OIDC Password Grant Type does not honour Group Restrictions

Follow

SecureAuth version affected: All
Description:
When using the OIDCToken endpoint with the Password Grant Type, we do not perform Group Restriction checks

Cause:
The Group Restriction and Adaptive Auth settings cannot be applied to OIDCToken as this normally handles anonymous requests from Oauth Servers.

Resolution:

You can workaround this issue by using a different Search Filter on the Data Tab so that only users in the group are allowed to authenticate.

Eg.
1. Click on the Data Tab
2. Edit the Search Filter so it looks something like this

(&(samAccountName=%v)(memberof=CN=OidcTest,OU=Groups,DC=Wood,DC=SASP,DC=local))

The above search filter will only find users who are a member of the group "OidcTest" which exists in the Groups OU in my domain.

3. Hit Save

 

SecureAuth Knowledge Base Articles provide information based on specific use cases and may not apply to all appliances or configurations. Be advised that these instructions could cause harm to the environment if not followed correctly or if they do not apply to the current use case.
Customers are responsible for their own due diligence prior to utilizing this information and agree that SecureAuth is not liable for any issues caused by misconfiguration directly or indirectly related to SecureAuth products

0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.