Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
A Rails 3 example using the ruby-saml gem
branch: master

This branch is 10 commits behind calh:master

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
app
config
db
doc
public
script
test
tmp
Gemfile
README.markdown
Rakefile
config.ru

README.markdown

ruby-saml Rails 3 Example

This Rails application is a full featured example on how to set up SAML authentication using the ruby-saml Gem. With a few tweaks and a sprinkle of extra security, this can be a production SAML application.

Setup

  • Point a web server at the application and choose a virtual host name
  • Do the usual bundle install / rake db:migrate
  • Hit that domain name in a browser.
  • You should see the "No Settings" error page, proceed to the admin account setup
  • Most settings should be auto populated, except:
    • Name Identifier format
    • IdP Metadata
  • Give your metadata URL to the IdP. See the SamlController, the default will look like this: http://sp.example.com/saml/metadata

After everything is setup, hitting the application root should show the "Listing some stuff" page with Log In link. That link hits the /saml controller to start the SSO flow. After logging in and arriving at the app root, you should see your Name ID and list of SAML attributes created by the IdP.

Optionally, uncomment the before_filter in the Stuff controller for a "members only" authentication. The before_filter checks to see if a session exists, and if not, redirects to /saml.

Production Tweaks

  • Change the Gemfile to point at the Onelogin version or ruby-saml
  • Add your own authentication before_filter to the Admin namespace
    • (remove the _admin.html.erb layout warning about this)
  • Move the Admin ActiveRecord to a real database. (Not sqlite)
  • Move the Rails session store to a database
    • Bonus points to figure out a better method with memcache on top of a database store
  • The SAML process is bulletproof to session hijacking and replays. The default Rails session cookie method is vulnerable to this, so read the RoR security guide to make sure your app is just as secure
    • Reset sessions (copying the current session to a new guy)
    • Implement an idle timeout and a session expiry
Something went wrong with that request. Please try again.