diff --git a/e b/e index b37a41b87ee3d..254b78ea7b39d 160000 --- a/e +++ b/e @@ -1 +1 @@ -Subproject commit b37a41b87ee3dfa55fe4569cbb3553e4ee51697d +Subproject commit 254b78ea7b39db29e92fc6a32833ce0d6f3c165b diff --git a/fuzz/oss-fuzz-build.sh b/fuzz/oss-fuzz-build.sh index 8b0e7cb52874c..25586702b2eaa 100755 --- a/fuzz/oss-fuzz-build.sh +++ b/fuzz/oss-fuzz-build.sh @@ -26,9 +26,6 @@ build_teleport_fuzzers() { compile_native_go_fuzzer $TELEPORT_PREFIX/lib/services \ FuzzParserEvalBoolPredicate fuzz_parser_eval_bool_predicate - compile_native_go_fuzzer $TELEPORT_PREFIX/lib/auth \ - FuzzParseSAMLInResponseTo fuzz_parse_saml_in_response_to - compile_native_go_fuzzer $TELEPORT_PREFIX/lib/restrictedsession \ FuzzParseIPSpec fuzz_parse_ip_spec diff --git a/lib/auth/auth.go b/lib/auth/auth.go index 8cf18b11c2e6a..53fad13b82583 100644 --- a/lib/auth/auth.go +++ b/lib/auth/auth.go @@ -290,13 +290,6 @@ func NewServer(cfg *InitConfig, opts ...ServerOption) (*Server, error) { ) } } - // Plug in SAML auth service - sas := NewSAMLAuthService(&SAMLAuthServiceConfig{ - Auth: &as, - Emitter: as.emitter, - AssertionReplayService: as.Unstable.AssertionReplayService, - }) - as.SetSAMLService(sas) return &as, nil } diff --git a/lib/auth/auth_with_roles_test.go b/lib/auth/auth_with_roles_test.go index a94a470b22ea7..10fcde6c2baef 100644 --- a/lib/auth/auth_with_roles_test.go +++ b/lib/auth/auth_with_roles_test.go @@ -44,7 +44,6 @@ import ( "github.com/gravitational/teleport/lib/auth/testauthority" libdefaults "github.com/gravitational/teleport/lib/defaults" "github.com/gravitational/teleport/lib/events" - "github.com/gravitational/teleport/lib/fixtures" "github.com/gravitational/teleport/lib/services" "github.com/gravitational/teleport/lib/session" "github.com/gravitational/teleport/lib/tlsca" @@ -156,181 +155,6 @@ func TestSSOUserCanReissueCert(t *testing.T) { require.NoError(t, err) } -func TestSAMLAuthRequest(t *testing.T) { - ctx := context.Background() - srv := newTestTLSServer(t) - - emptyRole, err := CreateRole(ctx, srv.Auth(), "test-empty", types.RoleSpecV5{}) - require.NoError(t, err) - - _, err = CreateRole(ctx, srv.Auth(), "baz", types.RoleSpecV5{}) - require.NoError(t, err) - - access1Role, err := CreateRole(ctx, srv.Auth(), "test-access-1", types.RoleSpecV5{ - Allow: types.RoleConditions{ - Rules: []types.Rule{ - { - Resources: []string{types.KindSAMLRequest}, - Verbs: []string{types.VerbCreate}, - }, - }, - }, - }) - require.NoError(t, err) - - access2Role, err := CreateRole(ctx, srv.Auth(), "test-access-2", types.RoleSpecV5{ - Allow: types.RoleConditions{ - Rules: []types.Rule{ - { - Resources: []string{types.KindSAML}, - Verbs: []string{types.VerbCreate}, - }, - }, - }, - }) - require.NoError(t, err) - - access3Role, err := CreateRole(ctx, srv.Auth(), "test-access-3", types.RoleSpecV5{ - Allow: types.RoleConditions{ - Rules: []types.Rule{ - { - Resources: []string{types.KindSAML, types.KindSAMLRequest}, - Verbs: []string{types.VerbCreate}, - }, - }, - }, - }) - require.NoError(t, err) - - readerRole, err := CreateRole(ctx, srv.Auth(), "test-access-4", types.RoleSpecV5{ - Allow: types.RoleConditions{ - Rules: []types.Rule{ - { - Resources: []string{types.KindSAMLRequest}, - Verbs: []string{types.VerbRead}, - }, - }, - }, - }) - require.NoError(t, err) - - conn, err := types.NewSAMLConnector("foo", types.SAMLConnectorSpecV2{ - Issuer: "test", - SSO: "test", - Cert: fixtures.TLSCACertPEM, - AssertionConsumerService: "test", - AttributesToRoles: []types.AttributeMapping{{ - Name: "foo", - Value: "bar", - Roles: []string{"baz"}, - }}, - }) - require.NoError(t, err) - - err = srv.Auth().UpsertSAMLConnector(ctx, conn) - require.NoError(t, err) - - reqNormal := types.SAMLAuthRequest{ConnectorID: conn.GetName(), Type: constants.SAML} - reqTest := types.SAMLAuthRequest{ConnectorID: conn.GetName(), Type: constants.SAML, SSOTestFlow: true, ConnectorSpec: &types.SAMLConnectorSpecV2{ - Issuer: "test", - Audience: "test", - ServiceProviderIssuer: "test", - SSO: "test", - Cert: fixtures.TLSCACertPEM, - AssertionConsumerService: "test", - AttributesToRoles: []types.AttributeMapping{{ - Name: "foo", - Value: "bar", - Roles: []string{"baz"}, - }}, - }} - - tests := []struct { - desc string - roles []string - request types.SAMLAuthRequest - expectAccessDenied bool - }{ - { - desc: "empty role - no access", - roles: []string{emptyRole.GetName()}, - request: reqNormal, - expectAccessDenied: true, - }, - { - desc: "can create regular request with normal access", - roles: []string{access1Role.GetName()}, - request: reqNormal, - expectAccessDenied: false, - }, - { - desc: "cannot create sso test request with normal access", - roles: []string{access1Role.GetName()}, - request: reqTest, - expectAccessDenied: true, - }, - { - desc: "cannot create normal request with connector access", - roles: []string{access2Role.GetName()}, - request: reqNormal, - expectAccessDenied: true, - }, - { - desc: "cannot create sso test request with connector access", - roles: []string{access2Role.GetName()}, - request: reqTest, - expectAccessDenied: true, - }, - { - desc: "can create regular request with combined access", - roles: []string{access3Role.GetName()}, - request: reqNormal, - expectAccessDenied: false, - }, - { - desc: "can create sso test request with combined access", - roles: []string{access3Role.GetName()}, - request: reqTest, - expectAccessDenied: false, - }, - } - - user, err := CreateUser(srv.Auth(), "dummy") - require.NoError(t, err) - - userReader, err := CreateUser(srv.Auth(), "dummy-reader", readerRole) - require.NoError(t, err) - - clientReader, err := srv.NewClient(TestUser(userReader.GetName())) - require.NoError(t, err) - - for _, tt := range tests { - t.Run(tt.desc, func(t *testing.T) { - user.SetRoles(tt.roles) - err = srv.Auth().UpsertUser(user) - require.NoError(t, err) - - client, err := srv.NewClient(TestUser(user.GetName())) - require.NoError(t, err) - - request, err := client.CreateSAMLAuthRequest(ctx, tt.request) - if tt.expectAccessDenied { - require.Error(t, err) - require.True(t, trace.IsAccessDenied(err), "expected access denied, got: %v", err) - return - } - - require.NoError(t, err) - require.NotEmpty(t, request.ID) - require.Equal(t, tt.request.ConnectorID, request.ConnectorID) - - requestCopy, err := clientReader.GetSAMLAuthRequest(ctx, request.ID) - require.NoError(t, err) - require.Equal(t, request, requestCopy) - }) - } -} - func TestInstaller(t *testing.T) { ctx := context.Background() srv := newTestTLSServer(t) diff --git a/lib/auth/fuzz_test.go b/lib/auth/fuzz_test.go index 5948092de34b7..3c3fd8d758db3 100644 --- a/lib/auth/fuzz_test.go +++ b/lib/auth/fuzz_test.go @@ -17,24 +17,11 @@ limitations under the License. package auth import ( - "encoding/base64" "testing" - "github.com/sirupsen/logrus" "github.com/stretchr/testify/require" ) -func FuzzParseSAMLInResponseTo(f *testing.F) { - // Disable Go App Engine logging - logrus.SetLevel(logrus.PanicLevel) - - f.Fuzz(func(t *testing.T, response string) { - require.NotPanics(t, func() { - ParseSAMLInResponseTo(base64.StdEncoding.EncodeToString([]byte(response))) - }) - }) -} - func FuzzParseAndVerifyIID(f *testing.F) { f.Fuzz(func(t *testing.T, iidBytes []byte) { require.NotPanics(t, func() { diff --git a/lib/auth/saml.go b/lib/auth/saml.go index 1b6082251c512..3cf652a3e24a3 100644 --- a/lib/auth/saml.go +++ b/lib/auth/saml.go @@ -17,31 +17,16 @@ limitations under the License. package auth import ( - "bytes" - "compress/flate" "context" - "encoding/base64" "encoding/json" "fmt" - "io" - "sync" - "github.com/beevik/etree" - "github.com/google/go-cmp/cmp" "github.com/gravitational/trace" - saml2 "github.com/russellhaering/gosaml2" - "github.com/gravitational/teleport" - "github.com/gravitational/teleport/api/constants" - apidefaults "github.com/gravitational/teleport/api/defaults" "github.com/gravitational/teleport/api/types" apievents "github.com/gravitational/teleport/api/types/events" - "github.com/gravitational/teleport/api/utils/keys" - "github.com/gravitational/teleport/lib/defaults" "github.com/gravitational/teleport/lib/events" "github.com/gravitational/teleport/lib/services" - "github.com/gravitational/teleport/lib/services/local" - "github.com/gravitational/teleport/lib/utils" ) // ErrSAMLRequiresEnterprise is the error returned by the SAML methods when not @@ -129,307 +114,6 @@ func (a *Server) ValidateSAMLResponse(ctx context.Context, re string, connectorI return resp, trace.Wrap(err) } -// SAMLAuthService implements the logic of the SAML connector, allowing SSO -// logins using the SAML protocol. -// -// SAMLAuthService implements the SAMLService interface. -type SAMLAuthService struct { - auth *Server - emitter apievents.Emitter - assertionReplayService *local.AssertionReplayService - samlProviders map[string]*samlProvider - lock sync.Mutex -} - -type SAMLAuthServiceConfig struct { - Auth *Server - Emitter apievents.Emitter - AssertionReplayService *local.AssertionReplayService -} - -// NewSAMLAuthService returns a SAMLAuthService configured to use the -// services given in the config. -func NewSAMLAuthService(cfg *SAMLAuthServiceConfig) *SAMLAuthService { - return &SAMLAuthService{ - auth: cfg.Auth, - emitter: cfg.Emitter, - assertionReplayService: cfg.AssertionReplayService, - - samlProviders: make(map[string]*samlProvider), - } -} - -// samlProvider is internal structure that stores SAML client and its config -type samlProvider struct { - provider *saml2.SAMLServiceProvider - connector types.SAMLConnector -} - -// ErrSAMLNoRoles results from not mapping any roles from SAML claims. -var ErrSAMLNoRoles = trace.AccessDenied("No roles mapped from claims. The mappings may contain typos.") - -func (sas *SAMLAuthService) CreateSAMLAuthRequest(ctx context.Context, req types.SAMLAuthRequest) (*types.SAMLAuthRequest, error) { - connector, provider, err := sas.getSAMLConnectorAndProvider(ctx, req) - if err != nil { - return nil, trace.Wrap(err) - } - - doc, err := provider.BuildAuthRequestDocument() - if err != nil { - return nil, trace.Wrap(err) - } - - attr := doc.Root().SelectAttr("ID") - if attr == nil || attr.Value == "" { - return nil, trace.BadParameter("missing auth request ID") - } - - req.ID = attr.Value - - // Workaround for Ping: Ping expects `SigAlg` and `Signature` query - // parameters when "Enforce Signed Authn Request" is enabled, but gosaml2 - // only provides these parameters when binding == BindingHttpRedirect. - // Luckily, BuildAuthURLRedirect sets this and is otherwise identical to - // the standard BuildAuthURLFromDocument. - if connector.GetProvider() == teleport.Ping { - req.RedirectURL, err = provider.BuildAuthURLRedirect("", doc) - } else { - req.RedirectURL, err = provider.BuildAuthURLFromDocument("", doc) - } - - if err != nil { - return nil, trace.Wrap(err) - } - - err = sas.auth.Services.CreateSAMLAuthRequest(ctx, req, defaults.SAMLAuthRequestTTL) - if err != nil { - return nil, trace.Wrap(err) - } - return &req, nil -} - -func (sas *SAMLAuthService) getSAMLConnectorAndProviderByID(ctx context.Context, connectorID string) (types.SAMLConnector, *saml2.SAMLServiceProvider, error) { - connector, err := sas.auth.Identity.GetSAMLConnector(ctx, connectorID, true) - if err != nil { - return nil, nil, trace.Wrap(err) - } - provider, err := sas.getSAMLProvider(connector) - if err != nil { - return nil, nil, trace.Wrap(err) - } - - return connector, provider, nil -} - -func (sas *SAMLAuthService) getSAMLConnectorAndProvider(ctx context.Context, req types.SAMLAuthRequest) (types.SAMLConnector, *saml2.SAMLServiceProvider, error) { - if req.SSOTestFlow { - if req.ConnectorSpec == nil { - return nil, nil, trace.BadParameter("ConnectorSpec cannot be nil when SSOTestFlow is true") - } - - if req.ConnectorID == "" { - return nil, nil, trace.BadParameter("ConnectorID cannot be empty") - } - - // stateless test flow - connector, err := types.NewSAMLConnector(req.ConnectorID, *req.ConnectorSpec) - if err != nil { - return nil, nil, trace.Wrap(err) - } - - // validate, set defaults for connector - err = services.ValidateSAMLConnector(connector, sas.auth) - if err != nil { - return nil, nil, trace.Wrap(err) - } - - // we don't want to cache the provider. construct it directly instead of using sas.getSAMLProvider() - provider, err := services.GetSAMLServiceProvider(connector, sas.auth.GetClock()) - if err != nil { - return nil, nil, trace.Wrap(err) - } - - return connector, provider, nil - } - - // regular execution flow - return sas.getSAMLConnectorAndProviderByID(ctx, req.ConnectorID) -} - -func (sas *SAMLAuthService) getSAMLProvider(conn types.SAMLConnector) (*saml2.SAMLServiceProvider, error) { - sas.lock.Lock() - defer sas.lock.Unlock() - - providerPack, ok := sas.samlProviders[conn.GetName()] - if ok && cmp.Equal(providerPack.connector, conn) { - return providerPack.provider, nil - } - delete(sas.samlProviders, conn.GetName()) - - serviceProvider, err := services.GetSAMLServiceProvider(conn, sas.auth.GetClock()) - if err != nil { - return nil, trace.Wrap(err) - } - - sas.samlProviders[conn.GetName()] = &samlProvider{connector: conn, provider: serviceProvider} - - return serviceProvider, nil -} - -func (sas *SAMLAuthService) calculateSAMLUser(diagCtx *SSODiagContext, connector types.SAMLConnector, assertionInfo saml2.AssertionInfo, request *types.SAMLAuthRequest) (*CreateUserParams, error) { - p := CreateUserParams{ - ConnectorName: connector.GetName(), - Username: assertionInfo.NameID, - } - - p.Traits = services.SAMLAssertionsToTraits(assertionInfo) - - diagCtx.Info.SAMLTraitsFromAssertions = p.Traits - diagCtx.Info.SAMLConnectorTraitMapping = connector.GetTraitMappings() - - var warnings []string - warnings, p.Roles = services.TraitsToRoles(connector.GetTraitMappings(), p.Traits) - if len(p.Roles) == 0 { - if len(warnings) != 0 { - log.WithField("connector", connector).Warnf("No roles mapped from claims. Warnings: %q", warnings) - diagCtx.Info.SAMLAttributesToRolesWarnings = &types.SSOWarnings{ - Message: "No roles mapped for the user", - Warnings: warnings, - } - } else { - log.WithField("connector", connector).Warnf("No roles mapped from claims.") - diagCtx.Info.SAMLAttributesToRolesWarnings = &types.SSOWarnings{ - Message: "No roles mapped for the user. The mappings may contain typos.", - } - } - return nil, trace.Wrap(ErrSAMLNoRoles) - } - - // Pick smaller for role: session TTL from role or requested TTL. - roles, err := services.FetchRoles(p.Roles, sas.auth, p.Traits) - if err != nil { - return nil, trace.Wrap(err) - } - roleTTL := roles.AdjustSessionTTL(apidefaults.MaxCertDuration) - - if request != nil { - p.SessionTTL = utils.MinTTL(roleTTL, request.CertTTL) - } else { - p.SessionTTL = roleTTL - } - - return &p, nil -} - -func (sas *SAMLAuthService) createSAMLUser(p *CreateUserParams, dryRun bool) (types.User, error) { - expires := sas.auth.GetClock().Now().UTC().Add(p.SessionTTL) - - log.Debugf("Generating dynamic SAML identity %v/%v with roles: %v. Dry run: %v.", p.ConnectorName, p.Username, p.Roles, dryRun) - - user := &types.UserV2{ - Kind: types.KindUser, - Version: types.V2, - Metadata: types.Metadata{ - Name: p.Username, - Namespace: apidefaults.Namespace, - Expires: &expires, - }, - Spec: types.UserSpecV2{ - Roles: p.Roles, - Traits: p.Traits, - SAMLIdentities: []types.ExternalIdentity{ - { - ConnectorID: p.ConnectorName, - Username: p.Username, - }, - }, - CreatedBy: types.CreatedBy{ - User: types.UserRef{ - Name: teleport.UserSystem, - }, - Time: sas.auth.GetClock().Now().UTC(), - Connector: &types.ConnectorRef{ - Type: constants.SAML, - ID: p.ConnectorName, - Identity: p.Username, - }, - }, - }, - } - - if dryRun { - return user, nil - } - - // Get the user to check if it already exists or not. - existingUser, err := sas.auth.Services.GetUser(p.Username, false) - if err != nil && !trace.IsNotFound(err) { - return nil, trace.Wrap(err) - } - - ctx := context.TODO() - - // Overwrite exisiting user if it was created from an external identity provider. - if existingUser != nil { - connectorRef := existingUser.GetCreatedBy().Connector - - // If the exisiting user is a local user, fail and advise how to fix the problem. - if connectorRef == nil { - return nil, trace.AlreadyExists("local user with name %q already exists. Either change "+ - "NameID in assertion or remove local user and try again.", existingUser.GetName()) - } - - log.Debugf("Overwriting existing user %q created with %v connector %v.", - existingUser.GetName(), connectorRef.Type, connectorRef.ID) - - if err := sas.auth.UpdateUser(ctx, user); err != nil { - return nil, trace.Wrap(err) - } - } else { - if err := sas.auth.CreateUser(ctx, user); err != nil { - return nil, trace.Wrap(err) - } - } - - return user, nil -} - -func ParseSAMLInResponseTo(response string) (string, error) { - raw, _ := base64.StdEncoding.DecodeString(response) - - doc := etree.NewDocument() - err := doc.ReadFromBytes(raw) - if err != nil { - // Attempt to inflate the response in case it happens to be compressed (as with one case at saml.oktadev.com) - buf, err := io.ReadAll(flate.NewReader(bytes.NewReader(raw))) - if err != nil { - return "", trace.Wrap(err) - } - - doc = etree.NewDocument() - err = doc.ReadFromBytes(buf) - if err != nil { - return "", trace.Wrap(err) - } - } - - if doc.Root() == nil { - return "", trace.BadParameter("unable to parse response") - } - - // Try to find the InResponseTo attribute in the SAML response. If we can't find this, return - // a predictable error message so the caller may choose interpret it as an IdP-initiated payload. - el := doc.Root() - responseTo := el.SelectAttr("InResponseTo") - if responseTo == nil { - return "", trace.NotFound("missing InResponseTo attribute") - } - if responseTo.Value == "" { - return "", trace.BadParameter("InResponseTo can not be empty") - } - return responseTo.Value, nil -} - // SAMLAuthResponse is returned when auth server validated callback parameters // returned from SAML identity provider type SAMLAuthResponse struct { @@ -494,256 +178,3 @@ type SAMLAuthRawResponse struct { // TLSCert is TLS certificate authority certificate TLSCert []byte `json:"tls_cert,omitempty"` } - -// SAMLAuthRequestFromProto converts the types.SAMLAuthRequest to SAMLAuthRequestData. -func SAMLAuthRequestFromProto(req *types.SAMLAuthRequest) SAMLAuthRequest { - return SAMLAuthRequest{ - ID: req.ID, - PublicKey: req.PublicKey, - CSRFToken: req.CSRFToken, - CreateWebSession: req.CreateWebSession, - ClientRedirectURL: req.ClientRedirectURL, - } -} - -// ValidateSAMLResponse consumes attribute statements from SAML identity provider -func (sas *SAMLAuthService) ValidateSAMLResponse(ctx context.Context, samlResponse string, connectorID string) (*SAMLAuthResponse, error) { - event := &apievents.UserLogin{ - Metadata: apievents.Metadata{ - Type: events.UserLoginEvent, - }, - Method: events.LoginMethodSAML, - } - - diagCtx := NewSSODiagContext(types.KindSAML, sas.auth) - - auth, err := sas.validateSAMLResponse(ctx, diagCtx, samlResponse, connectorID) - diagCtx.Info.Error = trace.UserMessage(err) - - diagCtx.WriteToBackend(ctx) - - attributeStatements := diagCtx.Info.SAMLAttributeStatements - if attributeStatements != nil { - attributes, err := apievents.EncodeMapStrings(attributeStatements) - if err != nil { - event.Status.UserMessage = fmt.Sprintf("Failed to encode identity attributes: %v", err.Error()) - log.WithError(err).Debug("Failed to encode identity attributes.") - } else { - event.IdentityAttributes = attributes - } - } - - if err != nil { - event.Code = events.UserSSOLoginFailureCode - if diagCtx.Info.TestFlow { - event.Code = events.UserSSOTestFlowLoginFailureCode - } - event.Status.Success = false - event.Status.Error = trace.Unwrap(err).Error() - event.Status.UserMessage = err.Error() - if err := sas.emitter.EmitAuditEvent(ctx, event); err != nil { - log.WithError(err).Warn("Failed to emit SAML login failed event.") - } - return nil, trace.Wrap(err) - } - - event.Status.Success = true - event.User = auth.Username - event.Code = events.UserSSOLoginCode - if diagCtx.Info.TestFlow { - event.Code = events.UserSSOTestFlowLoginCode - } - - if err := sas.emitter.EmitAuditEvent(ctx, event); err != nil { - log.WithError(err).Warn("Failed to emit SAML login event.") - } - - return auth, nil -} - -func (sas *SAMLAuthService) checkIDPInitiatedSAML(ctx context.Context, connector types.SAMLConnector, assertion *saml2.AssertionInfo) error { - if !connector.GetAllowIDPInitiated() { - return trace.AccessDenied("IdP initiated SAML is not allowed by the connector configuration") - } - - // Not all IdP's provide these variables, replay mitigation is best effort. - if assertion.SessionIndex != "" || assertion.SessionNotOnOrAfter == nil { - return nil - } - - err := sas.assertionReplayService.RecognizeSSOAssertion(ctx, connector.GetName(), assertion.SessionIndex, assertion.NameID, *assertion.SessionNotOnOrAfter) - return trace.Wrap(err) -} - -func (sas *SAMLAuthService) validateSAMLResponse(ctx