Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 15.4.21 #47837

Merged
merged 1 commit into from
Oct 23, 2024
Merged

Release 15.4.21 #47837

merged 1 commit into from
Oct 23, 2024

Conversation

doggydogworld
Copy link
Contributor

Security fixes

[High] Privilege persistence in Okta SCIM-only integration

When Okta SCIM-only integration is enabled, in certain cases Teleport could
calculate the effective set of permission based on SSO user's stale traits. This
could allow a user who was unassigned from an Okta group to log into a Teleport
cluster once with a role granted by the unassigned group being present in their
effective role set.

Note: This issue only affects Teleport clusters that have installed a SCIM-only
Okta integration as described in this guide. If you have an Okta integration
with user sync enabled or only using Okta SSO auth connector to log into your
Teleport cluster without SCIM integration configured, you're unaffected. To
verify your configuration:

  • Use tctl get plugins/okta --format=json | jq ".[].spec.Settings.okta.sync_settings.sync_users"
    command to check if you have Okta integration with user sync enabled. If it
    outputs null or false, you may be affected and should upgrade.
  • Check SCIM provisioning settings for the Okta application you created or
    updated while following the SCIM-only setup guide. If SCIM provisioning is
    enabled, you may be affected and should upgrade.

We strongly recommend customers who use Okta SCIM integration to upgrade their
auth servers to version 15.4.19 or later. Teleport services other than auth
(proxy, SSH, Kubernetes, desktop, application, database and discovery) are not
impacted and do not need to be updated.

Other improvements and fixes

  • Added a new teleport_roles_total metric that exposes the number of roles which exist in a cluster. #47811
  • The join_token.create audit event has been enriched with additional metadata. #47766
  • Automatic device enrollment may be locally disabled using the TELEPORT_DEVICE_AUTO_ENROLL_DISABLED=1 environment variable. #47719
  • Fixed the Machine ID and GitHub Actions wizard. #47709
  • Alter ServiceAccounts in the teleport-cluster Helm chart to automatically disable mounting of service account tokens on newer Kubernetes distributions, helping satisfy security linters. #47702
  • Avoid tsh auto-enroll escalation in machines without a TPM. #47696
  • Fixed a bug that prevented users from canceling tsh scan keys executions. #47657
  • Reworked the teleport-event-handler integration to significantly improve performance, especially when running with larger --concurrency values. #47632
  • Fixes a bug where Let's Encrypt certificate renewal failed in AMI and HA deployments due to insufficient disk space caused by syncing audit logs. #47624
  • Adds support for custom SQS consumer lock name and disabling a consumer. #47613
  • Allow using a custom database for Firestore backends. #47584
  • Include host name instead of host uuid in error messages when SSH connections are prevented due to an invalid login. #47579
  • Extended Teleport Discovery Service to support resource discovery across all projects accessible by the service account. #47567
  • Fixed a bug that could allow users to list active sessions even when prohibited by RBAC. #47563
  • The tctl tokens ls command redacts secret join tokens by default. To include the token values, provide the new --with-secrets flag. #47546
  • Fix the example Terraform code to support the new larger Teleport Enterprise licenses and updates output of web address to use fqdn when ACM is disabled. #47511
  • Added missing field-level documentation to the terraform provider reference. #47470
  • Fixed a bug where tsh logout failed to parse flags passed with spaces. #47462
  • Fixed the resource-based labels handler crashing without restarting. #47453
  • Fix possibly missing rules when using large amount of Access Monitoring Rules. #47429

Enterprise:

  • Device auto-enroll failures are now recorded in the audit log.
  • Fixed possible panic when processing Okta assignments.

@doggydogworld doggydogworld added the no-changelog Indicates that a PR does not require a changelog entry label Oct 22, 2024
Copy link

This pull request is automatically being deployed by Amplify Hosting (learn more).

Access this pull request here: https://pr-47837.d1v2yqnl3ruxch.amplifyapp.com

@doggydogworld doggydogworld added this pull request to the merge queue Oct 22, 2024
github-merge-queue bot pushed a commit that referenced this pull request Oct 22, 2024
@github-merge-queue github-merge-queue bot removed this pull request from the merge queue due to failed status checks Oct 22, 2024
@doggydogworld doggydogworld added this pull request to the merge queue Oct 22, 2024
Merged via the queue into branch/v15 with commit 8671ae6 Oct 23, 2024
45 of 46 checks passed
@doggydogworld doggydogworld deleted the release/15.4.21 branch October 23, 2024 00:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport helm no-changelog Indicates that a PR does not require a changelog entry size/sm
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants