cloudstack/setup/db
Rohit Yadav 20ce346f3a CLOUDSTACK-8457: SAML auth plugin improvements for production usage
* Move config options to SAML plugin
  This moves all configuration options from Config.java to SAML auth manager. This
  allows us to use the config framework.
* Make SAML2UserAuthenticator validate SAML token in httprequest
* Make logout API use ConfigKeys defined in saml auth manager
* Before doing SAML auth, cleanup local states and cookies
* Fix configurations in 4.5.1 to 4.5.2 upgrade path
* Fail if idp has no sso URL defined
* Add a default set of SAML SP cert for testing purposes
  Now to enable and use saml, one needs to do a deploydb-saml after doing a deploydb
* UI remembers login selections, IDP server

- CLOUDSTACK-8458:
    * On UI show dropdown list of discovered IdPs
    * Support SAML Federation, where there may be more than one IdP
        - New datastructure to hold metadata of SP or IdP
        - Recursive processing of IdP metadata
        - Fix login/logout APIs to get new interface and metadata data structure
        - Add org/contact information to metadata
        - Add new API: listIdps that returns list of all discovered IdPs
        - Refactor and cleanup code and tests

- CLOUDSTACK-8459:
    * Add HTTP-POST binding to SP metadata
    * Authn requests must use either HTTP POST/Artifact binding

- CLOUDSTACK-8461:
    * Use unspecified x509 cert as a fallback encryption/signing key
      In case a IDP's metadata does not clearly say if their certificates need to be
      used as signing or encryption and we don't find that, fallback to use the
      unspecified key itself.

- CLOUDSTACK-8462:
    * SAML Auth plugin should not do authorization
      This removes logic to create user if they don't exist. This strictly now
      assumes that users have been already created/imported/authorized by admins.
      As per SAML v2.0 spec section 4.1.2, the SP provider should create authn requests using
      either HTTP POST or HTTP Artifact binding to transfer the message through a
      user agent (browser in our case). The use of HTTP Redirect was one of the reasons
      why this plugin failed to work for some IdP servers that enforce this.
    * Add new User Source
      By reusing the source field, we can find if a user has been SAML enabled or not.
      The limitation is that, once say a user is imported by LDAP and then SAML
      enabled - they won't be able to use LDAP for authentication
    * UI should allow users to pass in domain they want to log into, though it is
      optional and needed only when a user has accounts across domains with same
      username and authorized IDP server
    * SAML users need to be authorized before they can authenticate
        - New column entity to track saml entity id for a user
        - Reusing source column to check if user is saml enabled or not
        - Add new source types, saml2 and saml2disabled
        - New table saml_token to solve the issue of multiple users across domains and
          to enforce security by tracking authn token and checking the samlresponse for
          the tokens
        - Implement API: authorizeSamlSso to enable/disable saml authentication for a
          user
        - Stubs to implement saml token flushing/expiry

- CLOUDSTACK-8463:
    * Use username attribute specified in global setting
      Use username attribute defined by admin from a global setting
      In case of encrypted assertion/attributes:
      - Decrypt them
      - Check signature if provided to check authenticity of message using IdP's
        public key and SP's private key
      - Loop through attributes to find the username

- CLOUDSTACK-8538:
    * Add new global config for SAML request sig algorithm

- CLOUDSTACK-8539:
    * Add metadata refresh timer task and token expiring
        - Fix domain path and save it to saml_tokens
        - Expire hour old saml tokens
        - Refresh metadata based on timer task
        - Fix unit tests

Signed-off-by: Rohit Yadav <rohit.yadav@shapeblue.com>

This closes #489
2015-06-29 12:25:02 +02:00
..
db CLOUDSTACK-8457: SAML auth plugin improvements for production usage 2015-06-29 12:25:02 +02:00
22beta4to22GA.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
221to222upgrade.sh applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
create-database-premium.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
create-database-simulator.sql property files and build file fixes for simulator db changes 2012-09-17 17:33:26 +05:30
create-database.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
create-schema-premium.sql db: use explicit USE statements to avoid SQL failures 2015-02-23 02:02:02 +05:30
create-schema-simulator.sql new vmsync for simulator 2014-07-30 15:10:51 -07:00
create-schema.sql CLOUDSTACK-7873 Fixed the user vm details length issue for higher key lengths 2014-11-10 21:24:28 +05:30
data-20to21.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
data-22beta1to22beta2.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
deploy-db-clouddev.sh It's due to replace.properties is missing, by default the password is cloud for user cloud 2012-07-09 11:48:43 -07:00
deploy-db-dev.sh db: Remove create-schema-view.sql, views are created using schema-40to410.sql 2013-02-17 23:49:27 +05:30
deploy-db-simulator.sh db: Remove create-schema-view.sql, views are created using schema-40to410.sql 2013-02-17 23:49:27 +05:30
hypervisor_capabilities.simulator.sql CLOUDSTACK-5080: Hypervisor Capabilities table missing entry for Simulator 2013-11-11 12:11:28 +05:30
index-20to21.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
index-212to213.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
postprocess-20to21.sql applying the commits from Chip Childers licensing cleanup 2012-06-26 10:44:04 -04:00
server-setup.sql Cleanup of Xen and XenServer terms. Cloned xen plugin creating a xenserver plugin, then removed xen plugin 2014-06-07 04:50:23 -04:00
server-setup.xml Summary: Fix hanging references to /var/lib/cloud, changed to /var/cloudstack 2013-02-13 13:22:28 -07:00
templates.simulator.sql Added Fix for CLOUDSTACK-5875 2014-01-23 17:11:33 +05:30
templates.sql CLOUDSTACK-8165: updating guest os id for xen template to corresponding 64 bit as default template is 64 bit 2015-01-19 15:44:14 +05:30