Closed srflaxu40 closed 6 years ago
Same here
Same Here
JumpCloud has changed the layout of they login screen. I hope you guys know how to fix it. I am also escalating this issue to JumpCloud support team.
What I can say here that they replace a traditional web form with scripted version. Therefore https://github.com/Versent/saml2aws/blob/master/pkg/provider/jumpcloud/jumpcloud.go#L66 code is not able to detect an action to post data.
I really do not understand, why this guys do not thing about compatibility.
If you are interested the new form send a request to
POST https://console.jumpcloud.com/userconsole/auth
Content-Type: application/json; charset=utf-8
{email: "a@b.com", password: "qqqq", context: "sso", redirectTo: "saml2/aws"
Hi everyone. I'm Jeff from JumpCloud. We did change our login page today in order to make the experience the same for authentication for SAML as well as other uses. We did not realize that this library was scraping our old form.
Hi everyone. I'm Jeff from JumpCloud. We did change our login page today in order to make the experience the same for authentication for SAML as well as other uses. We did not realize that this library was scraping our old form.
Can you guys help fix this?
Thank you for reaching us! Do you have any suggestions how to fix an issue?
We have reverted the changes for now and everything should be working again. We will figure out how to work with y'all prior to releasing it again. Thanks for understanding.
@jefmsmit Thank a lot for support! I can confirm that it works.
Does anyone here know of an alternative for this?
https://github.com/Versent/saml2aws/issues/230
It appears that AWS STS endpoints only work with a registered MFA device's ARN which I don't believe JC supports.
Can no longer use
saml2aws login
on sso endpoints. It seems that maybe something between it and IdP (JumpCloud)?Trying with verbose flag gives same error.