Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Missing eIDAS SAML Extensions Config options #2

Open
t0pito23 opened this issue Nov 23, 2022 · 10 comments
Open

Missing eIDAS SAML Extensions Config options #2

t0pito23 opened this issue Nov 23, 2022 · 10 comments

Comments

@t0pito23
Copy link

t0pito23 commented Nov 23, 2022

Hello,

First of all, thank you for your good work.

I am working on a project to integrate the Spanish public identity provider Cl@ve (using SAML 2.0 - eIDAS) with our private services.

To familiarise myself with the environment, I am following the steps mentioned in the howto guide.

I find that I don't see the "eIDAS Specific Settings" that you refer to.

I have tried the following versions:

  • Keycloak (windows bare-metal) 19.0.3 with the 0.5 release you provide.
  • Keycloak (windows bare-metal) 20.0.1 with a release compiled by myself from the 20.0.1 branch you have in the repo.

In both cases I have the same problem, so I'm not even able to complete the basic configuration steps.

Regards.

image

@d-michail
Copy link
Collaborator

Hi,

indeed starting from version 19 the config options are not rendered. This is due to a change (probably bug) in keycloak where the partial ftl templates are not found in the classpath. We will open up an issue in keycloak in the next few days. Sorry for that, but the last few versions of keycloak are not really backward compatible.

@t0pito23
Copy link
Author

Thank you very much for your quick response. Until then I will try lower versions of Keycloak.

Regards.

@t0pito23
Copy link
Author

t0pito23 commented Nov 24, 2022

Hello Michail,

I finally managed to configure your extension with Keycloak 17.0.1.

Now I have the following problem: When I try to login through eIDAS, keycloak redirects me to the Spanish public identity provider. It shows me an error because it requires the HTTP header "Referer" in the request, but for some unknown reason Keycloak is always setting the Policy-referrer to "no-referrer", and therefore it doesn't add this header.

This may not be directly related to the extension, but I'm just mentioning it in case you've run into this problem, or something similar.

Best regards.

@d-michail
Copy link
Collaborator

It should also work fine with keycloak 18.

For the no-referrer issue, I have not seen it before, and it seems related to keycloak and not necessarily the extension.

Perhaps these are of value:

@BelonaIJG
Copy link

Hi, i dont know if you finally resolved the Referer header @t0pito23 . But if you do and you continued the integration with cl@ve, could you tell me if you managed to solve it. I'm working in the same integration.

Thanks

@BelonaIJG
Copy link

Hi, for the future people... It can be done. It needs a few adjust but it can be done.

Here some advices:

  • Add the certificate (as d-michail explained)
  • Add the referer (configurable in Keycloak)
  • Add the ProviderName (required in Cl@ve)
  • Create your own Authenticator flow for the First Login, it will be basic if you have to check the users in your own BD or system.
  • Use the ClientNotes in the sesion to pass data and use it later.
  • Be patient, is not an easy task.

Good luck.

@cesarcoruna
Copy link

I have tried this extension with KC 23.074 and 24.0.5 and i can't view the SAML Extensions Config options

@cesarcoruna
Copy link

Hi, for the future people... It can be done. It needs a few adjust but it can be done.

Here some advices:

  • Add the certificate (as d-michail explained)
  • Add the referer (configurable in Keycloak)
  • Add the ProviderName (required in Cl@ve)
  • Create your own Authenticator flow for the First Login, it will be basic if you have to check the users in your own BD or system.
  • Use the ClientNotes in the sesion to pass data and use it later.
  • Be patient, is not an easy task.

Good luck.

I'm trying to use this extenision to integrate Cl@ve in Keycloak. Have you got it?

@BelonaIJG
Copy link

Hi, for the future people... It can be done. It needs a few adjust but it can be done.
Here some advices:

  • Add the certificate (as d-michail explained)
  • Add the referer (configurable in Keycloak)
  • Add the ProviderName (required in Cl@ve)
  • Create your own Authenticator flow for the First Login, it will be basic if you have to check the users in your own BD or system.
  • Use the ClientNotes in the sesion to pass data and use it later.
  • Be patient, is not an easy task.

Good luck.

I'm trying to use this extenision to integrate Cl@ve in Keycloak. Have you got it?

Morning, yes, over a year ago worked and it continues working today. A really hard job to make it work, lot of debugging, line by line. Must say i used an old KC version, 15.0.0.

@cesarcoruna
Copy link

Hi, for the future people... It can be done. It needs a few adjust but it can be done.
Here some advices:

  • Add the certificate (as d-michail explained)
  • Add the referer (configurable in Keycloak)
  • Add the ProviderName (required in Cl@ve)
  • Create your own Authenticator flow for the First Login, it will be basic if you have to check the users in your own BD or system.
  • Use the ClientNotes in the sesion to pass data and use it later.
  • Be patient, is not an easy task.

Good luck.

I'm trying to use this extenision to integrate Cl@ve in Keycloak. Have you got it?

Morning, yes, over a year ago worked and it continues working today. A really hard job to make it work, lot of debugging, line by line. Must say i used an old KC version, 15.0.0.

i'd be very grateful if you can explain more how to configure this extension to support Cl@ve. I've searched information about that but I didn't get to find any useful.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants