Skip to content
This repository has been archived by the owner on Jun 23, 2021. It is now read-only.

ADFS interaction problems with Server 2019 / ADFSv4 #38

Open
sbidy opened this issue Apr 28, 2020 · 5 comments
Open

ADFS interaction problems with Server 2019 / ADFSv4 #38

sbidy opened this issue Apr 28, 2020 · 5 comments
Assignees
Labels
Milestone

Comments

@sbidy
Copy link
Owner

sbidy commented Apr 28, 2020

Derived Issue @adildhar:

The ideaprovacy-adfsprovider plugin is configured as additional
authentication provider for adfs. The Adfs is level 4 with Windows 2019. We
have configured admin credentials in config.xml for challenge/response and
are using for otp sms token. While it is working with auto-registration for
users using event handler policy but in 6 out of 10 requests the username
is not passed on after otp validation.

@sbidy sbidy self-assigned this Apr 28, 2020
@sbidy sbidy added the bug label Apr 28, 2020
@sbidy sbidy added this to the 1.3.7 milestone Apr 28, 2020
@sbidy
Copy link
Owner Author

sbidy commented Apr 28, 2020

@adildhar - can you please give some more details about the implementation?

  • Provider Version:
  • PrivacyIDEA Version:
  • Messages in the Windows Event Manger (see README):
  • PrivacyIDEA Policy definiton:

@adharsp
Copy link

adharsp commented Apr 28, 2020

Provider Version: 1.3.6.0
PrivacyIDEA Version: 3.3
Messages in the Windows Event Manger :
triggerChallenge: The remote server returned an error: (400) Bad Request.
System.Net.WebException: The remote server returned an error: (400) Bad Request.
at System.Net.WebClient.UploadValues(Uri address, String method, NameValueCollection data)
at privacyIDEAADFSProvider.OTPprovider.triggerChallenge(String OTPuser, String realm, String token)

An authentication provider was successfully loaded: Identifier: 'privacyIDEA-ADFSProvider', Context: 'Proxy device TLS pipeline'

PrivacyIDEA Policy definiton:
Events: Validate_Check, validate_triggerChallenge
Handler: Token pre 0
User_token_number: 0
Action: Enroll
TokenType: SMS

@sbidy
Copy link
Owner Author

sbidy commented Apr 29, 2020

Can you shortly explain how your workflow looks like?
For my understanding it is:

  1. User logon without an SMS-OTP deployed
  2. A challenge will be triggert to the PrivacyIDEA
  3. The PrivacyIDEA Policy catches the challenge and enrolls an SMS token because the user "token number" is 0 (no token was deployed).
  4. Then the user should get the SMS because of the enrollment via policies
  5. The user takes the token and logos on with that

Logon -> Trigger -> (if user token=0) -> Enroll -> send OTP to user
Is that correct? I would like to test this setup in my dev environment.

@adildhar
Copy link

adildhar commented Apr 29, 2020 via email

@sbidy
Copy link
Owner Author

sbidy commented Apr 30, 2020

Thank you for the feedback. I'll try to reproduce this within my test environment.

If you run the provider in a non-productive test setup, you can install the 1.3.7 Debug version to readout some additional messages.

Links:
Debug HowTo
Debug Version

@sbidy sbidy modified the milestones: 1.3.7, 1.3.8 May 20, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

3 participants