Open access control for testing

Mathew, Sunil smathew at hbs.edu
Wed Aug 12 19:09:15 UTC 2020


We just added the VPN NAT address t o access control and that worked.

        <entry key="AccessByIPAddress">
            <bean id="AccessByIPAddress" parent="shibboleth.IPRangeAccessControl"
                p:allowedRanges="#{ {'199.94.00.00/32', '127.0.0.1/32', '::1/128'} }" />
        </entry>

PS: This is a test environment that we are setting up Shibboleth in ECS and the security group is limiting to clients only from VPN ip address.

Sunil


On 8/12/20, 4:02 AM, "users on behalf of Peter Schober" <users-bounces at shibboleth.net on behalf of peter.schober at univie.ac.at> wrote:

    * Mathew, Sunil <smathew at hbs.edu> [2020-08-11 19:20]:
    > Here is my problem. I deployed Shibboleth to ECS. But I was getting the following error in IdP logs:
    > 
    > IDP_WARN: 2020-08-10 17:33:37,057 - 10.140.0.162 - ERROR
    > [org.opensaml.saml.common.binding.security.impl.ReceivedEndpointSecurityHandler:200]
    > - Message Handler: SAML message intended destination endpoint
    > 'https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsso.hbsstg.org%2Fidp%2Fprofile%2FSAML2%2FRedirect%2FSSO&data=02%7C01%7Csmathew%40hbs.edu%7Cde308d73e83d4630d4d408d83e96064e%7C09fd564ebf4243218f2db8e482f8635c%7C0%7C0%7C637328161378736967&sdata=iOWEEcNGiTmOYRS2Pq1mNdoaO1wGpjkR5bMREojkobs%3D&reserved=0' did not
    > match the recipient endpoint
    > 'https://nam04.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsso.hbsstg.org%2Fidp%2Fprofile%2FSAML2%2FRedirect%2FSSO&data=02%7C01%7Csmathew%40hbs.edu%7Cde308d73e83d4630d4d408d83e96064e%7C09fd564ebf4243218f2db8e482f8635c%7C0%7C0%7C637328161378741957&sdata=pX6yxbFNPshWQdKyZI2v%2Bmt2e8Rm53F7pSqP2l%2FhmZs%3D&reserved=0'
    [...]
    > requestScheme:http
    > requestIsSecure:false
    > requestServerPort:80
    > 
    > We are trying to add tomcat valve with
    > protocolHeader="x-forwarded-proto" so that we can get past the
    > error.

    Alternatively you could try setting the relevant attributes on the
    relevant Tomcat (plain) HTTP Connector, e.g.

      proxyPort="443"
      scheme="https"
      secure="true"

    Of course you need to make sure there's no plain HTTP traffic being
    accepted/forward to/from your TLS offloading service. (And IDP doesn't
    need plain HTTP support, not even with redirects to HTTPS, so just
    bock all non-HTTPS requests at the TLS offloading service.)

    Cheers,
    -peter
    -- 
    For Consortium Member technical support, see https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwiki.shibboleth.net%2Fconfluence%2Fx%2FcoFAAg&data=02%7C01%7Csmathew%40hbs.edu%7Cde308d73e83d4630d4d408d83e96064e%7C09fd564ebf4243218f2db8e482f8635c%7C0%7C0%7C637328161378741957&sdata=C7yQbZDYtVik6b3R%2BfiFsxQNtdnAyjqymTcL22bPuCU%3D&reserved=0
    To unsubscribe from this list send an email to users-unsubscribe at shibboleth.net



More information about the users mailing list