You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have set up SIGN_KEYS with an ADFS instance. However, it looks like the algorithm used defaults to SHA1. Is it possible to influence this or set it to SHA256?
ADFS log with default settings
MSIS7093: The message is not signed with expected signature algorithm. Message is signed with signature algorithm http://www.w3.org/2000/09/xmldsig#rsa-sha1. Expected signature algorithm http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
saml_configuration.py
fromosimportenvironREMOTE_AUTH_ENABLED=TrueREMOTE_AUTH_BACKEND='django3_saml2_nbplugin.backends.SAML2CustomAttrUserBackend'REMOTE_AUTH_AUTO_CREATE_USER=TruePLUGINS= ['django3_saml2_nbplugin']
PLUGINS_CONFIG= {
'django3_saml2_nbplugin': {
# Use the Netbox default remote backend'AUTHENTICATION_BACKEND': REMOTE_AUTH_BACKEND,
# Custom URL to validate incoming SAML requests against'ASSERTION_URL': environ.get('SAML_ASSERTION_URL', ''),
# Populates the Issuer element in authn reques e.g defined as "Audience URI (SP Entity ID)" in SSO'ENTITY_ID': environ.get('SAML_ASSERTION_ENTITY_ID', ''),
# Metadata is required, choose either remote url'METADATA_AUTO_CONF_URL': environ.get('SAML_IDP_METADATA', ''),
'SIGN_KEYS': ('/etc/netbox/saml/saml_cert.crt', '/etc/netbox/saml/saml_cert.key'),
# Settings for SAML2CustomAttrUserBackend. Optional.'CUSTOM_ATTR_BACKEND': {
# See the note below about SAML attributes# Attribute containing the username. Optional.'USERNAME_ATTR': 'username',
# Attribute containing the user's email. Optional.'MAIL_ATTR': 'emailAddress',
# Attribute containing the user's first name. Optional.'FIRST_NAME_ATTR': 'givenName',
# Attribute containing the user's last name. Optional.'LAST_NAME_ATTR': 'surname',
# Set to True to always update the user on logon# from SAML attributes on logon. Defaults to False.'ALWAYS_UPDATE_USER': True,
# Attribute that contains groups. Optional.'GROUP_ATTR': 'group',
# Dict of user flags to groups.# If the user is in the group then the flag will be set to True. Optional.'FLAGS_BY_GROUP': {
'is_staff': environ.get('SAML_GROUP_STAFF', ''),
'is_superuser': environ.get('SAML_GROUP_SUPERUSER', '')
},
# Dict of SAML groups to NetBox groups. Optional.# Groups must be created beforehand in NetBox.'GROUP_MAPPINGS': {
environ.get('SAML_GROUP_READONLY', ''): 'netbox_global_readonly',
environ.get('SAML_GROUP_EDITOR', ''): 'netbox_global_editor'
}
}
}
}
The text was updated successfully, but these errors were encountered:
Thank you for maintaining this project!
I have set up SIGN_KEYS with an ADFS instance. However, it looks like the algorithm used defaults to SHA1. Is it possible to influence this or set it to SHA256?
ADFS log with default settings
MSIS7093: The message is not signed with expected signature algorithm. Message is signed with signature algorithm http://www.w3.org/2000/09/xmldsig#rsa-sha1. Expected signature algorithm http://www.w3.org/2001/04/xmldsig-more#rsa-sha256saml_configuration.py
The text was updated successfully, but these errors were encountered: