-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to add ForceAuthn
property to a SAML V2 request
#1736
Comments
@Jlintonjr were you able to find a workaround for this? |
Hi @mikemonaco. No, we have not been able to find a workaround. |
@Jlintonjr @mikemonaco have you considered using the SAML API? https://fusionauth.io/docs/v1/tech/apis/identity-providers/samlv2#start-a-saml-v2-login-request https://fusionauth.io/docs/v1/tech/apis/identity-providers/samlv2#complete-a-saml-v2-login That should allow you to construct the SAML request exactly as you want, then complete it and log the user into FusionAuth. (The cost, of course, is that you won't be able to use the hosted login pages, which may be problematic). |
Unfortunately, that is a cost that we're not able to give up. But thank you for the suggestions! |
I'll note that even if this was supported, my testing shows Google ignores ForceAuthN anyway. I was looking into creating a flow that causes the Google Account Chooser to be presented first, but didn't get any far due to lack of documentation on Google's site and lots of 400 Error codes when trying to provide a continue= parameter on accounts.google.com/AccountChooser. |
Ability to add
ForceAuthn
property to a SAML V2 requestProblem
When a user authenticates through SAML V2 (particularly with Google), and the user selects an account to authenticate with, that selection is cached, and any subsequent authentications will not allow the user to be able to select which account they need to authenticate with.
Solution
Including the
ForceAuthn
property in the SAML request will allow the user to be able to choose which account they want to authenticate with each time theyAlternatives/workarounds
We have not been able to determine any current workarounds
How to vote
Please give us a thumbs up or thumbs down as a reaction to help us prioritize this feature. Feel free to comment if you have a particular need or comment on how this feature should work.
Additional context
First surfaced here: https://fusionauth.io/community/forum/topic/2070/is-there-a-way-to-add-the-forceauthn-property-to-a-saml-v2-request
https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
Related -
ForceAuthn
attribute when FusionAuth is the IdP via SAML v2.0 #2989The text was updated successfully, but these errors were encountered: