Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Validate SAMLIdPServiceProviders ACS endpoints #32218

Merged
merged 1 commit into from Sep 20, 2023
Merged

Conversation

rosstimothy
Copy link
Contributor

Enforces that all ACS endpoints are HTTPS to prevent any XSS attacks. To allow admins to interogate any existing resources which may be impacted validation only happens on create and update but not get. All usages of SAMLIdPServiceProviders within teleport follow all internal retrievals with a call to
services.ValidateAssertionConsumerServicesEndpoint in order to subvert invalid ACS endpoints.

Copy link
Contributor

@marcoandredinis marcoandredinis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we allow existing ones? We could validate and possibly return an error when Getting or Listing

lib/services/saml_idp_service_provider.go Outdated Show resolved Hide resolved
Enforces that all ACS endpoints are HTTPS to prevent any
XSS attacks. To allow admins to interogate any existing resources
which may be impacted validation only happens on create and update
but not get. All usages of SAMLIdPServiceProviders within teleport
follow all internal retrievals with a call to
services.ValidateAssertionConsumerServicesEndpoint in order to
subvert invalid ACS endpoints.
@rosstimothy rosstimothy added this pull request to the merge queue Sep 20, 2023
Merged via the queue into master with commit 7dcce25 Sep 20, 2023
23 checks passed
@rosstimothy rosstimothy deleted the tross/saml_acs branch September 20, 2023 19:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants