privacyIDEA-ADFSProvider
privacyIDEA-ADFSProvider copied to clipboard
ADFS interaction problems with Server 2019 / ADFSv4
Derived Issue @adildhar:
The ideaprovacy-adfsprovider plugin is configured as additional authentication provider for adfs. The Adfs is level 4 with Windows 2019. We have configured admin credentials in config.xml for challenge/response and are using for otp sms token. While it is working with auto-registration for users using event handler policy but in 6 out of 10 requests the username is not passed on after otp validation.
@adildhar - can you please give some more details about the implementation?
- Provider Version:
- PrivacyIDEA Version:
- Messages in the Windows Event Manger (see README):
- PrivacyIDEA Policy definiton:
Provider Version: 1.3.6.0 PrivacyIDEA Version: 3.3 Messages in the Windows Event Manger : triggerChallenge: The remote server returned an error: (400) Bad Request. System.Net.WebException: The remote server returned an error: (400) Bad Request. at System.Net.WebClient.UploadValues(Uri address, String method, NameValueCollection data) at privacyIDEAADFSProvider.OTPprovider.triggerChallenge(String OTPuser, String realm, String token)
An authentication provider was successfully loaded: Identifier: 'privacyIDEA-ADFSProvider', Context: 'Proxy device TLS pipeline'
PrivacyIDEA Policy definiton:
Events: Validate_Check, validate_triggerChallenge
Handler: Token pre 0
User_token_number: 0
Action: Enroll
TokenType: SMS
Can you shortly explain how your workflow looks like? For my understanding it is:
- User logon without an SMS-OTP deployed
- A challenge will be triggert to the PrivacyIDEA
- The PrivacyIDEA Policy catches the challenge and enrolls an SMS token because the user "token number" is 0 (no token was deployed).
- Then the user should get the SMS because of the enrollment via policies
- The user takes the token and logos on with that
Logon -> Trigger -> (if user token=0) -> Enroll -> send OTP to user Is that correct? I would like to test this setup in my dev environment.
Yes, exactly the same as explained by you. It is working as I already have user tokens generated for users. The issues seems to be from 2019 ADFS side. It doesn't trigger otp everytime. I guess we need an access policy for the relaying trust.
On Wed, Apr 29, 2020, 10:44 AM Stephan Traub [email protected] wrote:
Can you shortly explain how your workflow looks like? For my understanding it is:
- User logon without an SMS-OTP deployed
- A challenge will be triggert to the PrivacyIDEA
- The PrivacyIDEA Policy catches the challenge and enrolls an SMS token because the user "token number" is 0 (no token was deployed).
- Then the user should get the SMS because of the enrollment via policies
Logon -> Trigger -> (if user token=0) -> Enroll -> send OTP to user Is that correct? I would like to test this setup in my dev environment.
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/sbidy/privacyIDEA-ADFSProvider/issues/38#issuecomment-621042594, or unsubscribe https://github.com/notifications/unsubscribe-auth/ABAORMA47E77CV5Y3T7IE33RO7LGNANCNFSM4MSUHIBA .
Thank you for the feedback. I'll try to reproduce this within my test environment.
If you run the provider in a non-productive test setup, you can install the 1.3.7 Debug version to readout some additional messages.
Links: Debug HowTo Debug Version