Forum Discussion

MC_273315's avatar
MC_273315
Icon for Cirrus rankCirrus
Jul 27, 2016
Solved

SSO Resource Assignment

I recently have multiple SP SSO connections working in the same Access Profile. This works as the user navigates to whichever resource they are requesting. The SAML resources are valued in 'LDAP Group Resource Assign'. I have them valued to AD groups, and this works, in the group you are allowed, not in the group, I get a page cannot be displayed or a long SSO error. Is there a way to display a nice error page around the group failure? Assuming you may be in 3/5 groups for example. (All without a real WebTop)

 

Thank you!

 

 

  • Hi,

     

    You can add an empty box and add branches where you check that session.assigned.resources and session.assigned.webtop are not empty.

     

12 Replies

  • Hi,

     

    You can add an empty box and add branches where you check that session.assigned.resources and session.assigned.webtop are not empty.

     

    • Yann_Desmarest_'s avatar
      Yann_Desmarest_
      Icon for Nacreous rankNacreous

      expression to include in the branch :

      expr { !([mcget {session.assigned.webtop}] equals "") && !([mcget {session.assigned.resources}] equals "") }

    • MC_273315's avatar
      MC_273315
      Icon for Cirrus rankCirrus

      Thanks, that does work if they are not a member of any SAML resource/WebTop. Do you know of a creative way to show a nice deny page if they match at least 1 SAML resource but not the one they are going to?

       

      Example, they make it through the policy since they have at least 1 SAML resource, however, they did not initiate the SSO connection at this resource. Therefore, it's a page cannot be displayed or a long SSO error. Maybe an irule that captures general SSO failure?

       

      Thanks, Mike

       

    • MC_273315's avatar
      MC_273315
      Icon for Cirrus rankCirrus

      This is the error - SSOv2 Error(16) Unable to find SAML SSO/SP Connector object matching SAML Authn Request.

       

      If I could intercept all (SSOv2 Error)s to redirect to a deny/sorry page, that would work. Testing irule logic now.

       

  • Hi,

     

    You can add an empty box and add branches where you check that session.assigned.resources and session.assigned.webtop are not empty.

     

    • Yann_Desmarest's avatar
      Yann_Desmarest
      Icon for Cirrus rankCirrus

      expression to include in the branch :

      expr { !([mcget {session.assigned.webtop}] equals "") && !([mcget {session.assigned.resources}] equals "") }

    • MC_273315's avatar
      MC_273315
      Icon for Cirrus rankCirrus

      Thanks, that does work if they are not a member of any SAML resource/WebTop. Do you know of a creative way to show a nice deny page if they match at least 1 SAML resource but not the one they are going to?

       

      Example, they make it through the policy since they have at least 1 SAML resource, however, they did not initiate the SSO connection at this resource. Therefore, it's a page cannot be displayed or a long SSO error. Maybe an irule that captures general SSO failure?

       

      Thanks, Mike

       

    • MC_273315's avatar
      MC_273315
      Icon for Cirrus rankCirrus

      This is the error - SSOv2 Error(16) Unable to find SAML SSO/SP Connector object matching SAML Authn Request.

       

      If I could intercept all (SSOv2 Error)s to redirect to a deny/sorry page, that would work. Testing irule logic now.