SecureAuth /admin/ endpoint is visible by default

Follow
    Applies to:
  • SecureAuth Identity Platform
  • Legacy SecureAuth IdP
Deployment model:
  • Hybrid
  • On Premises
  • Version Affected:  all

    Description:  

    The /admin/ endpoint is exposed by default on current IdP servers.

    The realms.json file may be interesting but upon review the data is not valid for any configured appliance.

     

    Cause:  

    This is a default configuration. Said endpoint only contains template data and no actual data from a configured IdP server.

     

    Resolution:  

    This endpoint can be blocked via IP Address restrictions or by using an IIS Rewrite rule to disallow any access/browsing of the /Admin endpoint.

     

    Special Considerations:  

    See article Create a Redirect from any Realm to a new Realm for information on creating a redirect within the IIS Manager on the SecureAuth IdP for a way to remedy this.

     

    SecureAuth Knowledge Base Articles provide information based on specific use cases and may not apply to all appliances or configurations. Be advised that these instructions could cause harm to the environment if not followed correctly or if they do not apply to the current use case.

    Customers are responsible for their own due diligence prior to utilizing this information and agree that SecureAuth is not liable for any issues caused by misconfiguration directly or indirectly related to SecureAuth products.

    0 out of 0 found this helpful

    Comments

    0 comments

    Please sign in to leave a comment.