Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Support SAML authentication #64

Open
airmnichols opened this issue Dec 6, 2023 · 1 comment
Open

Feature Request: Support SAML authentication #64

airmnichols opened this issue Dec 6, 2023 · 1 comment
Assignees
Labels
cantfix Unable to fix due to upstream limitations

Comments

@airmnichols
Copy link

airmnichols commented Dec 6, 2023

In our environment, we authenticate administrators to Infoblox using SAML authentication to Microsoft Entra ID (Azure Active Directory).

It would be nice for admins to be able to use their Entra ID accounts to use this PowerShell module.
This also enhances security as Entra ID will require Multi-Factor Authentication to get a SAML token.

Currently we need to use a Infoblox local administrator account to use the module which is not ideal.

Other PowerShell modules that support Microsoft Entra ID SAML authentication spawn an interactive web browser window from PowerShell to authenticate to Entra ID and get the SAML token to be used to authenticate.

@rmbolger rmbolger self-assigned this Dec 6, 2023
@rmbolger rmbolger added the cantfix Unable to fix due to upstream limitations label Dec 6, 2023
@rmbolger
Copy link
Owner

rmbolger commented Dec 6, 2023

Hi @airmnichols, thanks for reaching out. Unfortunately, the Infoblox WAPI doesn't currently support authenticating via SAML even in the latest NIOS 9.0.x versions. It only supports Basic Auth with explicit credentials or client certificate based auth.

If you want to verify on your current version, there's a Transport and Authentication section in the WAPI docs hosted directly on the grid master:
https://gridmaster.example.test/wapidoc/index.html#transport-and-authentication

It's also possible to create SAML users as SAML/Local instead of SAML Only such that they have a local password that can be used with WAPI but still use SAML for web UI login and permissions are consistent.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cantfix Unable to fix due to upstream limitations
Projects
None yet
Development

No branches or pull requests

2 participants