adamant-kite-43734
06/06/2023, 7:49 PMstocky-account-63046
06/11/2023, 2:37 PMcolossal-dentist-5939
06/12/2023, 3:10 AMuid
was not present in the SAML payload. I would classify it as a bug as the default behavior if a required field is missing should be to fail or error vs providing admin rights.stocky-account-63046
06/12/2023, 7:57 AMcolossal-dentist-5939
06/12/2023, 1:07 PMcolossal-dentist-5939
06/13/2023, 5:11 PMstocky-account-63046
06/13/2023, 5:13 PMstocky-account-63046
06/19/2023, 8:28 AMIn both cases, the kubeconfig was for a downstream cluster which I created as the original admin user, and then assigned to a SAML specific user.
The token present in the downloaded kubecfg matched the user logged in at the time in both cases
colossal-dentist-5939
06/19/2023, 5:47 PMuid
and it was being passed as username
in the SAML payload). When that happened a user was created in rancher for the inbound user but all of the information on the user matched that of the user used to create the saml connection - and the adfs_user://
is blank e.g.
"principalIds": [
"<local://user-bwvxn>",
"adfs_user://"
],
the user-*
name provided in the kubeconf would be that of the admin user too. We recreated and saw this on 2.6.11, 2.6.12, and 2.6.13 before we finally caught the payload token mismatch in name