Skip to content
Snippets Groups Projects
Unverified Commit ba723caa authored by Márk Sági-Kazár's avatar Márk Sági-Kazár Committed by GitHub
Browse files

Merge pull request #1704 from srenatus/sr/saml/filter-allowed-groups

connector/saml: add 'FilterGroups' setting
parents c0dfeb70 4a0feaf5
No related branches found
No related tags found
No related merge requests found
...@@ -18,6 +18,8 @@ The connector doesn't support signed AuthnRequests or encrypted attributes. ...@@ -18,6 +18,8 @@ The connector doesn't support signed AuthnRequests or encrypted attributes.
The SAML Connector supports providing a whitelist of SAML Groups to filter access based on, and when the `groupsattr` is set with a scope including groups, Dex will check for membership based on configured groups in the `allowedGroups` config setting for the SAML connector. The SAML Connector supports providing a whitelist of SAML Groups to filter access based on, and when the `groupsattr` is set with a scope including groups, Dex will check for membership based on configured groups in the `allowedGroups` config setting for the SAML connector.
If `filterGroups` is set to true, any groups _not_ part of `allowedGroups` will be excluded.
## Configuration ## Configuration
```yaml ```yaml
......
...@@ -101,6 +101,7 @@ type Config struct { ...@@ -101,6 +101,7 @@ type Config struct {
// used split the groups string. // used split the groups string.
GroupsDelim string `json:"groupsDelim"` GroupsDelim string `json:"groupsDelim"`
AllowedGroups []string `json:"allowedGroups"` AllowedGroups []string `json:"allowedGroups"`
FilterGroups bool `json:"filterGroups"`
RedirectURI string `json:"redirectURI"` RedirectURI string `json:"redirectURI"`
// Requested format of the NameID. The NameID value is is mapped to the ID Token // Requested format of the NameID. The NameID value is is mapped to the ID Token
...@@ -165,6 +166,7 @@ func (c *Config) openConnector(logger log.Logger) (*provider, error) { ...@@ -165,6 +166,7 @@ func (c *Config) openConnector(logger log.Logger) (*provider, error) {
groupsAttr: c.GroupsAttr, groupsAttr: c.GroupsAttr,
groupsDelim: c.GroupsDelim, groupsDelim: c.GroupsDelim,
allowedGroups: c.AllowedGroups, allowedGroups: c.AllowedGroups,
filterGroups: c.FilterGroups,
redirectURI: c.RedirectURI, redirectURI: c.RedirectURI,
logger: logger, logger: logger,
...@@ -240,6 +242,7 @@ type provider struct { ...@@ -240,6 +242,7 @@ type provider struct {
groupsAttr string groupsAttr string
groupsDelim string groupsDelim string
allowedGroups []string allowedGroups []string
filterGroups bool
redirectURI string redirectURI string
...@@ -430,6 +433,10 @@ func (p *provider) HandlePOST(s connector.Scopes, samlResponse, inResponseTo str ...@@ -430,6 +433,10 @@ func (p *provider) HandlePOST(s connector.Scopes, samlResponse, inResponseTo str
return ident, fmt.Errorf("user not a member of allowed groups") return ident, fmt.Errorf("user not a member of allowed groups")
} }
if p.filterGroups {
ident.Groups = groupMatches
}
// Otherwise, we're good // Otherwise, we're good
return ident, nil return ident, nil
} }
......
...@@ -53,6 +53,7 @@ type responseTest struct { ...@@ -53,6 +53,7 @@ type responseTest struct {
emailAttr string emailAttr string
groupsAttr string groupsAttr string
allowedGroups []string allowedGroups []string
filterGroups bool
// Expected outcome of the test. // Expected outcome of the test.
wantErr bool wantErr bool
...@@ -121,6 +122,29 @@ func TestGroupsWhitelist(t *testing.T) { ...@@ -121,6 +122,29 @@ func TestGroupsWhitelist(t *testing.T) {
test.run(t) test.run(t)
} }
func TestGroupsWhitelistWithFiltering(t *testing.T) {
test := responseTest{
caFile: "testdata/ca.crt",
respFile: "testdata/good-resp.xml",
now: "2017-04-04T04:34:59.330Z",
usernameAttr: "Name",
emailAttr: "email",
groupsAttr: "groups",
allowedGroups: []string{"Admins"},
filterGroups: true,
inResponseTo: "6zmm5mguyebwvajyf2sdwwcw6m",
redirectURI: "http://127.0.0.1:5556/dex/callback",
wantIdent: connector.Identity{
UserID: "eric.chiang+okta@coreos.com",
Username: "Eric",
Email: "eric.chiang+okta@coreos.com",
EmailVerified: true,
Groups: []string{"Admins"}, // "Everyone" is filtered
},
}
test.run(t)
}
func TestGroupsWhitelistEmpty(t *testing.T) { func TestGroupsWhitelistEmpty(t *testing.T) {
test := responseTest{ test := responseTest{
caFile: "testdata/ca.crt", caFile: "testdata/ca.crt",
...@@ -388,6 +412,7 @@ func (r responseTest) run(t *testing.T) { ...@@ -388,6 +412,7 @@ func (r responseTest) run(t *testing.T) {
RedirectURI: r.redirectURI, RedirectURI: r.redirectURI,
EntityIssuer: r.entityIssuer, EntityIssuer: r.entityIssuer,
AllowedGroups: r.allowedGroups, AllowedGroups: r.allowedGroups,
FilterGroups: r.filterGroups,
// Never logging in, don't need this. // Never logging in, don't need this.
SSOURL: "http://foo.bar/", SSOURL: "http://foo.bar/",
} }
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment