Skip to content

Enable SAML using AWS IAM Identity Center #14433

Open
@luciano-buono

Description

@luciano-buono

Debug mode

Describe the bug

Identity Center has custom applications that allow you to integrate its own Users Directory to be used and authenticate with it into your own made applications.

https://docs.aws.amazon.com/singlesignon/latest/userguide/customermanagedapps-saml2-setup.html

Once you finish the setup, a new App appers on the https://DOMAIN.awsapps.com/start#/ launcher, which you can click to initiate the AUTH flow into your app.

So, we have to 'possible' ways to log into Snipe using SAML:

  1. Start flow from https://inventory.DOMAIN.cloud/login/saml

  2. Start flow clicking in AWS launcher snipe-it app

  3. Using normal flow, I can see (using SAML-TRACER app) that a SAML AuthnRequest request is sent to https://portal.sso.us-west-2.amazonaws.com/saml/assertion/.... however, AWS denied the petition with a 403
    image

So I'm not sure here, but it looks like AWS is not allowing the auth flow to be started from custom app, it has to be started from their own. (Anyone can confirm?)

  1. Using AWS app launcher, looks like they directly send an SAMLResponse, not expecting a SAMLAuthnRequest first.
    image

And here I have tried many snipeit paths but none of them works:

Setting the app
image

Reproduction steps

...

Expected behavior

Should be able to login

Screenshots

No response

Snipe-IT Version

Docker version v6.33

Operating System

Docker version v6.33

Web Server

Docker version v6.33

PHP Version

Docker version v6.33

Operating System

No response

Browser

No response

Version

No response

Device

No response

Operating System

No response

Browser

No response

Version

No response

Error messages

No response

Additional context

No response

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions