Skip to content

Conversation

@jkakavas
Copy link
Contributor

@jkakavas jkakavas commented Jul 8, 2019

This commit changes the behavior of our SAML realm to not set a
Format element in the NameIDPolicy of a SAML Authentication
request if one has not been explicitly configured by the user
with nameid_format. We select to not include a format, rather
than setting it to
urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified which would
have the same effect, in order to maximize interoperability with
IdP implementations. AllowCreate is not removed as this has a
default value (false) in the specification.

Relates: #40353

This commit changes the behavior of our SAML realm to not set a
Format element in the NameIDPolicy of a SAML Authentication
request if one has not been explicitly configured by the user
with `nameid_format`. We select to not include a format, rather
than setting it to
`urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified` which would
have the same effect, in order to maximize interoperability with
IdP implementations. `AllowCreate` is not removed as this has a
default value (false) in the specification.

Relates: elastic#40353
@jkakavas jkakavas added >breaking :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) v8.0.0 labels Jul 8, 2019
@jkakavas jkakavas requested a review from tvernum July 8, 2019 21:20
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security

Copy link
Contributor

@tvernum tvernum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@jkakavas jkakavas merged commit 6ec2647 into elastic:master Jul 9, 2019
jkakavas added a commit to jkakavas/elasticsearch that referenced this pull request Sep 15, 2021
We changed the default for `nameid_format` in 8.0 in elastic#44090 but
did not add anything to the breaking changes in the release notes.
This change amends that.
masseyke added a commit that referenced this pull request Sep 15, 2021
In 8.0 the behavior of an unset saml nameid_format setting. This commit adds a check to the deprecation
info API that warns users of this change, if they are using saml without nameid_format being set.
Relates #42404 #44090
lockewritesdocs pushed a commit that referenced this pull request Oct 19, 2021
* Add note in breaking changes for nameid_format

We changed the default for `nameid_format` in 8.0 in #44090 but
did not add anything to the breaking changes in the release notes.
This change amends that.

* remove reference to settings

* Fix docs build

* Accepting most of James' suggested changes

Thanks James!

Co-authored-by: James Rodewig <[email protected]>

* Incorporating changes from Ioannis

* Apply suggestions from code review

Co-authored-by: Tim Vernum <[email protected]>

* Apply suggestions from code review

Co-authored-by: Ioannis Kakavas <[email protected]>

Co-authored-by: James Rodewig <[email protected]>
Co-authored-by: Adam Locke <[email protected]>
Co-authored-by: Tim Vernum <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

>breaking :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) v8.0.0-alpha1

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants