Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Gracefully handle RequestDenied response #176

Open
lgangitano opened this issue May 24, 2019 · 0 comments
Open

Gracefully handle RequestDenied response #176

lgangitano opened this issue May 24, 2019 · 0 comments

Comments

@lgangitano
Copy link

Hello,

I'm currently managing an IdP based on Microsoft ADFS 4.0. One of our Service Providers is using omniauth-saml for their side of the federation and we're experiencing several HTTP 500 errors in user authentication.

Most of the time, this is due to missing authorization group membership on the Active Director side, which results in a RequestDenied assertion from the IdP to the SP:

<samlp:Status> <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Responder"> <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:RequestDenied" /> </samlp:StatusCode> </samlp:Status>

Another common cause is the absence of an email attribute.

In such cases, the SP web servers returns HTTP 500 and no information can be displayed to the user letting him/her and the support service know what's wrong.

Is there any way omniauth-saml could handle these error and return a reasonable exception?

Thanks,

L

@lgangitano lgangitano changed the title Handle gracefully RequestDenied response Gracefully handle RequestDenied response May 24, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant