Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"unable to locate IDP oidc form submit URL" error #464

Closed
tipirk opened this issue Mar 13, 2020 · 8 comments · Fixed by #509
Closed

"unable to locate IDP oidc form submit URL" error #464

tipirk opened this issue Mar 13, 2020 · 8 comments · Fixed by #509

Comments

@tipirk
Copy link

tipirk commented Mar 13, 2020

I'm trying login using Azure AD but get an error

unable to locate IDP oidc form submit URL
error authenticating to IdP
github.com/versent/saml2aws/cmd/saml2aws/commands.Login
/Users/markw/Code/notgopath/saml2aws/cmd/saml2aws/commands/login.go:72
main.main
/Users/markw/Code/notgopath/saml2aws/cmd/saml2aws/main.go:147
runtime.main
/usr/local/Cellar/go/1.14/libexec/src/runtime/proc.go:203
runtime.goexit
/usr/local/Cellar/go/1.14/libexec/src/runtime/asm_amd64.s:1373

It worked a couple of weeks ago

@tipirk
Copy link
Author

tipirk commented Mar 16, 2020

The problem with version 2.24.0
Tested on 2.22.0 and 2.23.0 and it works as expected

@tirumalap
Copy link

tirumalap commented Mar 20, 2020

any update on this issue? same issue here. help needed.

@FelicityHughes
Copy link

FelicityHughes commented Mar 31, 2020

This is still broken in 2.25.0. Been unable to upgrade beyond 2.23.0 for AzureAD.

Also broken in 2.26.0

@leoddias
Copy link

I got same errors in 2.22.0, 2.23.0, 2.25.0

ubuntu@ip:~$ saml2aws --verbose login
DEBU[0000] Running                                       command=login
DEBU[0000] check if Creds Exist                          command=login
DEBU[0000] Expand                                        name=/home/ubuntu/.aws/credentials pkg=awsconfig
DEBU[0000] resolveSymlink                                name=/home/ubuntu/.aws/credentials pkg=awsconfig
DEBU[0000] ensureConfigExists                            filename=/home/ubuntu/.aws/credentials pkg=awsconfig
Using IDP Account default to access AzureAD https://account.activedirectory.windowsazure.com
To use saved password just hit enter.
? Username xxxxxx@xxxxx.com.br
? Password ***********

DEBU[0005] building provider                             command=login idpAccount="account {\n  AppID: XXXXXXX\n  URL: https://account.activedirectory.windowsazure.com\n  Username: xxxxxx@xxxxx.com.br\n  Provider: AzureAD\n  MFA: Auto\n  SkipVerify: false\n  AmazonWebservicesURN: urn:amazon:webservices\n  SessionDuration: 3600\n  Profile: saml\n  RoleARN: \n}"
Authenticating as xxxxxx@xxxxx.com.br ...
DEBU[0005] HTTP Req                                      URL="https://login.microsoftonline.com/common/login" http=client method=POST
DEBU[0005] HTTP Res                                      Status="200 OK" http=client
unable to locate IDP oidc form submit URL
error authenticating to IdP
github.com/versent/saml2aws/cmd/saml2aws/commands.Login
        /Users/markw/Code/notgopath/saml2aws/cmd/saml2aws/commands/login.go:72
main.main
        /Users/markw/Code/notgopath/saml2aws/cmd/saml2aws/main.go:146
runtime.main
        /usr/local/Cellar/go/1.13.6/libexec/src/runtime/proc.go:203
runtime.goexit
        /usr/local/Cellar/go/1.13.6/libexec/src/runtime/asm_amd64.s:1357

@lcrisci
Copy link

lcrisci commented Apr 19, 2020

The flow is broken since this PR was merged: #435

It removed conditional code ( under MFA use ) which was needed to deal with /kmsi.

I tried to figure out how it fixed #350 but no clue so far.

This is effectively broken since https://github.com/Versent/saml2aws/releases/tag/v2.24.0.

@pwillie
Copy link

pwillie commented May 21, 2020

@leoddias did you get this to work? I am seeing exactly the same output/behaviour with 2.23.0...

@tipirk
Copy link
Author

tipirk commented May 23, 2020

@leoddias did you get this to work? I am seeing exactly the same output/behaviour with 2.23.0...

2.23.0 is the last working version actually

@Mitko-Kerezov
Copy link

Hey @tipirk
I think me and my team might have run into something very similar and I have submitted a PR with a fix for our use-case. Could you give it a try and see if it resolves your issue as well?

wolfeidau pushed a commit that referenced this issue Jun 21, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

8 participants