with ...@@ -167,18 +163,16 @@ currently in the domain should be the only ones that are promted with
WWW-Authenticate: Negotiate. WWW-Authenticate: Negotiate.
`Enabling/disabling Negotiate from a web browser` ### Enabling/disabling Negotiate from a web browser
+++++++++++++++++++++++++++++++++++++++++++++++++
Included in Negotiate are semi-static web pages for enabling and Included in Negotiate are semi-static web pages for enabling and
disabling Negotiate for any given client. The pages simple set/deletes disabling Negotiate for any given client. The pages simplly set/delete
a cookie that Negotiate will look for when a client attempts AuthN. a cookie that Negotiate will look for when a client attempts AuthN.
The help text in the JSON files should be locally overwritten to fully The help text in the JSON files should be locally overwritten to fully
explain which clients are accepted by Negotiate. explain which clients are accepted by Negotiate.
`Logout/Login loop and reauthenticating` ### Logout/Login loop and reauthenticating
++++++++++++++++++++++++++++++++++++++++
Due to the automatic AuthN of certain clients and how SPs will Due to the automatic AuthN of certain clients and how SPs will
automatically redirect clients to the IdP when clients try to access automatically redirect clients to the IdP when clients try to access
...@@ -188,50 +182,51 @@ out user. The consequence of this is that the user will be presented ...@@ -188,50 +182,51 @@ out user. The consequence of this is that the user will be presented
with the login mechanism of the fallback module specified in Negotiate with the login mechanism of the fallback module specified in Negotiate
config. config.
SimpleSamlPhp offers no decent way of adding hooks or piggyback this SimpleSamlPHP offers no decent way of adding hooks or piggyback this
information to the fallback module. In future releases one might add a information to the fallback module. In future releases one might add a
box of information to the user explaining what's happening. box of information to the user explaining what's happening.
One can add this bit of code to the template in the fallback AuthN One can add this bit of code to the template in the fallback AuthN
module: module:
// This should be placed in your www script // This should be placed in your www script
$nego_session = false; $nego_session = false;
$nego_perm = false; $nego_perm = false;
$nego_retry = null; $nego_retry = null;
if (array_key_exists('negotiate:authId', $state)) { if (array_key_exists('negotiate:authId', $state)) {
$nego = \SimpleSAML\Auth\Source::getById($state['negotiate:authId']); $nego = \SimpleSAML\Auth\Source::getById($state['negotiate:authId']);
$mask = $nego->checkMask(); $mask = $nego->checkMask();
$disabled = $nego->spDisabledInMetadata($spMetadata); $disabled = $nego->spDisabledInMetadata($spMetadata);
$session_disabled = $session->getData('negotiate:disable', 'session'); $session_disabled = $session->getData('negotiate:disable', 'session');
if ($mask and !$disabled) { if ($mask and !$disabled) {
if(array_key_exists('NEGOTIATE_AUTOLOGIN_DISABLE_PERMANENT', $_COOKIE) && if(array_key_exists('NEGOTIATE_AUTOLOGIN_DISABLE_PERMANENT', $_COOKIE) &&
$_COOKIE['NEGOTIATE_AUTOLOGIN_DISABLE_PERMANENT'] == 'True') { $_COOKIE['NEGOTIATE_AUTOLOGIN_DISABLE_PERMANENT'] == 'True') {
$nego_perm = true; $nego_perm = true;
} elseif ($session_disabled) { } elseif ($session_disabled) {
$retryState = \SimpleSAML\Auth\State::cloneState($state); $retryState = \SimpleSAML\Auth\State::cloneState($state);
unset($retryState[\SimpleSAML\Auth\State::ID]); unset($retryState[\SimpleSAML\Auth\State::ID]);
$nego_retry = \SimpleSAML\Auth\State::saveState($retryState, '\SimpleSAML\Module\negotiate\Auth\Source\Negotiate.StageId'); $nego_retry = \SimpleSAML\Auth\State::saveState($retryState, '\SimpleSAML\Module\negotiate\Auth\Source\Negotiate.StageId');
$nego_session = true; $nego_session = true;
}
} }
} }
}
// This should reside in your template
// This should reside in your template if($this->data['nego']['disable_perm']) {
if($this->data['nego']['disable_perm']) { echo '<span id="login-extra-info-uio.no" class="login-extra-info">'
echo '<span id="login-extra-info-uio.no" class="login-extra-info">' . '<span class="login-extra-info-divider"></span>'
. '<span class="login-extra-info-divider"></span>' . $this->t('{feide:login:login_uio_negotiate_disabled_permanent_info}')
. $this->t('{feide:login:login_uio_negotiate_disabled_permanent_info}') . '</span>';
. '</span>'; } elseif($this->data['nego']['disable_session']) {
} elseif($this->data['nego']['disable_session']) { echo '<span id="login-extra-info-uio.no" class="login-extra-info">'
echo '<span id="login-extra-info-uio.no" class="login-extra-info">' . '<span class="login-extra-info-divider"></span>'
. '<span class="login-extra-info-divider"></span>' . $this->t('{feide:login:login_uio_negotiate_disabled_session_info}')
. $this->t('{feide:login:login_uio_negotiate_disabled_session_info}') . '<br><a href="'.SimpleSAML\Module::getModuleURL('negotiate/retry.php', [ 'AuthState' => $this->data['nego']['retry_id'] ]).'">'
. '<br><a href="'.SimpleSAML\Module::getModuleURL('negotiate/retry.php', array('AuthState' => $this->data['nego']['retry_id'])).'">' . $this->t('{feide:login:login_uio_negotiate_disabled_session_info_link}')
. $this->t('{feide:login:login_uio_negotiate_disabled_session_info_link}') . '</a>'
. '</a>' . '</span>';
. '</span>'; }
}
The above may or may not work right out of the box for you but it is The above may or may not work right out of the box for you but it is
the gist of it. By looking at the state variable, cookie and checking the gist of it. By looking at the state variable, cookie and checking
...@@ -254,26 +249,25 @@ Negotiate->authenticate() but remaining code in retry.php will be ...@@ -254,26 +249,25 @@ Negotiate->authenticate() but remaining code in retry.php will be
discarded. Other side-effects may occur. discarded. Other side-effects may occur.
`Clients` ### Clients
+++++++++
* Internet Explorer #### Internet Explorer
YMMV but generally you need to have your IdP defined in "Internet YMMV but generally you need to have your IdP defined in "Internet
Options" -> "Security" -> "Local intranet" -> "Sites" -> "Advanced". Options" -> "Security" -> "Local intranet" -> "Sites" -> "Advanced".
You also need "Internet Options" -> "Advanced" -> "Security" -> Enable You also need "Internet Options" -> "Advanced" -> "Security" -> Enable
Integrated Windows Authentication" enabled. Integrated Windows Authentication" enabled.
* Firefox #### Firefox
Open "about:config". Locate "network.auth.use-sspi" and verify that Open "about:config". Locate "network.auth.use-sspi" and verify that
this is true (on a Windows machine). Next locate this is true (on a Windows machine). Next locate
"network.negotiate-auth.trusted-uris" and insert your IdP. "network.negotiate-auth.trusted-uris" and insert your IdP.
* Safari #### Safari
TODO TODO
* Chrome #### Chrome
TODO TODO
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment