Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support ForceAuthn attribute when FusionAuth is the IdP via SAML v2.0 #2989

Open
jobannon opened this issue Jan 29, 2025 · 0 comments
Open

Comments

@jobannon
Copy link

jobannon commented Jan 29, 2025

Problem

There are times when I am needing FusionAuth to not retain the SSO session for a SAML login.

Solution

The ForceAuthn parameter should allow for me to prevent the user from relying on any previous session state.

doc reference from saml core v 2.0

http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
Image

Alternatives/workarounds

Do not use FusionAuth SSO sessions in the tenant (set the TTL to 0). In this manner, SP's will not be able to pick up any previous state related to a user's session in FusionAuth

Additional context

Customer request - https://fusionauth.zendesk.com/agent/tickets/77731

Related ask to propegate this attribute to federated logins as well

This basically feels like the SAML version of the OIDC prompt parameter -

Community guidelines

All issues filed in this repository must abide by the FusionAuth community guidelines.

How to vote

Please give us a thumbs up or thumbs down as a reaction to help us prioritize this feature. Feel free to comment if you have a particular need or comment on how this feature should work.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant