Skip to content

Commit cd3fc43

Browse files
committed
feat: Support for Single Logout
1 parent 64c874e commit cd3fc43

File tree

7 files changed

+255
-40
lines changed

7 files changed

+255
-40
lines changed

Appraisals

+1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
appraise 'rack-1' do
22
gem 'rack', '~> 1.x'
3+
gem 'term-ansicolor', '1.3.2'
34
end
45

56
appraise 'rack-2' do

README.md

+37
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,14 @@ The service provider metadata used to ease configuration of the SAML SP in the I
8686
* `:idp_sso_target_url` - The URL to which the authentication request should be sent.
8787
This would be on the identity provider. **Required**.
8888

89+
* `:idp_slo_target_url` - The URL to which the single logout request and response should
90+
be sent. This would be on the identity provider. Optional.
91+
92+
* `:slo_default_relay_state` - The value to use as default `RelayState` for single log outs. The
93+
value can be a string, or a `Proc` (or other object responding to `call`). The `request`
94+
instance will be passed to this callable if it has an arity of 1. If the value is a string,
95+
the string will be returned, when the `RelayState` is called. Optional.
96+
8997
* `:idp_sso_target_url_runtime_params` - A dynamic mapping of request params that exist
9098
during the request phase of OmniAuth that should to be sent to the IdP after a specific
9199
mapping. So for example, a param `original_request_param` with value `original_param_value`,
@@ -145,6 +153,35 @@ end
145153

146154
Then follow Devise's general [OmniAuth tutorial](https://github.com/plataformatec/devise/wiki/OmniAuth:-Overview), replacing references to `facebook` with `saml`.
147155

156+
## Single Logout
157+
158+
Single Logout can be Service Provider initiated or Identity Provider initiated.
159+
When using Devise as an authentication solution, the SP initiated flow can be integrated
160+
in the `SessionsController#destroy` action.
161+
162+
For this to work it is important to preserve the `saml_uid` value before Devise
163+
clears the session and redirect to the `/spslo` sub-path to initiate the single logout.
164+
165+
Example `destroy` action in `sessions_controller.rb`:
166+
167+
```ruby
168+
class SessionsController < Devise::SessionsController
169+
# ...
170+
171+
def destroy
172+
# Preserve the saml_uid in the session
173+
saml_uid = session["saml_uid"]
174+
super do
175+
session["saml_uid"] = saml_uid
176+
if SAML_SETTINGS.idp_slo_target_url
177+
spslo_url = user_omniauth_authorize_url(:saml) + "/spslo"
178+
redirect_to(spslo_url)
179+
end
180+
end
181+
end
182+
end
183+
```
184+
148185
## Authors
149186

150187
Authored by [Rajiv Aaron Manglani](http://www.rajivmanglani.com/), Raecoo Cao, Todd W Saxton, Ryan Wilcox, Steven Anderson, Nikos Dimitrakopoulos, Rudolf Vriend and [Bruno Pedro](http://brunopedro.com/).

gemfiles/rack_1.gemfile

+1
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ source "https://rubygems.org"
44

55
gem "appraisal"
66
gem "rack", "~> 1.x"
7+
gem "term-ansicolor", "1.3.2"
78

89
group :test do
910
gem "coveralls", "~> 0.8", ">= 0.8.13", :require => false

lib/omniauth/strategies/saml.rb

+132-34
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,19 @@ def self.inherited(subclass)
2727
first_name: ["first_name", "firstname", "firstName"],
2828
last_name: ["last_name", "lastname", "lastName"]
2929
}
30+
option :slo_default_relay_state
3031

3132
def request_phase
3233
options[:assertion_consumer_service_url] ||= callback_url
3334
runtime_request_parameters = options.delete(:idp_sso_target_url_runtime_params)
3435

3536
additional_params = {}
36-
runtime_request_parameters.each_pair do |request_param_key, mapped_param_key|
37-
additional_params[mapped_param_key] = request.params[request_param_key.to_s] if request.params.has_key?(request_param_key.to_s)
38-
end if runtime_request_parameters
37+
38+
if runtime_request_parameters
39+
runtime_request_parameters.each_pair do |request_param_key, mapped_param_key|
40+
additional_params[mapped_param_key] = request.params[request_param_key.to_s] if request.params.has_key?(request_param_key.to_s)
41+
end
42+
end
3943

4044
authn_request = OneLogin::RubySaml::Authrequest.new
4145
settings = OneLogin::RubySaml::Settings.new(options)
@@ -44,9 +48,7 @@ def request_phase
4448
end
4549

4650
def callback_phase
47-
unless request.params['SAMLResponse']
48-
raise OmniAuth::Strategies::SAML::ValidationError.new("SAML response missing")
49-
end
51+
raise OmniAuth::Strategies::SAML::ValidationError.new("SAML response missing") unless request.params["SAMLResponse"]
5052

5153
# Call a fingerprint validation method if there's one
5254
if options.idp_cert_fingerprint_validator
@@ -59,30 +61,21 @@ def callback_phase
5961
end
6062

6163
settings = OneLogin::RubySaml::Settings.new(options)
64+
6265
# filter options to select only extra parameters
6366
opts = options.select {|k,_| OTHER_REQUEST_OPTIONS.include?(k.to_sym)}
67+
6468
# symbolize keys without activeSupport/symbolize_keys (ruby-saml use symbols)
6569
opts =
6670
opts.inject({}) do |new_hash, (key, value)|
6771
new_hash[key.to_sym] = value
6872
new_hash
6973
end
70-
response = OneLogin::RubySaml::Response.new(request.params['SAMLResponse'], opts.merge(settings: settings))
71-
response.attributes['fingerprint'] = options.idp_cert_fingerprint
72-
73-
# will raise an error since we are not in soft mode
74-
response.soft = false
75-
response.is_valid?
76-
77-
@name_id = response.name_id
78-
@attributes = response.attributes
79-
@response_object = response
8074

81-
if @name_id.nil? || @name_id.empty?
82-
raise OmniAuth::Strategies::SAML::ValidationError.new("SAML response missing 'name_id'")
75+
handle_response(request.params["SAMLResponse"], opts, settings) do
76+
super
8377
end
8478

85-
super
8679
rescue OmniAuth::Strategies::SAML::ValidationError
8780
fail!(:invalid_ticket, $!)
8881
rescue OneLogin::RubySaml::ValidationError
@@ -91,7 +84,7 @@ def callback_phase
9184

9285
# Obtain an idp certificate fingerprint from the response.
9386
def response_fingerprint
94-
response = request.params['SAMLResponse']
87+
response = request.params["SAMLResponse"]
9588
response = (response =~ /^</) ? response : Base64.decode64(response)
9689
document = XMLSecurity::SignedDocument::new(response)
9790
cert_element = REXML::XPath.first(document, "//ds:X509Certificate", { "ds"=> 'http://www.w3.org/2000/09/xmldsig#' })
@@ -101,26 +94,43 @@ def response_fingerprint
10194
Digest::SHA1.hexdigest(cert.to_der).upcase.scan(/../).join(':')
10295
end
10396

104-
def on_metadata_path?
105-
on_path?("#{request_path}/metadata")
106-
end
107-
10897
def other_phase
109-
if on_metadata_path?
110-
# omniauth does not set the strategy on the other_phase
98+
if current_path.start_with?(request_path)
11199
@env['omniauth.strategy'] ||= self
112100
setup_phase
113-
114-
response = OneLogin::RubySaml::Metadata.new
115101
settings = OneLogin::RubySaml::Settings.new(options)
116-
if options.request_attributes.length > 0
117-
settings.attribute_consuming_service.service_name options.attribute_service_name
118-
settings.issuer = options.issuer
119-
options.request_attributes.each do |attribute|
120-
settings.attribute_consuming_service.add_attribute attribute
102+
103+
if on_subpath?(:metadata)
104+
# omniauth does not set the strategy on the other_phase
105+
response = OneLogin::RubySaml::Metadata.new
106+
107+
if options.request_attributes.length > 0
108+
settings.attribute_consuming_service.service_name options.attribute_service_name
109+
settings.issuer = options.issuer
110+
111+
options.request_attributes.each do |attribute|
112+
settings.attribute_consuming_service.add_attribute attribute
113+
end
114+
end
115+
116+
Rack::Response.new(response.generate(settings), 200, { "Content-Type" => "application/xml" }).finish
117+
elsif on_subpath?(:slo)
118+
if request.params["SAMLResponse"]
119+
handle_logout_response(request.params["SAMLResponse"], settings)
120+
elsif request.params["SAMLRequest"]
121+
handle_logout_request(request.params["SAMLRequest"], settings)
122+
else
123+
raise OmniAuth::Strategies::SAML::ValidationError.new("SAML logout response/request missing")
124+
end
125+
elsif on_subpath?(:spslo)
126+
if options.idp_slo_target_url
127+
redirect(generate_logout_request(settings))
128+
else
129+
Rack::Response.new("Not Implemented", 501, { "Content-Type" => "text/html" }).finish
121130
end
131+
else
132+
call_app!
122133
end
123-
Rack::Response.new(response.generate(settings), 200, { "Content-Type" => "application/xml" }).finish
124134
else
125135
call_app!
126136
end
@@ -146,6 +156,94 @@ def find_attribute_by(keys)
146156

147157
nil
148158
end
159+
160+
private
161+
162+
def on_subpath?(subpath)
163+
on_path?("#{request_path}/#{subpath}")
164+
end
165+
166+
def handle_response(raw_response, opts, settings)
167+
response = OneLogin::RubySaml::Response.new(raw_response, opts.merge(settings: settings))
168+
response.attributes["fingerprint"] = options.idp_cert_fingerprint
169+
response.soft = false
170+
171+
response.is_valid?
172+
@name_id = response.name_id
173+
@attributes = response.attributes
174+
@response_object = response
175+
176+
if @name_id.nil? || @name_id.empty?
177+
raise OmniAuth::Strategies::SAML::ValidationError.new("SAML response missing 'name_id'")
178+
end
179+
180+
session["saml_uid"] = @name_id
181+
yield
182+
end
183+
184+
def slo_relay_state
185+
if request.params.has_key?("RelayState") && request.params["RelayState"] != ""
186+
request.params["RelayState"]
187+
else
188+
slo_default_relay_state = options.slo_default_relay_state
189+
if slo_default_relay_state.respond_to?(:call)
190+
if slo_default_relay_state.arity == 1
191+
slo_default_relay_state.call(request)
192+
else
193+
slo_default_relay_state.call
194+
end
195+
else
196+
slo_default_relay_state
197+
end
198+
end
199+
end
200+
201+
def handle_logout_response(raw_response, settings)
202+
# After sending an SP initiated LogoutRequest to the IdP, we need to accept
203+
# the LogoutResponse, verify it, then actually delete our session.
204+
205+
logout_response = OneLogin::RubySaml::Logoutresponse.new(raw_response, settings, :matches_request_id => session["saml_transaction_id"])
206+
logout_response.soft = false
207+
logout_response.validate
208+
209+
session.delete("saml_uid")
210+
session.delete("saml_transaction_id")
211+
212+
redirect(slo_relay_state)
213+
end
214+
215+
def handle_logout_request(raw_request, settings)
216+
logout_request = OneLogin::RubySaml::SloLogoutrequest.new(raw_request)
217+
218+
if logout_request.is_valid? &&
219+
logout_request.name_id == session["saml_uid"]
220+
221+
# Actually log out this session
222+
session.clear
223+
224+
# Generate a response to the IdP.
225+
logout_request_id = logout_request.id
226+
logout_response = OneLogin::RubySaml::SloLogoutresponse.new.create(settings, logout_request_id, nil, RelayState: slo_relay_state)
227+
redirect(logout_response)
228+
else
229+
raise OmniAuth::Strategies::SAML::ValidationError.new("SAML failed to process LogoutRequest")
230+
end
231+
end
232+
233+
# Create a SP initiated SLO: https://github.com/onelogin/ruby-saml#single-log-out
234+
def generate_logout_request(settings)
235+
logout_request = OneLogin::RubySaml::Logoutrequest.new()
236+
237+
# Since we created a new SAML request, save the transaction_id
238+
# to compare it with the response we get back
239+
session["saml_transaction_id"] = logout_request.uuid
240+
241+
if settings.name_identifier_value.nil?
242+
settings.name_identifier_value = session["saml_uid"]
243+
end
244+
245+
logout_request.create(settings, RelayState: slo_relay_state)
246+
end
149247
end
150248
end
151249
end

0 commit comments

Comments
 (0)