Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AzureAD: unable to locate IDP oidc form submit URL #645

Open
teddevaal opened this issue Mar 31, 2021 · 3 comments
Open

AzureAD: unable to locate IDP oidc form submit URL #645

teddevaal opened this issue Mar 31, 2021 · 3 comments

Comments

@teddevaal
Copy link

Configured according to documentation: Azure AD

Version: 2.28.4

Config

[default]
app_id               = xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
url                  = https://account.activedirectory.windowsazure.com
username             = xxxxxx@xxxxxxxxx.com
provider             = AzureAD
mfa                  = Auto
skip_verify          = false
timeout              = 0
aws_urn              = urn:amazon:webservices
aws_session_duration = 3600
aws_profile          = saml
resource_id          = 
subdomain            = 
role_arn             = 
region               = 
http_attempts_count  = 
http_retry_delay     = 
Name                 = default
credentials_file     = 
saml_cache           = false

Output

saml2aws login --verbose

time="2021-03-31T17:23:40+11:00" level=debug msg=Running command=login
time="2021-03-31T17:23:40+11:00" level=debug msg="check if Creds Exist" command=login
time="2021-03-31T17:23:40+11:00" level=debug msg=Expand name=/home/teddevaal/.aws/credentials pkg=awsconfig
time="2021-03-31T17:23:40+11:00" level=debug msg=resolveSymlink name=/home/teddevaal/.aws/credentials pkg=awsconfig
time="2021-03-31T17:23:40+11:00" level=debug msg=ensureConfigExists filename=/home/teddevaal/.aws/credentials pkg=awsconfig
Using IDP Account default to access AzureAD https://account.activedirectory.windowsazure.com
To use saved password just hit enter.
Username (xxxxxx@xxxxxxxxxxxxxx.com) 
Password **********
time="2021-03-31T17:23:47+11:00" level=debug msg="building provider" command=login idpAccount="account {\n  AppID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\n  URL: https://account.activedirectory.windowsazure.com\n  Username: xxxxxx@xxxxxxxxxxxxxx.com\n  Provider: AzureAD\n  MFA: Auto\n  SkipVerify: false\n  AmazonWebservicesURN: urn:amazon:webservices\n  SessionDuration: 3600\n  Profile: saml\n  RoleARN: \n  Region: \n}"
Authenticating as xxxxxx@xxxxxxxxxxxxxx.com ...
time="2021-03-31T17:23:48+11:00" level=debug msg="HTTP Req" URL="https://login.microsoftonline.com/common/login" http=client method=POST
time="2021-03-31T17:23:49+11:00" level=debug msg="HTTP Res" Status="200 OK" http=client
unable to locate IDP oidc form submit URL
error authenticating to IdP
github.com/versent/saml2aws/v2/cmd/saml2aws/commands.Login
	github.com/versent/saml2aws/v2/cmd/saml2aws/commands/login.go:103
main.main
	command-line-arguments/main.go:180
runtime.main
	runtime/proc.go:225
runtime.goexit
	runtime/asm_amd64.s:1371

Observation

When using saml2aws, a POST is made to https://login.microsoftonline.com/common/login.
However, when using Microsoft My Apps, https://account.activedirectory.windowsazure.com/applications/redirecttoapplication.aspx?Operation=LinkedSignIn&applicationId={app_id}&tenantId={tenant_id}
is redirected to https://login.microsoftonline.com/{tenant_id}/saml2?SAMLRequest={saml_request}.

@biship
Copy link

biship commented May 6, 2021

Azure AD does not work in 2.30.0

@kenchan0130
Copy link
Contributor

Duplicate with #628

@digihunch
Copy link

I came across this error today with version 2.35.0, I use Azure AD as identity store
It turns out that this is because my password is up for an update and Azure AD is trying to prompt me for a password change.
The error message is very confusing. As soon as I change my password, it is working again.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants