Forbbiden 403 access denied with AWS SSO SAML application from Gitlab integration

0

HI,

I have a setup with AWS SSO and its identity source is AWS SSO (not AD or external)

I have a problem with this integration, the gitlab configuration has the correct configuration (with IDP Okta has worked correctly with the same configuration by Gitlab).

The idea is to use AWS SSO as IdP and Gitlab as SP.

Gitlab settings:

gitlab_rails['omniauth_enabled'] = true
gitlab_rails['omniauth_auto_link_user'] = ['saml']
gitlab_rails['omniauth_external_providers'] = ['saml']
gitlab_rails['omniauth_sync_profile_from_provider'] = ['saml']
gitlab_rails['omniauth_allow_single_sign_on'] = ['saml']
gitlab_rails['omniauth_block_auto_created_users'] = false
gitlab_rails['omniauth_auto_link_saml_user'] = false
gitlab_rails['omniauth_providers'] = [
  {
    name: "saml",
    label: "Saml Provider",
    args: {
      assertion_consumer_service_url: "http://gitlab.domain/users/auth/saml/callback",
      idp_sso_target_url: "https://portal.sso.eu-west-1.amazonaws.com/saml/assertion/{assertion_id}",
      issuer: "https://portal.sso.eu-west-1.amazonaws.com/saml/assertion/{assertion_id}",
      name_identifier_format: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
      idp_cert_fingerprint: "{fingerprint_cert}"
    }
  }
]

Into AWS SSO the config is:

AWS SSO mappings image url

The assigned users is a Administrator Group to which I belong

But I recivied this error:

AWS SSO Error image url

I only see the SAML Request but I can't find the SAML Response, also when I go back to the gitlab url with the Cookie, I get the following message in it: Could not authenticate you from SAML because "Saml response missing".

The assertions required by gitlab is:

Field	Supported keys
Email (required)	email, mail
Full Name	name
First Name	first_name, firstname, firstName
Last Name	last_name, lastname, lastName

Regards!

已提問 2 年前檢視次數 3465 次
2 個答案
1

I think the problem is related to setting up the trust between Gitlab - the service provider's application and AWS SSO, make sure to check the instruction manual AWS Single Sign-On (AWS SSO) Integration Guide for GitLab

HTH.

AWS
已回答 2 年前
  • I have followed that guide and the most I get is a 403 in the AWS SSO, I can not see more logs except the ones I see in the Cloudtrial where the 403 is indicated in Federate.

    The configuration with the Okta provider has worked correctly but with AWS SSO I can't get it to work.

0
已接受的答案

Hi again,

FInally, the configuration that has worked correctly for me into AWS SSO is:

Attribute APPAttributte SSOFormat
Subject${user:email}emailAddress
name${user:name}basic
last_name${user:familyName}basic
first_name${user:givenName}basic
email${user:email}basic

Regards!

已回答 2 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南