-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: SSO MFA - WebUI backend implementation #47832
Conversation
ada7cd8
to
c594570
Compare
7fe308a
to
b122f9e
Compare
74c3706
to
e784fb8
Compare
b122f9e
to
d5f2687
Compare
027a025
to
9eb8e61
Compare
6fb82a4
to
12c1da6
Compare
00c431b
to
a45a867
Compare
6cc7449
to
fb1c62e
Compare
a45a867
to
7947990
Compare
fb1c62e
to
78d7977
Compare
@EdwardDowling @probakowski @rosstimothy Friendly ping to review |
|
||
// SSOResponse is a json compatible [proto.SSOResponse]. | ||
type SSOResponse struct { | ||
RequestID string `json:"requestId,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It looks like the surrounding existing structs are using snake case
RequestID string `json:"requestId,omitempty"` | |
RequestID string `json:"request_id,omitempty"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is intentional, the frontend uses camel case, but we've been inconsistent with it on the backend.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See a bit lower:
type AuthenticateWebUserRequest struct {
// User is a teleport username.
User string `json:"user"`
// WebauthnAssertionResponse is a signed WebAuthn credential assertion.
WebauthnAssertionResponse *wantypes.CredentialAssertionResponse `json:"webauthnAssertionResponse,omitempty"`
}
b1fa453
to
6f3674e
Compare
5fe895b
to
66bfc8e
Compare
* Add SSO MFA ceremony support to WebUI per-session MFA. * Add display name to SSO MFA device; Add SSO MFA device to SSO challenge. * Camel case json tags for front end. * Add sso channel ID for front end broadcast channel logic. * Fix backwards compatiblity issue; fix error message. * Fix test. * Fallback to connector id if display name isn't set. * Fix test. * Resolve comment. * Use uuid.NewRandom. * go mod tidy
* Add SSO MFA ceremony support to WebUI per-session MFA. * Add display name to SSO MFA device; Add SSO MFA device to SSO challenge. * Camel case json tags for front end. * Add sso channel ID for front end broadcast channel logic. * Fix backwards compatiblity issue; fix error message. * Fix test. * Fallback to connector id if display name isn't set. * Fix test. * Resolve comment. * Use uuid.NewRandom. * go mod tidy
Part of the implementation of #44699
Add SSO MFA challenges and response to the web http api and websocket messages.
Depends on #46982
frontend implementation (per-session mfa only): #47876