XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    SAML Auth with Azure AD

    Scheduled Pinned Locked Moved Solved Xen Orchestra
    37 Posts 11 Posters 5.3k Views 9 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P Offline
      pierrebrunet Vates πŸͺ XO Team @probain
      last edited by

      @probain Hi,
      Great!! Can you confirm the checkbox is in the Service Provider Details window? It is to enhance the doc part about SAML.

      P 1 Reply Last reply Reply Quote 1
      • P Offline
        probain @pierrebrunet
        last edited by probain

        @pierrebrunet
        For Google Workspace:
        Yes it is in the "Service Provider details"-section: See screenshot for example
        f2d58e46-b168-43a5-85b1-7a59b305f7b4-image.png

        Edit: Removed doubled screenshot

        P 1 Reply Last reply Reply Quote 1
        • P Offline
          pierrebrunet Vates πŸͺ XO Team @probain
          last edited by

          @probain Thank you!

          TheNorthernLightT 1 Reply Last reply Reply Quote 2
          • olivierlambertO olivierlambert marked this topic as a question on
          • olivierlambertO olivierlambert has marked this topic as solved on
          • MathieuM Offline
            Mathieu @pierrebrunet
            last edited by

            @pierrebrunet
            Hello Pierre,

            Sorry for that late response, but yes, latest version is working fine and has solved the issue.

            Thanks for the fix.

            1 Reply Last reply Reply Quote 1
            • TheNorthernLightT Offline
              TheNorthernLight @pierrebrunet
              last edited by

              @pierrebrunet Are you aware if there is an official guide on how to use this with AzureAD ?

              F 1 Reply Last reply Reply Quote 0
              • F Offline
                ferrao @TheNorthernLight
                last edited by

                @TheNorthernLight I think this one is the most accurate: https://help.vates.tech/kb/en-us/48-plugins/162-saml-azure-guide

                I've followed it and it worked, however there's two caveats:

                1. You need to use XOA 5.112, which is on the latest channel as today and not the stable channel.
                2. You need to Sign SAML response and assertion. To do that, Go to Microsoft Entra ID β†’ Enterprise applications β†’ Xen Orchestra β†’ Single sign-on β†’ SAML.

                After those settings I could login with Azure ID / Entra ID / Whatever Microsoft calls today.

                F 1 Reply Last reply Reply Quote 1
                • F Offline
                  ferrao @ferrao
                  last edited by

                  @olivierlambert can we report documentation issues or can we contribute to docs? I would fix myself if I can.

                  nathanael-hN 1 Reply Last reply Reply Quote 0
                  • nathanael-hN Offline
                    nathanael-h Vates πŸͺ DevOps Team @ferrao
                    last edited by

                    @ferrao Hey thanks, yes you are welcome to send a PR to improve the docs. It is based on Docusaurus, it is in the docs directory in https://github.com/vatesfr/xen-orchestra/tree/master/docs. Then pages are in the 2nd level docs directory.

                    1 Reply Last reply Reply Quote 0
                    • olivierlambertO Offline
                      olivierlambert Vates πŸͺ Co-Founder CEO
                      last edited by

                      On the bottom of each documentation page, there's an "Edit this page" link you can use to contribute πŸ™‚

                      1 Reply Last reply Reply Quote 0
                      • D Offline
                        Dani @olivierlambert
                        last edited by

                        @olivierlambert
                        Just to add another weird case of this situation I tell you my SAML-auth-adventures.

                        I have just migrated a week ago from XOCE to XOA paid support this week and all the process was fine except the auth with the saml plugin.
                        The commit I had in XOCE was [XO 5d92f - Master 3f604]. I compiled it the first week of this november so it wasn't very outdated.

                        We use the MSEntraID SAML authentication and it was working fine in XOCE since at least one year ago.

                        Mi process was like this:

                        • First, I installed XOA and imported the configuration from my old XOCE. Everything was fine and all was imported succesfully (backups, users, acls, etc.), including my plugin configurations.
                          Note that I reused the https server certificate/private key and used the same IP and the same DNS (beacuse I turned off my XOCE before starting XOA).

                        • Everything was working fine except the saml auth plugin. I had the same "Internal server error" problem.
                          I looked at the xo-server logs and the error was "invalid document signature" so, as Olivier said, we changed the configuration in MSEntraID to set the "Sign SAML response and assertion" on.

                        • Once we changed the configuration I thought the plugin would work again, but surprisingly not. If I try again SAML validation i still got the "Internal server error".
                          When i checked again the xo-server logs I saw ahother exception, this time with the error "SAML assertion audience mismatch" and a reference to the issuer configuration of the plugin.
                          The exact error I got from xo-server logs using "journalctl -u xo-server -f -n 50" was: "xoa xo-server[2370]: Error: SAML assertion audience mismatch. Expected: <id-of-MSEntraID-xo-validation> Received: spn:<id-of-MSEntraID-xo-validation>"I didn't understand this, because the configuration was exactly the same as I had in XOCE. In fact, I turned off XOA and turned on again XOCE just to test the plugin. The result was that in XOCE the plugin worked well.

                        • After many tries and some time of impostor syndrome we found the solution:
                          I don't know why, but in XOCE compiled at the beginning of november you have to configure the issuer field of the plugin with the <id-of-MSEntraID-xo-validation> (8digit-4digit-4digit-4digit-12digit).
                          Instead, in XOA deployed also this november, you have to set the issuer field to you XOA URL: https://<xo.company.net>/

                        I hope this will help, because it was a pain in the neck for us this week.

                        BTW: @olivierlambert this "Internal server error" coming from an uncatched exception in the plugin was not very descriptive. Even a generic try-catch block just to show in the web interface the error would help...

                        P.D.: I'm from Spain, so I do my best with my english 😊
                        P.D. 2: Great job with all the Vates virtualization stack! You are the best!

                        Dani

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post