You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,11 @@ We will continue to post relevant release notes on the GitHub release page. More
5
5
6
6
More information about our release strategy can be found in the [Development Guidelines](https://github.com/OpenConext/OpenConext-engineblock/wiki/Development-Guidelines#release-notes) on the EngineBlock wiki.
7
7
8
+
## 6.3.4
9
+
10
+
**Bugfix**
11
+
- Whether MFA AuthnContext must be added should be based on original SP #893#894
12
+
8
13
## 6.3.3
9
14
**Bugfixes:**
10
15
- Move NoPassive response processing up in the ACS proces #890
Copy file name to clipboardExpand all lines: src/OpenConext/EngineBlockFunctionalTestingBundle/Features/MfaAuthnContextClassRef.feature
+43-32Lines changed: 43 additions & 32 deletions
Original file line number
Diff line number
Diff line change
@@ -5,58 +5,69 @@ Feature:
5
5
6
6
Background:
7
7
Given an EngineBlock instance on "vm.openconext.org"
8
-
And no registered SPs
9
-
And no registered Idps
10
-
And an Identity Provider named "SSO-IdP"
11
-
And a Service Provider named "SSO-SP"
8
+
And no registered SPs
9
+
And no registered Idps
10
+
And an Identity Provider named "SSO-IdP"
11
+
And a Service Provider named "SSO-SP"
12
+
And a Service Provider named "Trusted SP"
12
13
13
-
Scenario: The configured authn method should be set as AuthnContextClassRef if configured with the IdP configuration mapping
14
-
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
15
-
When I log in at "SSO-SP"
16
-
And I pass through EngineBlock
17
-
Then the url should match "functional-testing/SSO-IdP/sso"
18
-
And the AuthnRequest to submit should match xpath '/samlp:AuthnRequest/samlp:RequestedAuthnContext/saml:AuthnContextClassRef[text()="http://schemas.microsoft.com/claims/multipleauthn"]'
14
+
Scenario: The configured authn method should be set as AuthnContextClassRef if configured with the IdP configuration mapping
15
+
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
16
+
When I log in at "SSO-SP"
17
+
And I pass through EngineBlock
18
+
Then the url should match "functional-testing/SSO-IdP/sso"
19
+
And the AuthnRequest to submit should match xpath '/samlp:AuthnRequest/samlp:RequestedAuthnContext/saml:AuthnContextClassRef[text()="http://schemas.microsoft.com/claims/multipleauthn"]'
19
20
20
-
Scenario: The configured authn method should not be set as AuthnContextClassRef if not configured in the IdP configuration mapping
21
-
When I log in at "SSO-SP"
22
-
And I pass through EngineBlock
21
+
Scenario: The configured authn method should be set as AuthnContextClassRef if configured with the IdP configuration mapping for Trusted Proxy
22
+
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
23
+
And SP "Trusted SP" is a trusted proxy
24
+
And SP "Trusted SP" signs its requests
25
+
And SP "Trusted SP" is authenticating for SP "SSO-SP"
26
+
When I log in at "Trusted SP"
27
+
And I pass through EngineBlock
23
28
Then the url should match "functional-testing/SSO-IdP/sso"
24
-
And the response should not contain "http://schemas.microsoft.com/claims/multipleauthn"
29
+
And the AuthnRequest to submit should match xpath '/samlp:AuthnRequest/samlp:RequestedAuthnContext/saml:AuthnContextClassRef[text()="http://schemas.microsoft.com/claims/multipleauthn"]'
30
+
31
+
Scenario: The configured authn method should not be set as AuthnContextClassRef if not configured in the IdP configuration mapping
32
+
When I log in at "SSO-SP"
33
+
And I pass through EngineBlock
34
+
Then the url should match "functional-testing/SSO-IdP/sso"
35
+
And the response should not contain "http://schemas.microsoft.com/claims/multipleauthn"
25
36
26
37
Scenario: The configured authn method should also be set for unsolicited logins if configured in the IdP configuration mapping
27
38
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
28
39
When An IdP initiated Single Sign on for SP "SSO-SP" is triggered by IdP "SSO-IdP"
29
-
And I pass through EngineBlock
40
+
And I pass through EngineBlock
30
41
Then the url should match "functional-testing/SSO-IdP/sso"
31
42
And the AuthnRequest to submit should match xpath '/samlp:AuthnRequest/samlp:RequestedAuthnContext/saml:AuthnContextClassRef[text()="http://schemas.microsoft.com/claims/multipleauthn"]'
32
43
33
-
Scenario: A login should succeed if the configured authn method is set as AuthnContextClassRef in the IdP response
34
-
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
35
-
And the IdP "SSO-IdP" sends AuthnContextClassRef with value "http://schemas.microsoft.com/claims/multipleauthn"
36
-
When I log in at "SSO-SP"
37
-
And I pass through EngineBlock
38
-
And I pass through the IdP
39
-
And I give my consent
40
-
And I pass through EngineBlock
41
-
Then the url should match "/functional-testing/SSO-SP/acs"
44
+
Scenario: A login should succeed if the configured authn method is set as AuthnContextClassRef in the IdP response
45
+
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
46
+
And the IdP "SSO-IdP" sends AuthnContextClassRef with value "http://schemas.microsoft.com/claims/multipleauthn"
47
+
When I log in at "SSO-SP"
48
+
And I pass through EngineBlock
49
+
And I pass through the IdP
50
+
And I give my consent
51
+
And I pass through EngineBlock
52
+
Then the url should match "/functional-testing/SSO-SP/acs"
42
53
43
54
Scenario: A login should succeed if the configured authn method is set as one of the values in the http://schemas.microsoft.com/claims/authnmethodsreferences attribute in the IdP response
44
55
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
45
-
And the IdP "SSO-IdP" sends attribute "http://schemas.microsoft.com/claims/authnmethodsreferences" with values "http://schemas.microsoft.com/claims/multipleauthn" and xsi:type is "xs:string"
56
+
And the IdP "SSO-IdP" sends attribute "http://schemas.microsoft.com/claims/authnmethodsreferences" with values "http://schemas.microsoft.com/claims/multipleauthn" and xsi:type is "xs:string"
46
57
When I log in at "SSO-SP"
47
-
And I pass through EngineBlock
48
-
And I pass through the IdP
49
-
And I give my consent
50
-
And I pass through EngineBlock
58
+
And I pass through EngineBlock
59
+
And I pass through the IdP
60
+
And I give my consent
61
+
And I pass through EngineBlock
51
62
Then the url should match "/functional-testing/SSO-SP/acs"
52
63
53
64
Scenario: A login should fail if the configured authn method is not in the IdP response as AuthnContextClassRef or as a value in the http://schemas.microsoft.com/claims/authnmethodsreferences attribute
54
65
Given the IdP "SSO-IdP" is configured for MFA authn method "http://schemas.microsoft.com/claims/multipleauthn" for SP "SSO-SP"
55
66
When I log in at "SSO-SP"
56
-
And I pass through EngineBlock
57
-
And I pass through the IdP
67
+
And I pass through EngineBlock
68
+
And I pass through the IdP
58
69
Then I should see "Error - Multi factor authentication failed"
59
-
And the url should match "/authentication/feedback/invalid-mfa-authn-context-class-ref"
70
+
And the url should match "/authentication/feedback/invalid-mfa-authn-context-class-ref"
60
71
61
72
Scenario: The SP provided authn method should be set as AuthnContextClassRef if SP configured with transparent_authn_context
62
73
Given the IdP "SSO-IdP" is configured for MFA authn method "transparent_authn_context" for SP "SSO-SP"
0 commit comments