Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Programmatically disable XSRF protection for certain SAML/OpenID Connect routes #59002

Closed
azasypkin opened this issue Mar 2, 2020 · 2 comments
Labels
enhancement New value added to drive a business result Feature:Security/Authentication Platform Security - Authentication Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@azasypkin
Copy link
Member

azasypkin commented Mar 2, 2020

Once this PR lands we'll be able to define some of our routes as ones that don't need to check XSRF-protection headers. Here is what we need to do in the scope of this issue:

  • Set xsrfRequired: false for SAML callback route
  • Set xsrfRequired: false OpenID Connect route for the 3rd-party initiated login
  • Discourage using deprecated server.xsrf.whitelist configuration in the docs (7.7+, basically just don't mention this config in docs anymore)
@azasypkin azasypkin added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! enhancement New value added to drive a business result Feature:Security/Authentication Platform Security - Authentication labels Mar 2, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@azasypkin
Copy link
Member Author

Actually this has been fixed in #53010 and will be available in 7.7.0+.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:Security/Authentication Platform Security - Authentication Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

2 participants