SPNEGO unavailability and error handling

Timo Tunturi timo.tunturi at aalto.fi
Tue Oct 1 02:25:54 EDT 2019


On 27/09/2019 15.50, Simon Lundström wrote:
> On Thu, 2019-09-26 at 22:50:59 +0200, Wessel, Keith wrote:
>> 2. Is there any easy way to get the IdP to simply display the IdP 
>> login page (fall through to the password authentication flow) if 
>> SPNEGO is unavailable? I know easy is relative, but I''m at a loss of 
>> any way to do it at all other than the activation conditions one can 
>> associate with the SPNEGO flow. For us, limiting to IP space is far 
>> from sufficient since we have so many devices not joined to the domain 
>> on our network.
> We have a terrible hack via the mod_auth_gssapi Apache module for 
> "whitelisted" browsers but it seems that when IE dies, as per my other 
> mail in this thread to Daniel, we can discontinue it.

We used to run an in-house SPNEGO authenticator on Shib IdP before one 
was available out of the box. On top of network greylisting it used 
user-agent greylisting. Keeping the user-agent lists up to date was a 
nightmare.

Nowadays we run the out-of-the-box SPNEGO from Shib IdP with just an 
activation condition with a long list of networks of windows domain 
-joined devices (Windows, Linux and MacOS) automatically updated from 
our CMDB. The network list also contains machine-authenticated VPN 
networks. On-site the domain joined devices are thrown into specific 
networks based on 802.1X device authentication.

This approach seems to work really well with practically zero manual 
labour regarding the SPNEGO issue.

The network part where you know and can control what kind of devices are 
coming from which networks can be a boatload of work to sort out. Even 
so it might be worth looking into SPNEGO or no SPNEGO. AFAIK sorting out 
your networks is the only relatively neat solution to the SPNEGO issue.

-- Timo Tunturi / Aalto University IT Services


More information about the users mailing list