Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enhance SP settings configuration #47

Open
SalimHaddou opened this issue Nov 12, 2016 · 2 comments
Open

Enhance SP settings configuration #47

SalimHaddou opened this issue Nov 12, 2016 · 2 comments

Comments

@SalimHaddou
Copy link

SalimHaddou commented Nov 12, 2016

Hi,

When I did my initial configuration I used the IP address of my Nextcloud, therefore the SP's metadata were not using the target SP domain name, so we should start the SAML config after adding a trusted domain name and managing nextcloud using it (that is not super obvious at first). Maybe you could add a field for the SP setting where the SP entity ID is configurable ?

Additionally, I am using Nextcloud behind a reverse proxy that does the SSL offloading. In this scenario, although the client is using HTTPS only, the AuthnRequest generated by the server contains a Issuer with http only (because it's hit using plain http on the serverside I suppose). It'd be great to support this scenario and have the SP aware it's being SSL offloaded by being able to configure (advanced view?) EntityID, Issuer, ACS with https no matter what...

The first field under general is where the attribute is expected to match the username.
When a value is in that field, you no longer know what that field is for (the only explanation is there when the field is cleared). I normally use the SAML subject for user identification but here only an attribute works; couldn't you allow the subject to map the username and only use attributes for group, group admin, quota ?

Finally, do you intend to :
Allow IdP metadata import to simplify IdP configuration ?
Support Multiple IdP (hostname based) ?

Thank you.
And keep up the good work !

Salim

@solracsf
Copy link
Member

Fixed some of the issues with #816

@blizzz
Copy link
Member

blizzz commented Mar 20, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants