XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    SAML Auth with Azure AD

    Scheduled Pinned Locked Moved Solved Xen Orchestra
    37 Posts 11 Posters 5.5k Views 9 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      pierrebrunet Vates πŸͺ XO Team @Mathieu
      last edited by

      @Mathieu Thanks to your help, we are deploying a patch with config update and control over document and assertion signatures
      https://github.com/vatesfr/xen-orchestra/pull/9093

      pierrebrunet289 opened this pull request in vatesfr/xen-orchestra

      closed fix(plugin/auth-saml): add default config in SAML #9093

      1 Reply Last reply Reply Quote 1
      • P Offline
        pierrebrunet Vates πŸͺ XO Team @Mathieu
        last edited by

        @Mathieu Hi,
        We merged the PR linked above with new options. If you have time, can you confirm it is working for you?
        It will fix the audience error and let you choose if you want to sign responses and assertions.

        P MathieuM 2 Replies Last reply Reply Quote 0
        • P Offline
          probain @pierrebrunet
          last edited by

          @pierrebrunet
          I'm jumping in here as well. Reporting that the PR fixes it for Google Workspace as well!
          However, the checkbox in GW is called "Signed response".
          No further adjustments of the plugin itself was needed.

          P 1 Reply Last reply Reply Quote 1
          • P Offline
            pierrebrunet Vates πŸͺ XO Team @probain
            last edited by

            @probain Hi,
            Great!! Can you confirm the checkbox is in the Service Provider Details window? It is to enhance the doc part about SAML.

            P 1 Reply Last reply Reply Quote 1
            • P Offline
              probain @pierrebrunet
              last edited by probain

              @pierrebrunet
              For Google Workspace:
              Yes it is in the "Service Provider details"-section: See screenshot for example
              f2d58e46-b168-43a5-85b1-7a59b305f7b4-image.png

              Edit: Removed doubled screenshot

              P 1 Reply Last reply Reply Quote 1
              • P Offline
                pierrebrunet Vates πŸͺ XO Team @probain
                last edited by

                @probain Thank you!

                TheNorthernLightT 1 Reply Last reply Reply Quote 2
                • olivierlambertO olivierlambert marked this topic as a question on
                • olivierlambertO olivierlambert has marked this topic as solved on
                • MathieuM Offline
                  Mathieu @pierrebrunet
                  last edited by

                  @pierrebrunet
                  Hello Pierre,

                  Sorry for that late response, but yes, latest version is working fine and has solved the issue.

                  Thanks for the fix.

                  1 Reply Last reply Reply Quote 1
                  • TheNorthernLightT Offline
                    TheNorthernLight @pierrebrunet
                    last edited by

                    @pierrebrunet Are you aware if there is an official guide on how to use this with AzureAD ?

                    F 1 Reply Last reply Reply Quote 0
                    • F Offline
                      ferrao @TheNorthernLight
                      last edited by

                      @TheNorthernLight I think this one is the most accurate: https://help.vates.tech/kb/en-us/48-plugins/162-saml-azure-guide

                      I've followed it and it worked, however there's two caveats:

                      1. You need to use XOA 5.112, which is on the latest channel as today and not the stable channel.
                      2. You need to Sign SAML response and assertion. To do that, Go to Microsoft Entra ID β†’ Enterprise applications β†’ Xen Orchestra β†’ Single sign-on β†’ SAML.

                      After those settings I could login with Azure ID / Entra ID / Whatever Microsoft calls today.

                      F 1 Reply Last reply Reply Quote 1
                      • F Offline
                        ferrao @ferrao
                        last edited by

                        @olivierlambert can we report documentation issues or can we contribute to docs? I would fix myself if I can.

                        nathanael-hN 1 Reply Last reply Reply Quote 0
                        • nathanael-hN Offline
                          nathanael-h Vates πŸͺ DevOps Team @ferrao
                          last edited by

                          @ferrao Hey thanks, yes you are welcome to send a PR to improve the docs. It is based on Docusaurus, it is in the docs directory in https://github.com/vatesfr/xen-orchestra/tree/master/docs. Then pages are in the 2nd level docs directory.

                          1 Reply Last reply Reply Quote 0
                          • olivierlambertO Offline
                            olivierlambert Vates πŸͺ Co-Founder CEO
                            last edited by

                            On the bottom of each documentation page, there's an "Edit this page" link you can use to contribute πŸ™‚

                            1 Reply Last reply Reply Quote 0
                            • D Offline
                              Dani @olivierlambert
                              last edited by

                              @olivierlambert
                              Just to add another weird case of this situation I tell you my SAML-auth-adventures.

                              I have just migrated a week ago from XOCE to XOA paid support this week and all the process was fine except the auth with the saml plugin.
                              The commit I had in XOCE was [XO 5d92f - Master 3f604]. I compiled it the first week of this november so it wasn't very outdated.

                              We use the MSEntraID SAML authentication and it was working fine in XOCE since at least one year ago.

                              Mi process was like this:

                              • First, I installed XOA and imported the configuration from my old XOCE. Everything was fine and all was imported succesfully (backups, users, acls, etc.), including my plugin configurations.
                                Note that I reused the https server certificate/private key and used the same IP and the same DNS (beacuse I turned off my XOCE before starting XOA).

                              • Everything was working fine except the saml auth plugin. I had the same "Internal server error" problem.
                                I looked at the xo-server logs and the error was "invalid document signature" so, as Olivier said, we changed the configuration in MSEntraID to set the "Sign SAML response and assertion" on.

                              • Once we changed the configuration I thought the plugin would work again, but surprisingly not. If I try again SAML validation i still got the "Internal server error".
                                When i checked again the xo-server logs I saw ahother exception, this time with the error "SAML assertion audience mismatch" and a reference to the issuer configuration of the plugin.
                                The exact error I got from xo-server logs using "journalctl -u xo-server -f -n 50" was: "xoa xo-server[2370]: Error: SAML assertion audience mismatch. Expected: <id-of-MSEntraID-xo-validation> Received: spn:<id-of-MSEntraID-xo-validation>"I didn't understand this, because the configuration was exactly the same as I had in XOCE. In fact, I turned off XOA and turned on again XOCE just to test the plugin. The result was that in XOCE the plugin worked well.

                              • After many tries and some time of impostor syndrome we found the solution:
                                I don't know why, but in XOCE compiled at the beginning of november you have to configure the issuer field of the plugin with the <id-of-MSEntraID-xo-validation> (8digit-4digit-4digit-4digit-12digit).
                                Instead, in XOA deployed also this november, you have to set the issuer field to you XOA URL: https://<xo.company.net>/

                              I hope this will help, because it was a pain in the neck for us this week.

                              BTW: @olivierlambert this "Internal server error" coming from an uncatched exception in the plugin was not very descriptive. Even a generic try-catch block just to show in the web interface the error would help...

                              P.D.: I'm from Spain, so I do my best with my english 😊
                              P.D. 2: Great job with all the Vates virtualization stack! You are the best!

                              Dani

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post