context.Context, diagCtx *SSODiagContext, samlResponse string, connectorID string) (*SAMLAuthResponse, error) { - idpInitiated := false - var connector types.SAMLConnector - var provider *saml2.SAMLServiceProvider - var request *types.SAMLAuthRequest - requestID, err := ParseSAMLInResponseTo(samlResponse) - switch { - case trace.IsNotFound(err): - if connectorID == "" { - return nil, trace.BadParameter("ACS URI did not include a valid SAML connector ID parameter") - } - - idpInitiated = true - connector, provider, err = sas.getSAMLConnectorAndProviderByID(ctx, connectorID) - if err != nil { - return nil, trace.Wrap(err, "Failed to get SAML connector and provider") - } - case err != nil: - return nil, trace.Wrap(err) - default: - diagCtx.RequestID = requestID - request, err = sas.auth.Identity.GetSAMLAuthRequest(ctx, requestID) - if err != nil { - return nil, trace.Wrap(err, "Failed to get SAML Auth Request") - } - - diagCtx.Info.TestFlow = request.SSOTestFlow - connector, provider, err = sas.getSAMLConnectorAndProvider(ctx, *request) - if err != nil { - return nil, trace.Wrap(err, "Failed to get SAML connector and provider") - } - } - - assertionInfo, err := provider.RetrieveAssertionInfo(samlResponse) - if err != nil { - return nil, trace.AccessDenied("received response with incorrect or missing attribute statements, please check the identity provider configuration to make sure that mappings for claims/attribute statements are set up correctly. , failed to retrieve SAML assertion info from response: %v.", err).AddUserMessage("Failed to retrieve assertion info. This may indicate IdP configuration error.") - } - - if assertionInfo != nil { - diagCtx.Info.SAMLAssertionInfo = (*types.AssertionInfo)(assertionInfo) - } - - if idpInitiated { - if err := sas.checkIDPInitiatedSAML(ctx, connector, assertionInfo); err != nil { - if trace.IsAccessDenied(err) { - log.Warnf("Failed to process IdP-initiated login request. IdP-initiated login is disabled for this connector: %v.", err) - } - - return nil, trace.Wrap(err) - } - } - - if assertionInfo.WarningInfo.InvalidTime { - return nil, trace.AccessDenied("invalid time in SAML assertion info").AddUserMessage("SAML assertion info contained warning: invalid time.") - } - - if assertionInfo.WarningInfo.NotInAudience { - return nil, trace.AccessDenied("no audience in SAML assertion info").AddUserMessage("SAML: not in expected audience. Check auth connector audience field and IdP configuration for typos and other errors.") - } - - log.Debugf("Obtained SAML assertions for %q.", assertionInfo.NameID) - log.Debugf("SAML assertion warnings: %+v.", assertionInfo.WarningInfo) - - attributeStatements := map[string][]string{} - - for key, val := range assertionInfo.Values { - var vals []string - for _, vv := range val.Values { - vals = append(vals, vv.Value) - } - log.Debugf("SAML assertion: %q: %q.", key, vals) - attributeStatements[key] = vals - } - - diagCtx.Info.SAMLAttributeStatements = attributeStatements - diagCtx.Info.SAMLAttributesToRoles = connector.GetAttributesToRoles() - - if len(connector.GetAttributesToRoles()) == 0 { - return nil, trace.BadParameter("no attributes to roles mapping, check connector documentation").AddUserMessage("Attributes-to-roles mapping is empty, SSO user will never have any roles.") - } - - log.Debugf("Applying %v SAML attribute to roles mappings.", len(connector.GetAttributesToRoles())) - - // Calculate (figure out name, roles, traits, session TTL) of user and - // create the user in the backend. - params, err := sas.calculateSAMLUser(diagCtx, connector, *assertionInfo, request) - if err != nil { - return nil, trace.Wrap(err, "Failed to calculate user attributes.") - } - - diagCtx.Info.CreateUserParams = &types.CreateUserParams{ - ConnectorName: params.ConnectorName, - Username: params.Username, - KubeGroups: params.KubeGroups, - KubeUsers: params.KubeUsers, - Roles: params.Roles, - Traits: params.Traits, - SessionTTL: types.Duration(params.SessionTTL), - } - - user, err := sas.createSAMLUser(params, request != nil && request.SSOTestFlow) - if err != nil { - return nil, trace.Wrap(err, "Failed to create user from provided parameters.") - } - - // Auth was successful, return session, certificate, etc. to caller. - auth := &SAMLAuthResponse{ - Identity: types.ExternalIdentity{ - ConnectorID: params.ConnectorName, - Username: params.Username, - }, - Username: user.GetName(), - } - - if request != nil { - auth.Req = SAMLAuthRequestFromProto(request) - } else { - auth.Req = SAMLAuthRequest{ - CreateWebSession: true, - } - } - - // In test flow skip signing and creating web sessions. - if request != nil && request.SSOTestFlow { - diagCtx.Info.Success = true - return auth, nil - } - - // If the request is coming from a browser, create a web session. - if request == nil || request.CreateWebSession { - session, err := sas.auth.CreateWebSessionFromReq(ctx, types.NewWebSessionRequest{ - User: user.GetName(), - Roles: user.GetRoles(), - Traits: user.GetTraits(), - SessionTTL: params.SessionTTL, - LoginTime: sas.auth.GetClock().Now().UTC(), - }) - if err != nil { - return nil, trace.Wrap(err, "Failed to create web session.") - } - - auth.Session = session - } - - // If a public key was provided, sign it and return a certificate. - if request != nil && len(request.PublicKey) != 0 { - sshCert, tlsCert, err := sas.auth.CreateSessionCert(user, params.SessionTTL, request.PublicKey, request.Compatibility, request.RouteToCluster, - request.KubernetesCluster, keys.AttestationStatementFromProto(request.AttestationStatement)) - if err != nil { - return nil, trace.Wrap(err, "Failed to create session certificate.") - } - clusterName, err := sas.auth.GetClusterName() - if err != nil { - return nil, trace.Wrap(err, "Failed to obtain cluster name.") - } - auth.Cert = sshCert - auth.TLSCert = tlsCert - - // Return the host CA for this cluster only. - authority, err := sas.auth.GetCertAuthority(ctx, types.CertAuthID{ - Type: types.HostCA, - DomainName: clusterName.GetClusterName(), - }, false) - if err != nil { - return nil, trace.Wrap(err, "Failed to obtain cluster's host CA.") - } - auth.HostSigners = append(auth.HostSigners, authority) - } - - diagCtx.Info.Success = true - return auth, nil -} diff --git a/lib/auth/saml_test.go b/lib/auth/saml_test.go deleted file mode 100644 index 6f384de385fb4..0000000000000 --- a/lib/auth/saml_test.go +++ /dev/null @@ -1,677 +0,0 @@ -/* -Copyright 2019-2021 Gravitational, Inc. - -Licensed under the Apache License, Version 2.0 (the "License"); -you may not use this file except in compliance with the License. -You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law or agreed to in writing, software -distributed under the License is distributed on an "AS IS" BASIS, -WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -See the License for the specific language governing permissions and -limitations under the License. -*/ - -package auth - -import ( - "context" - "crypto/rand" - "crypto/rsa" - "crypto/x509/pkix" - "encoding/base64" - "encoding/xml" - "net/url" - "testing" - "time" - - "github.com/jonboulle/clockwork" - saml2 "github.com/russellhaering/gosaml2" - samltypes "github.com/russellhaering/gosaml2/types" - "github.com/stretchr/testify/require" - - apidefaults "github.com/gravitational/teleport/api/defaults" - "github.com/gravitational/teleport/api/types" - "github.com/gravitational/teleport/lib/auth/keystore" - authority "github.com/gravitational/teleport/lib/auth/testauthority" - "github.com/gravitational/teleport/lib/backend/memory" - "github.com/gravitational/teleport/lib/defaults" - "github.com/gravitational/teleport/lib/fixtures" - "github.com/gravitational/teleport/lib/services" - "github.com/gravitational/teleport/lib/tlsca" - "github.com/gravitational/teleport/lib/utils" -) - -func TestCreateSAMLUser(t *testing.T) { - t.Parallel() - - ctx := context.Background() - clock := clockwork.NewFakeClockAt(time.Now()) - - b, err := memory.New(memory.Config{ - Context: ctx, - Clock: clock, - }) - require.NoError(t, err) - - clusterName, err := services.NewClusterNameWithRandomID(types.ClusterNameSpecV2{ - ClusterName: "me.localhost", - }) - require.NoError(t, err) - - authConfig := &InitConfig{ - ClusterName: clusterName, - Backend: b, - Authority: authority.New(), - SkipPeriodicOperations: true, - KeyStoreConfig: keystore.Config{ - Software: keystore.SoftwareConfig{ - RSAKeyPairSource: authority.New().GenerateKeyPair, - }, - }, - } - - a, err := NewServer(authConfig) - require.NoError(t, err) - - sas, ok := a.samlAuthService.(*SAMLAuthService) - require.True(t, ok, "Server.samlAuthServer is not type *samlAuthServer") - - // Dry-run creation of SAML user. - user, err := sas.createSAMLUser(&CreateUserParams{ - ConnectorName: "samlService", - Username: "foo@example.com", - Roles: []string{"admin"}, - SessionTTL: 1 * time.Minute, - }, true) - require.NoError(t, err) - require.Equal(t, "foo@example.com", user.GetName()) - - // Dry-run must not create a user. - _, err = a.GetUser("foo@example.com", false) - require.Error(t, err) - - // Create SAML user with 1 minute expiry. - _, err = sas.createSAMLUser(&CreateUserParams{ - ConnectorName: "samlService", - Username: "foo@example.com", - Roles: []string{"admin"}, - SessionTTL: 1 * time.Minute, - }, false) - require.NoError(t, err) - - // Within that 1 minute period the user should still exist. - _, err = a.GetUser("foo@example.com", false) - require.NoError(t, err) - - // Advance time 2 minutes, the user should be gone. - clock.Advance(2 * time.Minute) - _, err = a.GetUser("foo@example.com", false) - require.Error(t, err) -} - -func TestEncryptedSAML(t *testing.T) { - t.Parallel() - - // This Base64 encoded XML blob is a signed SAML response with an encrypted assertion for testing decryption and parsing. - const EncryptedResponse = `<?xml version="1.0"?>
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="pfx0f50ba84-ef67-542f-dd82-2855435e0c80" Version="2.0" IssueInstant="2014-07-17T01:01:48Z" Destination="http://sp.example.com/demo1/index.php?acs" InResponseTo="ONELOGIN_4fee3b046395c4e751011e97f8900b5273d56685">
  <saml:Issuer>http://idp.example.com/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#pfx0f50ba84-ef67-542f-dd82-2855435e0c80"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>MLbsu8XQNqn1XO0jU3xvH/JOjVg=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>rU5CS8VBvFV9wFE/8F54tNA7wQQVloTfDl/HujbpG2AY3YpLmulsSjNvx/sAxkyngIKMQ6tzafCw+6chcew8xmCNqgR5cbCOCo0vQBWixH6ocSaJX4SSmVxHaSjurTMFFgjaEbKb3gnWmahjCoOwMOLdrmZZkbJv9d+Y5TGEX/haRc/mu6oNVOwB/LLuDCw97E91uSTUJo/TOKKUF2XzvaTA01vho3996/jZEZDXGVrLid98942WYecOqzfvSYkKzcZDgvdMnvTu3m2TzWCTjhEsT3ur4698HRireFSnqH6WaaELb1Exabzgq4alDofkRweMxabeyUziEAIhJ8f+5Q==</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIDKjCCAhKgAwIBAgIQJtJDJZZBkg/afM8d2ZJCTjANBgkqhkiG9w0BAQsFADBAMRUwEwYDVQQKEwxUZWxlcG9ydCBPU1MxJzAlBgNVBAMTHnRlbGVwb3J0LmxvY2FsaG9zdC5sb2NhbGRvbWFpbjAeFw0xNzA1MDkxOTQwMzZaFw0yNzA1MDcxOTQwMzZaMEAxFTATBgNVBAoTDFRlbGVwb3J0IE9TUzEnMCUGA1UEAxMedGVsZXBvcnQubG9jYWxob3N0LmxvY2FsZG9tYWluMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuKFLaf2iII/xDR+m2Yj6PnUEa+qzqwxsdLUjnunFZaAXG+hZm4Ml80SCiBgIgTHQlJyLIkTtuRoH5aeMyz1ERUCtii4ZsTqDrjjUybxP4r+4HVX6m34s6hwEr8Fifts9pMp4iS3tQguRc28gPdDo/T6VrJTVYUfUUsNDRtIrlB5O9igqqLnuaY9eqGi4PUx0G0wRYJpRywoj8G0IkpfQTiX+CAC7dt5ws7ZrnGqCNBLGi5bGsaMmptVbsSEp1TenntF54V1iR49IV5JqDhm1S0HmkleoJzKdc+6sP/xNepz9PJzuF9d9NubTLWgBsK28YItcmWHdHXD/ODxVaehRjwIDAQABoyAwHjAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAQEAAVU6sNBdj76saHwOxGSdnEqQo2tMuR3msSM4F6wFK2UkKepsD7CYIf/PzNSNUqA5JIEUVeMqGyiHuAbU4C655nT1IyJX1D/+r73sSp5jbIpQm2xoQGZnj6g/Kltw8OSOAw+DsMF/PLVqoWJp07u6ew/mNxWsJKcZ5k+q4eMxci9mKRHHqsquWKXzQlURMNFI+mGaFwrKM4dmzaR0BEc+ilSxQqUvQ74smsLK+zhNikmgjlGC5ob9g8XkhVAkJMAh2rb9onDNiRl68iAgczP88mXuvN/o98dypzsPxXmw6tkDqIRPUAUbh465rlY5sKMmRgXi2rUfl/QV5nbozUo/HQ==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature>
  <samlp:Status>
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  </samlp:Status>
  
<saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>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</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>` - - // This XML blob is a sample EntityDescriptor made to satisfy the connector validator for testing. - const EntityDescriptor = ` - - - - - - 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 - - - - - - - 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 - - - - urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified - - - ` - - signingKeypair := &types.AsymmetricKeyPair{ - Cert: fixtures.TLSCACertPEM, - PrivateKey: fixtures.TLSCAKeyPEM, - } - - encryptionKeypair := &types.AsymmetricKeyPair{ - Cert: fixtures.EncryptionCertPEM, - PrivateKey: fixtures.EncryptionKeyPEM, - } - - connector, err := types.NewSAMLConnector("spongebob", types.SAMLConnectorSpecV2{ - Cert: signingKeypair.Cert, - Issuer: "http://idp.example.com/metadata.php", - SSO: "nil", - AssertionConsumerService: "http://sp.example.com/demo1/index.php?acs", - EntityDescriptor: EntityDescriptor, - }) - require.NoError(t, err) - - connector.SetSigningKeyPair(signingKeypair) - connector.SetEncryptionKeyPair(encryptionKeypair) - - clock := clockwork.NewFakeClockAt(time.Date(2021, time.April, 4, 0, 0, 0, 0, time.UTC)) - provider, err := services.GetSAMLServiceProvider(connector, clock) - require.NoError(t, err) - assertionInfo, err := provider.RetrieveAssertionInfo(EncryptedResponse) - require.NoError(t, err) - require.NotEmpty(t, assertionInfo.Assertions) -} - -// TestPingSAMLWorkaround ensures we provide required additional authn query -// parameters for Ping backends (PingOne, PingFederate, etc) when -// `provider: ping` is set. -func TestPingSAMLWorkaround(t *testing.T) { - t.Parallel() - - ctx := context.Background() - clock := clockwork.NewFakeClockAt(time.Now()) - - // Create a Server instance for testing. - b, err := memory.New(memory.Config{ - Context: ctx, - Clock: clock, - }) - require.NoError(t, err) - - clusterName, err := services.NewClusterNameWithRandomID(types.ClusterNameSpecV2{ - ClusterName: "me.localhost", - }) - require.NoError(t, err) - - authConfig := &InitConfig{ - ClusterName: clusterName, - Backend: b, - Authority: authority.New(), - SkipPeriodicOperations: true, - KeyStoreConfig: keystore.Config{ - Software: keystore.SoftwareConfig{ - RSAKeyPairSource: authority.New().GenerateKeyPair, - }, - }, - } - - a, err := NewServer(authConfig) - require.NoError(t, err) - - // Create a new SAML connector for Ping. - const entityDescriptor = ` - - - - - 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 - - - - - - - - - ` - - signingKeypair := &types.AsymmetricKeyPair{ - Cert: fixtures.TLSCACertPEM, - PrivateKey: fixtures.TLSCAKeyPEM, - } - - encryptionKeypair := &types.AsymmetricKeyPair{ - Cert: fixtures.EncryptionCertPEM, - PrivateKey: fixtures.EncryptionKeyPEM, - } - - // SAML connector validation requires the roles in mappings exist. - role, err := types.NewRole("admin", types.RoleSpecV5{}) - require.NoError(t, err) - err = a.CreateRole(ctx, role) - require.NoError(t, err) - - connector, err := types.NewSAMLConnector("ping", types.SAMLConnectorSpecV2{ - AssertionConsumerService: "https://proxy.example.com:3080/v1/webapi/saml/acs", - Provider: "ping", - Display: "Ping", - AttributesToRoles: []types.AttributeMapping{ - {Name: "groups", Value: "ping-admin", Roles: []string{role.GetName()}}, - }, - EntityDescriptor: entityDescriptor, - SigningKeyPair: signingKeypair, - EncryptionKeyPair: encryptionKeypair, - }) - require.NoError(t, err) - - err = a.UpsertSAMLConnector(ctx, connector) - require.NoError(t, err) - - // Create an auth request that we can inspect. - req, err := a.CreateSAMLAuthRequest(ctx, types.SAMLAuthRequest{ - ConnectorID: "ping", - }) - require.NoError(t, err) - - // Parse the generated redirection URL. - parsed, err := url.Parse(req.RedirectURL) - require.NoError(t, err) - - require.Equal(t, "auth.pingone.com", parsed.Host) - require.Equal(t, "/8be7412d-7d2f-4392-90a4-07458d3dee78/saml20/idp/sso", parsed.Path) - - // SigAlg and Signature must be added when `provider: ping`. - require.NotEmpty(t, parsed.Query().Get("SigAlg"), "SigAlg is required for provider: ping") - require.NotEmpty(t, parsed.Query().Get("Signature"), "Signature is required for provider: ping") -} - -func TestServer_getConnectorAndProvider(t *testing.T) { - t.Parallel() - - ctx := context.Background() - clock := clockwork.NewFakeClockAt(time.Now()) - - // Create a Server instance for testing. - b, err := memory.New(memory.Config{ - Context: ctx, - Clock: clock, - }) - require.NoError(t, err) - - clusterName, err := services.NewClusterNameWithRandomID(types.ClusterNameSpecV2{ - ClusterName: "me.localhost", - }) - require.NoError(t, err) - - authConfig := &InitConfig{ - ClusterName: clusterName, - Backend: b, - Authority: authority.New(), - SkipPeriodicOperations: true, - KeyStoreConfig: keystore.Config{ - Software: keystore.SoftwareConfig{ - RSAKeyPairSource: authority.New().GenerateKeyPair, - }, - }, - } - - a, err := NewServer(authConfig) - require.NoError(t, err) - - sas, ok := a.samlAuthService.(*SAMLAuthService) - require.True(t, ok, "Server.samlAuthServer is not type *samlAuthServer") - - _, err = CreateRole(ctx, a, "baz", types.RoleSpecV5{}) - require.NoError(t, err) - - caKey, err := rsa.GenerateKey(rand.Reader, 2048) - require.NoError(t, err) - - tlsCert, err := tlsca.GenerateSelfSignedCAWithSigner( - caKey, - pkix.Name{ - CommonName: "server1", - Organization: []string{"server1"}, - }, nil, defaults.CATTL) - require.NoError(t, err) - require.NotNil(t, tlsCert) - - keyPEM, certPEM, err := utils.GenerateSelfSignedSigningCert(pkix.Name{ - Organization: []string{"Teleport OSS"}, - CommonName: "teleport.localhost.localdomain", - }, nil, 10*365*24*time.Hour) - require.NoError(t, err) - - request := types.SAMLAuthRequest{ - ID: "ABC", - ConnectorID: "zzz", - CheckUser: false, - PublicKey: nil, - CertTTL: 0, - CreateWebSession: false, - SSOTestFlow: true, - ConnectorSpec: &types.SAMLConnectorSpecV2{ - Issuer: "test", - Audience: "test", - ServiceProviderIssuer: "test", - SSO: "test", - Cert: string(tlsCert), - AssertionConsumerService: "test", - AttributesToRoles: []types.AttributeMapping{{ - Name: "foo", - Value: "bar", - Roles: []string{"baz"}, - }}, - SigningKeyPair: &types.AsymmetricKeyPair{ - PrivateKey: string(keyPEM), - Cert: string(certPEM), - }, - }, - } - - connector, provider, err := sas.getSAMLConnectorAndProvider(context.Background(), request) - require.NoError(t, err) - require.NotNil(t, connector) - require.NotNil(t, provider) - - expectedConnector := &types.SAMLConnectorV2{Kind: "saml", Version: "v2", Metadata: types.Metadata{Name: "zzz", Namespace: apidefaults.Namespace}, Spec: *request.ConnectorSpec} - require.Equal(t, expectedConnector, connector) - - require.Equal(t, "test", provider.IdentityProviderSSOURL) - require.Equal(t, "test", provider.IdentityProviderIssuer) - require.Equal(t, "test", provider.AssertionConsumerServiceURL) - require.Equal(t, "test", provider.ServiceProviderIssuer) - - conn, err := types.NewSAMLConnector("foo", types.SAMLConnectorSpecV2{ - Issuer: "test", - SSO: "test", - Cert: string(tlsCert), - AssertionConsumerService: "test", - AttributesToRoles: []types.AttributeMapping{{ - Name: "foo", - Value: "bar", - Roles: []string{"baz"}, - }}, - }) - require.NoError(t, err) - - err = a.UpsertSAMLConnector(ctx, conn) - require.NoError(t, err) - - request2 := types.SAMLAuthRequest{ - ID: "ABC", - ConnectorID: "foo", - SSOTestFlow: false, - } - - connector, provider, err = sas.getSAMLConnectorAndProvider(context.Background(), request2) - require.NoError(t, err) - require.NotNil(t, connector) - require.NotNil(t, provider) -} - -func TestServer_ValidateSAMLResponse(t *testing.T) { - t.Parallel() - - ctx := context.Background() - clock := clockwork.NewFakeClockAt(time.Date(2022, 4, 25, 9, 0, 0, 0, time.UTC)) - - // Create a Server instance for testing. - b, err := memory.New(memory.Config{ - Context: ctx, - Clock: clock, - }) - require.NoError(t, err) - - clusterName, err := services.NewClusterNameWithRandomID(types.ClusterNameSpecV2{ - ClusterName: "me.localhost", - }) - require.NoError(t, err) - - authConfig := &InitConfig{ - ClusterName: clusterName, - Backend: b, - Authority: authority.New(), - SkipPeriodicOperations: true, - KeyStoreConfig: keystore.Config{ - Software: keystore.SoftwareConfig{ - RSAKeyPairSource: authority.New().GenerateKeyPair, - }, - }, - } - - a, err := NewServer(authConfig, WithClock(clock)) - require.NoError(t, err) - - sas, ok := a.samlAuthService.(*SAMLAuthService) - require.True(t, ok, "Server.samlAuthServer is not type *samlAuthServer") - - // empty response gives error. - response, err := a.ValidateSAMLResponse(context.Background(), "", "") - require.Nil(t, response) - require.Error(t, err) - - // create role referenced in request. - role, err := types.NewRole("access", types.RoleSpecV5{ - Allow: types.RoleConditions{ - Logins: []string{"dummy"}, - }, - }) - require.NoError(t, err) - err = a.CreateRole(ctx, role) - require.NoError(t, err) - - // real response from Okta - respOkta := `http://www.okta.com/exk14fxcpjuKMcor30h8uBRfvYvl5C/LPCh36uAmRLHW76+aDP3ngChtIwP3/Fc=M1VfkOOBH6r7niHhfGvf4OJ1HH5QJl83aD/b+mTDUUnXzHXgXlkb0BGQkSFn6ixojwCoXchpxCNzVLPN/tvfyY1dxP4MO8b+/07bGuVD2yTNlhN43/FFcDpmZ1ZDW8w2nPF1E5gy1lR8Wx2NgT3kQ2Ui1vRNX/KeX/P9NnABj4AjcshyHK2e49WLM/D4U84XOl7ODtzS7PTvtB0SGIwRE25G//8AsAv81eBfHL54Nz1HAqinMhxQtz32ZDXpKaAV6GypyBTvk6vo7Pkk4OiL6G9VIGC8Bd/gnavsc+Ickfuo7KTq8NDKTLB5WG34XKJqq6dGopSMrxr67oYjCEDZfw==MIIDpDCCAoygAwIBAgIGAX4zyofpMA0GCSqGSIb3DQEBCwUAMIGSMQswCQYDVQQGEwJVUzETMBEG -A1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEU -MBIGA1UECwwLU1NPUHJvdmlkZXIxEzARBgNVBAMMCmRldi04MTMzNTQxHDAaBgkqhkiG9w0BCQEW -DWluZm9Ab2t0YS5jb20wHhcNMjIwMTA3MDkwNTU4WhcNMzIwMTA3MDkwNjU4WjCBkjELMAkGA1UE -BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNV -BAoMBE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRMwEQYDVQQDDApkZXYtODEzMzU0MRwwGgYJ -KoZIhvcNAQkBFg1pbmZvQG9rdGEuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA -xQz+tLD5cNlOBfdohHvqNWIfC13OCSnUAe20qA0K8y+jtZrpwjtjjLX8iRuCx8dYc/nd6zYOhhSq -2sLmrRa09wUXXTgnLGcj50gePTaroYLyF4FNgQWLvPHJk0FGcx6JvD6L+V5RzYwH87Fhg8niP4LZ -EBw3iZnsIJN9KOuLuQeXTW0PIlMFzpCwT9aUCHCoLepe5Ou8oi8XcOCmsOESHPchV2RC/xQDIqRP -Lp1Sf7NNJ6mTmP2gOoLwsz95beOLrEI+PI/GgZBqM3OutWA0L9mAbJK9T5dPAvhnwCV+SK2HvicJ -T8c6uJxuKmoWv1t3SyaN0cIbmw6vj9CIf4DTwQIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQCWGgLL -f3tgUZRGjmR5iiKeOeaEWG/eaF1nfenVfSaWT9ckimcXyLCY/P7CXEBiioVrxjky07iceJpi4rVE -RcVZ8SGXCa0NroESmIFlIHez6vRTrqUsfDmidxsSCwY02eaBq+9gK5iXV5WeXMKbn0yeGwF+3PkU -RAH1HuypwMH0FJRLIdW36pw7FCrGrXpk3UC6mEumXC9FptjSK1FlW+ZckgDprePOoUpypEygr2UC -XXOsqT0dwBUUttdOQMZHqIiXS5VPJ8zhYPHBGYI8WGk5FWVuXIXhgRm7LN/EyXIvCOFmDH0tVnQL -V115UGOwvjOOxmOFbYBn865SHgMndFtrhttp://www.okta.com/exk14fxcpjuKMcor30h8XwJSotSzU2qLdzu/WDk8dpQ/Cy1Id88932S/95+N+Ds=qyIvGi1+w93AdGUj0+T5RYAq+CAjLSScMTMc7dLTEze6qr3mP51W/bCoZz8E47lpsbLeh0EiATa6h2Uaj6/34rILfCt3aQRNjNicu0gBKhePyNraapdnoyeqJEV8UrAOOKFiH30e5AvQ1nRZqfgY7KMt6cZH5/eXjUS63lPJJn4yr9vLw9loCdHCoHlaseh2IHi7CickyyxSMTX+Y58zpBy2g/KwN3K4oZM4a10ZYWkZpzkZJXDRSUkEc/wTTO7IPPY7Zv7R7UC+zjf5Px1sYeKTkkIxlZViZmtqjYuhibnTmhroJx7wX/LtOPxCkwLHlQRDACBNbP/UtrudU1ZMxA==MIIDpDCCAoygAwIBAgIGAX4zyofpMA0GCSqGSIb3DQEBCwUAMIGSMQswCQYDVQQGEwJVUzETMBEG -A1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzENMAsGA1UECgwET2t0YTEU -MBIGA1UECwwLU1NPUHJvdmlkZXIxEzARBgNVBAMMCmRldi04MTMzNTQxHDAaBgkqhkiG9w0BCQEW -DWluZm9Ab2t0YS5jb20wHhcNMjIwMTA3MDkwNTU4WhcNMzIwMTA3MDkwNjU4WjCBkjELMAkGA1UE -BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDTALBgNV -BAoMBE9rdGExFDASBgNVBAsMC1NTT1Byb3ZpZGVyMRMwEQYDVQQDDApkZXYtODEzMzU0MRwwGgYJ -KoZIhvcNAQkBFg1pbmZvQG9rdGEuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA -xQz+tLD5cNlOBfdohHvqNWIfC13OCSnUAe20qA0K8y+jtZrpwjtjjLX8iRuCx8dYc/nd6zYOhhSq -2sLmrRa09wUXXTgnLGcj50gePTaroYLyF4FNgQWLvPHJk0FGcx6JvD6L+V5RzYwH87Fhg8niP4LZ -EBw3iZnsIJN9KOuLuQeXTW0PIlMFzpCwT9aUCHCoLepe5Ou8oi8XcOCmsOESHPchV2RC/xQDIqRP -Lp1Sf7NNJ6mTmP2gOoLwsz95beOLrEI+PI/GgZBqM3OutWA0L9mAbJK9T5dPAvhnwCV+SK2HvicJ -T8c6uJxuKmoWv1t3SyaN0cIbmw6vj9CIf4DTwQIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQCWGgLL -f3tgUZRGjmR5iiKeOeaEWG/eaF1nfenVfSaWT9ckimcXyLCY/P7CXEBiioVrxjky07iceJpi4rVE -RcVZ8SGXCa0NroESmIFlIHez6vRTrqUsfDmidxsSCwY02eaBq+9gK5iXV5WeXMKbn0yeGwF+3PkU -RAH1HuypwMH0FJRLIdW36pw7FCrGrXpk3UC6mEumXC9FptjSK1FlW+ZckgDprePOoUpypEygr2UC -XXOsqT0dwBUUttdOQMZHqIiXS5VPJ8zhYPHBGYI8WGk5FWVuXIXhgRm7LN/EyXIvCOFmDH0tVnQL -V115UGOwvjOOxmOFbYBn865SHgMndFtrops@gravitational.iohttps://boson.tener.io:3080/v1/webapi/saml/acsurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransportops@gravitational.ioEveryoneokta-adminokta-dev` - - caKey, err := rsa.GenerateKey(rand.Reader, 2048) - require.NoError(t, err) - - tlsCert, err := tlsca.GenerateSelfSignedCAWithSigner( - caKey, - pkix.Name{ - CommonName: "server1", - Organization: []string{"server1"}, - }, nil, defaults.CATTL) - require.NoError(t, err) - require.NotNil(t, tlsCert) - - keyPEM, certPEM, err := utils.GenerateSelfSignedSigningCert(pkix.Name{ - Organization: []string{"Teleport OSS"}, - CommonName: "teleport.localhost.localdomain", - }, nil, 10*365*24*time.Hour) - require.NoError(t, err) - - // SAML connector validation requires the roles in mappings exist. - connectorRole, err := types.NewRole("baz", types.RoleSpecV5{}) - require.NoError(t, err) - err = a.CreateRole(ctx, connectorRole) - require.NoError(t, err) - - conn, err := types.NewSAMLConnector("saml-test-conn", types.SAMLConnectorSpecV2{ - Issuer: "test", - SSO: "test", - Cert: string(tlsCert), - AssertionConsumerService: "test", - AttributesToRoles: []types.AttributeMapping{{ - Name: "foo", - Value: "bar", - Roles: []string{connectorRole.GetName()}, - }}, - SigningKeyPair: &types.AsymmetricKeyPair{ - PrivateKey: string(keyPEM), - Cert: string(certPEM), - }, - }) - require.NoError(t, err) - - err = a.UpsertSAMLConnector(ctx, conn) - require.NoError(t, err) - - err = a.Services.CreateSAMLAuthRequest(ctx, types.SAMLAuthRequest{ - ID: "_4f256462-6c2d-466d-afc0-6ee36602b6f2", - ConnectorID: "saml-test-conn", - SSOTestFlow: true, - RedirectURL: "https://dev-813354.oktapreview.com/app/dev-813354_krzysztofssodev_1/exk14fxcpjuKMcor30h8/sso/saml?SAMLRequest=lFZZk6JKE%2F0rHc6jYbOIiMbtiSgWEREEQVBfbrAUUMiiFFLgr%2F9i7Jm%2BPXf75j5mUifz5MmMJH%2FDQVlcl%2BDeZtUe3u4Qty99WVR4%2BfzwNro31bIOMMLLKighXrbR0gHGdsm%2B0strU7d1VBejT5B%2FRwQYw6ZFdTV60eS30e9cws54jmcnfMTGE47n40mQRPSEh3DK8zQb8gk7evFgg1FdvY3YV3r0Yn3PKqIqRlX67wnD90d4uXZda2LtHHf0An6QkOoK30vYOLDpUAQP%2B%2B3bKGvbK15SVFjjunptYQWbV1Qvp7RAUx1DERgGV0R9q5QKIjx60TC%2BQ63CbVC1byOWZtkJzU3YmUsLy9lsyQjn0YsMcYuqoH3W8CNBDLuJwEynM%2B61vrTBtYEdguQ1qksquF4%2Fff790jwG%2FGjrBOM6ht3vDAX7C8MlfXTN77oR1c2UzgQK4%2FrJa%2FT12dTlk1nz9b8V9Bv1GftbjJcOSqugvTfwe5Nj%2FF7DkqIIIa9k%2Blo3KcXSNE3RC6ovixij9MvoAwtjrUrqpykFVV2hKCjQ4ymGAdusjl9AkdYNarPyHwLzFMN%2BCzyJGK5imBH1M69fjMJQNPeD3qSsG%2FilwcEEZwE747%2BH3MMENrCK4Mthr72NvvzaeD6hbhNUOKmbEv9s%2Fl9aP6kGqw4W9RXGE%2Fyjuu%2FUfj3g36hF%2FZWgjFKI2%2F8oHayiLz8J9h7FC4o7%2FGogv2z54Iyj8bXj7FAoDc5Dwf3O0atwvsq3Ju%2FKBm0Bcnh7MvoMfjo%2B5H83%2FzQ8H%2F1%2BR2wJqAs5PUmLBA%2B5pPtrwRn4rhbER6QzrNHr9h1nztqm1S0kJT1Oo0NfxHRdnvx%2B27Lurbdl8FgdEZvM3FBqnV1DeHisSX7ezTHT24DMvdJBpb%2FlrVj0UmQk%2BVHhB1MyU65CSl2t1cHyBANokpgwPbrm86ne%2BBssK0UEVoAqlKFREkvel%2BWM7Qkv7MVOsUg0X%2FM3Yc1x2prVjXw4CUVxccn6UO53BsObdG4MpcBNGcYaWyp9NBQXcRTKtqSdVpyo7zM7PA6OQ53nJ0%2BMTGtqHpFmVLfxdnaKUpMa32Wt2N%2Bsy0NYr8aC7gxb5KPAnR%2Flta%2B0VaWa8I5XdyHSZ3XZiMM4Ho9tKaHA29uH9J%2B0%2Fia%2FDoePVhxn9EIO2uDDkL7t0wRFQQu%2FGpom6w9JAtkuBUQTQartwVbT871EMqWEfmR2ZGASUToQ2T5t9PqsZV1kAlvZijYgtqx4hmiogDkoUmYYnurh81HsospOXcZ0DSciG%2Fske7YtK%2F2MPvt9EamLIZZmOGTNLFSzLpra91Bd5Ce%2Fv4QskwU%2BR9ZZZBq5RkxZYww5ZYyHwvnffI%2Bnb%2Fjw5SIw9geikGcOXSH94Y8conVgjH7zAIWYmp4IDHdd7YtQ9Ug43dDbsu9O7AoH6uLxB599F%2Fqra5hLEnC0P9csijaQ01SxgCxJwK6lNFVEYAZRd7v7M%2BFkb1nIzriDojbZoOe3vb2z8xUppklq%2BWaQ9tNq84j53vOPQqEG7KbjFFo93MIT2GoBVXgNOCVuy9oqdDirWoiHq6pTV9NKdySK52MZjvO5hjMLye6miZrHoqR7nN96vqwyTKsb%2FZTz7W63urT12CWsdlmV05vNRw6rcpcdjw26i3w%2FgNhShGyfn%2BVNfM%2Bgf7xk1IWiu16cx7QVxoXZFJej1yyctR%2FHM51Hjqe4xgy4sraoSXSSbuJj8O%2F0GMw4xO38u5s6F3Z6m7GPqddGEb3SRKII6%2FMBGHGHUkd30Km51Xi%2FSFhm3%2FN%2BRBToqKs5ZeJzCQKj7u1wk%2FYL9mblYsBeBAkQBYDASA2RI3J6kr09bQF7TYnAlkEKgQHIt7mLFaKIFLElA4C%2Fm1H52SP56MXrtT1di%2FxxbqOHV9mUlKYPZacgQ2KkAveXIzxXIrPm3etKKRd5787nrSeqIt0vYjAopNyRE0iT8WrmbrSCL2%2FJoIVHfXxc9bcgquX1tWmt9lbe1ky7Z2l1EVlC2SdhOQ5v3LzZ%2BSbTpqDUir4P9vyZVV2Ffehk1g15fMYOiqX%2BEixOsS%2BAVImuldfCW583mHN2UYjijYbHC7PqW3DdWIa%2B2l3CS5dv%2BtkCXxIJm1VzEeSpBJGM3Dm1NuStwUXCVHFVmpMo52E6nVpcE54uXS2%2FDI8hBnqnIR2hBWZLRkfuDqu6d5GVZmyFRl1zA3%2Fci3Tr1WUs2f1DOm9lzCPSIVU9wGZOtPcF9Oel8uF8XzvU54X008L6%2Bv2gNYMSarJVFygaXkBR1ERqYNDCt1Hb3OHoZVU3ZdD%2B8%2B3IvDJPD4onyfPp8l7hK4xQgmD8%2FKf%2B9XD%2B%2Br8AAAD%2F%2Fw%3D%3D", - ClientRedirectURL: "http://127.0.0.1:57293/callback?secret_key=70e98f8871530e66e6a136ae71fe002454dc1c76d754f090f895508a2226c36b", - ConnectorSpec: &types.SAMLConnectorSpecV2{ - Issuer: "http://www.okta.com/exk14fxcpjuKMcor30h8", - SSO: "https://dev-813354.oktapreview.com/app/dev-813354_krzysztofssodev_1/exk14fxcpjuKMcor30h8/sso/saml", - Cert: "", - Display: "Okta", - AssertionConsumerService: "https://boson.tener.io:3080/v1/webapi/saml/acs", - Audience: "https://boson.tener.io:3080/v1/webapi/saml/acs", - ServiceProviderIssuer: "https://boson.tener.io:3080/v1/webapi/saml/acs", - EntityDescriptor: "\u003c?xml version=\"1.0\" encoding=\"UTF-8\"?\u003e\u003cmd:EntityDescriptor entityID=\"http://www.okta.com/exk14fxcpjuKMcor30h8\" xmlns:md=\"urn:oasis:names:tc:SAML:2.0:metadata\"\u003e\u003cmd:IDPSSODescriptor WantAuthnRequestsSigned=\"false\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\"\u003e\u003cmd:KeyDescriptor use=\"signing\"\u003e\u003cds:KeyInfo xmlns:ds=\"http://www.w3.org/2000/09/xmldsig#\"\u003e\u003cds:X509Data\u003e\u003cds:X509Certificate\u003eMIIDpDCCAoygAwIBAgIGAX4zyofpMA0GCSqGSIb3DQEBCwUAMIGSMQswCQYDVQQGEwJVUzETMBEG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\nV115UGOwvjOOxmOFbYBn865SHgMndFtr\u003c/ds:X509Certificate\u003e\u003c/ds:X509Data\u003e\u003c/ds:KeyInfo\u003e\u003c/md:KeyDescriptor\u003e\u003cmd:NameIDFormat\u003eurn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress\u003c/md:NameIDFormat\u003e\u003cmd:SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://dev-813354.oktapreview.com/app/dev-813354_krzysztofssodev_1/exk14fxcpjuKMcor30h8/sso/saml\"/\u003e\u003cmd:SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://dev-813354.oktapreview.com/app/dev-813354_krzysztofssodev_1/exk14fxcpjuKMcor30h8/sso/saml\"/\u003e\u003c/md:IDPSSODescriptor\u003e\u003c/md:EntityDescriptor\u003e", - EntityDescriptorURL: "", - AttributesToRoles: []types.AttributeMapping{ - { - Name: "groups", - Value: "okta-admin", - Roles: []string{"access"}, - }, - }, - SigningKeyPair: &types.AsymmetricKeyPair{ - PrivateKey: "-----BEGIN RSA PRIVATE KEY-----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\nDFXT1B5qhKHdZFr71AIGPrUjfsRQV8tPKFjRkuQ0zqEPvi4g06RMRw==\n-----END RSA PRIVATE KEY-----\n", - Cert: "-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n", - }, - Provider: "", - EncryptionKeyPair: nil, - }, - }, defaults.SAMLAuthRequestTTL) - require.NoError(t, err) - - // check ValidateSAMLResponse - response, err = sas.ValidateSAMLResponse(context.Background(), base64.StdEncoding.EncodeToString([]byte(respOkta)), "") - require.NoError(t, err) - require.NotNil(t, response) - - // check internal method, validate diagnostic outputs. - diagCtx := NewSSODiagContext(types.KindSAML, a) - auth, err := sas.validateSAMLResponse(context.Background(), diagCtx, base64.StdEncoding.EncodeToString([]byte(respOkta)), "") - require.NoError(t, err) - - // ensure diag info got stored and is identical. - infoFromBackend, err := a.GetSSODiagnosticInfo(context.Background(), types.KindSAML, auth.Req.ID) - require.NoError(t, err) - require.Equal(t, &diagCtx.Info, infoFromBackend) - - // verify values - require.Equal(t, "ops@gravitational.io", auth.Username) - require.Equal(t, "ops@gravitational.io", auth.Identity.Username) - require.Equal(t, "saml-test-conn", auth.Identity.ConnectorID) - require.Equal(t, "_4f256462-6c2d-466d-afc0-6ee36602b6f2", auth.Req.ID) - require.Equal(t, 0, len(auth.HostSigners)) - - authnInstant := time.Date(2022, 4, 25, 8, 3, 11, 779000000, time.UTC) - - // ignore, this is boring and very complex. - require.NotNil(t, diagCtx.Info.SAMLAssertionInfo.Assertions) - diagCtx.Info.SAMLAssertionInfo.Assertions = nil - - require.Equal(t, types.SSODiagnosticInfo{ - TestFlow: true, - Error: "", - Success: true, - CreateUserParams: &types.CreateUserParams{ - ConnectorName: "saml-test-conn", - Username: "ops@gravitational.io", - Roles: []string{"access"}, - Traits: map[string][]string{ - "groups": {"Everyone", "okta-admin", "okta-dev"}, - "username": {"ops@gravitational.io"}, - }, - SessionTTL: 108000000000000, - }, - SAMLAttributesToRoles: []types.AttributeMapping{ - { - Name: "groups", - Value: "okta-admin", - Roles: []string{"access"}, - }, - }, - SAMLAttributesToRolesWarnings: nil, - SAMLAttributeStatements: map[string][]string{ - "groups": {"Everyone", "okta-admin", "okta-dev"}, - "username": {"ops@gravitational.io"}, - }, - SAMLAssertionInfo: &types.AssertionInfo{ - NameID: "ops@gravitational.io", - Values: map[string]samltypes.Attribute{ - "groups": { - XMLName: xml.Name{Space: "urn:oasis:names:tc:SAML:2.0:assertion", Local: "Attribute"}, - Name: "groups", - NameFormat: "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - Values: []samltypes.AttributeValue{ - { - XMLName: xml.Name{Space: "urn:oasis:names:tc:SAML:2.0:assertion", Local: "AttributeValue"}, - Value: "Everyone", - }, - { - XMLName: xml.Name{Space: "urn:oasis:names:tc:SAML:2.0:assertion", Local: "AttributeValue"}, - Value: "okta-admin", - }, - { - XMLName: xml.Name{Space: "urn:oasis:names:tc:SAML:2.0:assertion", Local: "AttributeValue"}, - Value: "okta-dev", - }, - }, - }, - "username": { - XMLName: xml.Name{Space: "urn:oasis:names:tc:SAML:2.0:assertion", Local: "Attribute"}, - Name: "username", - NameFormat: "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified", - Values: []samltypes.AttributeValue{ - { - XMLName: xml.Name{Space: "urn:oasis:names:tc:SAML:2.0:assertion", Local: "AttributeValue"}, - Value: "ops@gravitational.io", - }, - }, - }, - }, - WarningInfo: &saml2.WarningInfo{}, - SessionIndex: "_4f256462-6c2d-466d-afc0-6ee36602b6f2", - AuthnInstant: &authnInstant, - SessionNotOnOrAfter: nil, - Assertions: nil, - ResponseSignatureValidated: true, - }, - SAMLTraitsFromAssertions: map[string][]string{ - "groups": {"Everyone", "okta-admin", "okta-dev"}, - "username": {"ops@gravitational.io"}, - }, - SAMLConnectorTraitMapping: []types.TraitMapping{ - { - Trait: "groups", - Value: "okta-admin", - Roles: []string{"access"}, - }, - }, - }, diagCtx.Info) - - // make sure no users have been created. - users, err := a.GetUsers(false) - require.NoError(t, err) - require.Equal(t, 0, len(users)) -}