-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UI: Fix MFA + SSO login workflow #28873
Conversation
CI Results: |
Build Results: |
…fixes VAULT-32462
changelog/28873.txt
Outdated
ui: Fixes login to web UI when MFA is enabled for OIDC (i.e. azure, auth0) and Okta auth methods | ||
``` | ||
```release-note:bug | ||
ui (enterprise): Fixes login to web UI when MFA is enabled fr SAML methods |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is "fr" supposed to be "for"?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch!
@@ -60,13 +60,32 @@ export default class AuthLoginFormComponent extends Component { | |||
} else { | |||
this.delayAuthMessageReminder.perform(); | |||
} | |||
|
|||
/* | |||
Checking for an mfa_requirement happens in two places. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
great comments!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Really great work; thoughtful pr description and test coverage!
* =passback mfa_requirement for oidc login methods * =pass SAML mfa requirement * add comments * add acceptance tests * add helper * update callback args for auth jwt * add changelog * update changelog * is this line necessary? * fetch token data for display name, this commit can be undone when BE fixes VAULT-32462 * change error handling, add comments * update capitalization * revert capitalization * reword changelog * clarify comments * Update changelog/28873.txt
Description
This PR fixes the MFA workflow for OIDC, Okta and SAML (enterprise only). Now users can enable MFA and log in to the Vault GUI with OIDC, Okta or SAML.
❌ Failures for MFA+SSO don't return very intuitive error messages and differ depending on the auth mount type. Screenshots are below for posterity and to help triage bug reports.
Test scenarios
root
admin/
namespaceazure
*auth0
*okta
saml
* (enterprise only)*Tested with and without a configured default role
Auth0 Success
Screen.Recording.2024-11-13.at.2.41.19.PM.mov
Okta success, within a namespace
Screen.Recording.2024-12-12.at.1.37.11.PM.mov
❌ Errors
OIDC error (same for azure and auth0)
Okta
SAML error
TODO only if you're a HashiCorp employee
to N, N-1, and N-2, using the
backport/ent/x.x.x+ent
labels. If this PR is in the CE repo, you should only backport to N, using thebackport/x.x.x
label, not the enterprise labels.of a public function, even if that change is in a CE file, double check that
applying the patch for this PR to the ENT repo and running tests doesn't
break any tests. Sometimes ENT only tests rely on public functions in CE
files.
in the PR description, commit message, or branch name.
description. Also, make sure the changelog is in this PR, not in your ENT PR.