OIDC Password Grant Type does not honour Group Restrictions

Follow
    Applies to:
  • Legacy SecureAuth IdP
Deployment model:
  • On Premises
  • SecureAuth version affected: All
    Description:
    When using the OIDCToken endpoint with the Password Grant Type, we do not perform Group Restriction checks

    Cause:
    The Group Restriction and Adaptive Auth settings cannot be applied to OIDCToken as this normally handles anonymous requests from Oauth Servers.

    Resolution:

    You can workaround this issue by using a different Search Filter on the Data Tab so that only users in the group are allowed to authenticate.

    Eg.
    1. Click on the Data Tab
    2. Edit the Search Filter so it looks something like this

    (&(samAccountName=%v)(memberof=CN=OidcTest,OU=Groups,DC=Wood,DC=SASP,DC=local))

    The above search filter will only find users who are a member of the group "OidcTest" which exists in the Groups OU in my domain.

    3. Hit Save

     

    SecureAuth Knowledge Base Articles provide information based on specific use cases and may not apply to all appliances or configurations. Be advised that these instructions could cause harm to the environment if not followed correctly or if they do not apply to the current use case.
    Customers are responsible for their own due diligence prior to utilizing this information and agree that SecureAuth is not liable for any issues caused by misconfiguration directly or indirectly related to SecureAuth products

    0 out of 0 found this helpful

    Comments

    0 comments

    Please sign in to leave a comment.