Open stumbaumr opened 4 years ago
We've the same problem with sentry 10 onpremise. A workaround is to remove the secondary token-signing and encryption certificate:
Get-AdfsCertificate -CertificateType token-signing --note thumbprint from old cert Get-AdfsCertificate -CertificateType token-decrypting --note thumbprint from old cert
Set-ADFSProperties -AutocertificateRollover $false
Remove-AdfsCertificate -CertificateType token-decrypting -Thumbprint
This issue has gone three weeks without activity. In another week, I will close it.
But! If you comment or otherwise update it, I will reset the clock, and if you label it Status: Accepted
, I will leave it alone ... forever!
"A weed is but an unloved flower." ― Ella Wheeler Wilcox 🥀
ping @getsentry/enterprise for triage
@stumbaumr Thanks for the detailed report!
@leedongwei I think this is fixed with the recent work on SSO and SAML?
Important Details
How are you running Sentry?
Description
I connected our onpremise sentry with our Active Directory using Active Directory Federation Services (ADFS) which provides also SAML2. Every year the ADFS creates a new signing certificate and for some time sends both certificates in the response. Some applications see the new certificate and import the fingerprint or public key into their config automatically, some not.
Sentry seems to be on the not side... so now authentication does not work, since the old certificate became invalid and the new one has not been accepted.
Steps to Reproduce
Good items to include here include:
What you expected to happen
The roll over of the signing certificate should be automatic.
Possible Solution
As soon as the SAML reponse includes more than one certificate import the newer one into the SAML settings. So basically this in an automated fashion: https://aws.amazon.com/de/blogs/security/how-to-set-up-uninterrupted-federated-user-access-to-aws-using-ad-fs/