-
Bug
-
Resolution: Fixed
-
Low
-
6.13.4
-
6
-
Severity 2 - Major
-
2
-
Issue Summary
Disabling SAML override in Confluence DC, to ensure no users can log in to Confluence via SAML/SSO only, still allows users to use default login URL and access the instance with local credentials.
Steps to Reproduce
- Configure Confluence DC with SAML/SSO (steps not covered here)
- Disable SAML override by setting
{ "allow-saml-redirect-override": false }
to
false via REST Call to https://localhost:PORT/contextPath/rest/authconfig/1.0/saml URL
Expected Results
Once allow-saml-redirect-override is set to false, it's expected the default login page redirects the request do the Idp and allow no further local users to log in to Confluence.
Actual Results
Users still able to access Confluence using local credentials via https://localhost:PORT/contextPath/dologin.action
or
https://localhost:PORT/contextPath/dologin.action?auth_fallback
Workaround
- The default login URL can be blocked at the Tomcat level, using the instructions in this KB:
How to block access to a specific URL at Tomcat - The URL can also be blocked or redirected at the proxy.
Note: To enable the auth_fallback URL during maintenance windows, the URL blocking workarounds will need to be reverted.
Fixed in SSO for Data Center plugin version 4.1.0, which is compatible with Confluence 7.2.1 and above. This version was bundled in Confluence 7.7.0 and above.