-
Notifications
You must be signed in to change notification settings - Fork 8
Labels
help wantedExtra attention is neededExtra attention is needed
Description
Keycloak supports both OIDC and SAML Clients. We have reasonably good coverage of OIDC, but absolutely no checks for SAML clients. The same is true for identity providers: we currently do not have any checks that cover SAML IDPs when using identity federation.
If you know about misconfigurations in Keycloak SAML Clients (so, in the Keycloak configuration, not the implementation of the app that is using this client, which we can’t see from Keycloak), we would be extremely grateful for your input. Please describe:
- what is the misconfiguration?
- how does the client have to be configured to be vulnerable?
- what is the effect of this?
The same is true for SAML IDP configs.
We‘ll be happy to do the work of implementing the checks ourselves, but some starting points would be greatly appreciated.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
help wantedExtra attention is neededExtra attention is needed