24slides / laravel-saml2
SAML2 Service Provider integration to your Laravel 5.4+ application, based on OneLogin toolkit
Installs: 1 456 917
Dependents: 1
Suggesters: 0
Security: 0
Stars: 231
Watchers: 8
Forks: 69
Open Issues: 53
Requires
- php: >=7.1
- ext-openssl: *
- illuminate/console: ~5.5|^6.0|^7.0|^8.0|^9.0|^10.0|^11.0
- illuminate/database: ~5.5|^6.0|^7.0|^8.0|^9.0|^10.0|^11.0
- illuminate/support: ~5.4|^6.0|^7.0|^8.0|^9.0|^10.0|^11.0
- onelogin/php-saml: ^3.0|^4.0
- ramsey/uuid: ^3.8|^4.0
Requires (Dev)
- mockery/mockery: ^0.9.9
- phpunit/phpunit: ^7.5|^9.0
- squizlabs/php_codesniffer: ^2.3
- dev-master
- 3.x-dev
- 2.4.0
- 2.3.0
- 2.2.1
- 2.2.0
- 2.1.0
- 2.0.11
- 2.0.10
- 2.0.9
- 2.0.8
- 2.0.7
- 2.0.6
- 2.0.5
- 2.0.4
- 2.0.3
- 2.0.2
- 2.0.1
- 2.0.0
- 1.2.0
- 1.1.4
- 1.1.3
- 1.1.2
- 1.1.1
- 1.1.0
- 1.0.0
- 0.11.1
- 0.11.0
- 0.10.0
- 0.9.0
- 0.8.1
- 0.8.0
- 0.7.1
- 0.7.0
- 0.6.0
- 0.5.1
- 0.5.0
- 0.0.2
- 0.0.1
- dev-add-tenant-uuid-to-error-detail
- dev-aguinaldotupy/master
This package is auto-updated.
Last update: 2024-11-13 18:44:22 UTC
README
An integration to add SSO to your service via SAML2 protocol based on OneLogin toolkit.
This package turns your application into Service Provider with the support of multiple Identity Providers.
Requirements
- Laravel 5.4+
- PHP 7.0+
Getting Started
Installing
Step 1. Install dependency
composer require 24slides/laravel-saml2
If you are using Laravel 5.5 and higher, the service provider will be automatically registered.
For older versions, you have to add the service provider and alias to your config/app.php
:
'providers' => [ ... Slides\Saml2\ServiceProvider::class, ] 'alias' => [ ... 'Saml2' => Slides\Saml2\Facades\Auth::class, ]
Step 2. Publish the configuration file.
php artisan vendor:publish --provider="Slides\Saml2\ServiceProvider"
Step 3. Run migrations
php artisan migrate
Configuring
Once you publish saml2.php
to app/config
, you need to configure your SP. Most of options are inherited from OneLogin Toolkit, so you can check documentation there.
Identity Providers (IdPs)
To distinguish between identity providers there is an entity called Tenant that represent each IdP.
When request comes to an application, the middleware parses UUID and resolves the Tenant.
You can easily manage tenants using the following console commands:
artisan saml2:create-tenant
artisan saml2:update-tenant
artisan saml2:delete-tenant
artisan saml2:restore-tenant
artisan saml2:list-tenants
artisan saml2:tenant-credentials
To learn their options, run a command with
-h
parameter.
Each Tenant has the following attributes:
- UUID — a unique identifier that allows to resolve a tenannt and configure SP correspondingly
- Key — a custom key to use for application needs
- Entity ID — Identity Provider Entity ID
- Login URL — Identity Provider Single Sign On URL
- Logout URL — Identity Provider Logout URL
- x509 certificate — The certificate provided by Identity Provider in base64 format
- Metadata — Custom parameters for your application needs
Default routes
The following routes are registered by default:
GET saml2/{uuid}/login
GET saml2/{uuid}/logout
GET saml2/{uuid}/metadata
POST saml2/{uuid}/acs
POST saml2/{uuid}/sls
You may disable them by setting saml2.useRoutes
to false
.
/saml2
prefix can be changed viasaml2.routesPrefix
config parameter.
Usage
Authentication events
The simplest way to handle SAML authentication is to add listeners on Slides\Saml2\SignedIn
and Slides\Saml2\SignedOut
events.
Event::listen(\Slides\Saml2\Events\SignedIn::class, function (\Slides\Saml2\Events\SignedIn $event) { $messageId = $event->getAuth()->getLastMessageId(); // your own code preventing reuse of a $messageId to stop replay attacks $samlUser = $event->getSaml2User(); $userData = [ 'id' => $samlUser->getUserId(), 'attributes' => $samlUser->getAttributes(), 'assertion' => $samlUser->getRawSamlAssertion() ]; $user = // find user by ID or attribute // Login a user. Auth::login($user); });
Middleware
To define a middleware for default routes, add its name to config/saml2.php
:
/* |-------------------------------------------------------------------------- | Built-in routes prefix |-------------------------------------------------------------------------- | | Here you may define the prefix for built-in routes. | */ 'routesMiddleware' => ['saml'],
Then you need to define necessary middlewares for your group in app/Http/Kernel.php
:
protected $middlewareGroups = [ 'web' => [ ... ], 'api' => [ ... ], 'saml' => [ \App\Http\Middleware\EncryptCookies::class, \Illuminate\Cookie\Middleware\AddQueuedCookiesToResponse::class, \Illuminate\Session\Middleware\StartSession::class, ],
Logging out
There are two ways the user can logout:
- By logging out in your app. In this case you SHOULD notify the IdP first so it'll close the global session.
- By logging out of the global SSO Session. In this case the IdP will notify you on
/saml2/{uuid}/slo
endpoint (already provided).
For the first case, call Saml2Auth::logout();
or redirect the user to the route saml.logout
which does just that.
Do not close the session immediately as you need to receive a response confirmation from the IdP (redirection).
That response will be handled by the library at /saml2/sls
and will fire an event for you to complete the operation.
For the second case you will only receive the event. Both cases receive the same event.
Note that for the second case, you may have to manually save your session to make the logout stick (as the session is saved by middleware, but the OneLogin library will redirect back to your IdP before that happens):
Event::listen('Slides\Saml2\Events\SignedOut', function (SignedOut $event) { Auth::logout(); Session::save(); });
SSO-friendly links
Sometimes, you need to create links to your application with support of SSO lifecycle. It means you expect a user to be signed in once you click on that link.
The most popular example is generating links from emails, where you need to make sure when user goes to your application from email, he will be logged in.
To solve this issue, you can use helpers that allow you create SSO-friendly routes and URLs — saml_url()
and saml_route()
.
To generate a link, you need to call one of functions and pass UUID of the tenant as a second parameter, unless your session knows that user was resolved by SSO.
To retrieve UUID based on user, you should implement logic that links your internal user to a tenant.
Then, it generates a link like this:
https://yourdomain/saml/63fffdd1-f416-4bed-b3db-967b6a56896b/login?returnTo=https://yourdomain.com/your/actual/link
Basically, when user clicks on a link, it initiates SSO login process and redirects it back to your needed URL.
Examples
Azure AD
At this point, we assume you have an application on Azure AD that supports Single Sign On.
Step 1. Retrieve Identity Provider credentials
You need to retrieve the following parameters:
- Login URL
- Azure AD Identifier
- Logout URL
- Certificate (Base64)
Step 2. Create a Tenant
Based on information you received below, create a Tenant, like this:
php artisan saml2:create-tenant \
--key=azure_testing \
--entityId=https://sts.windows.net/fb536a7a-7251-4895-a09a-abd8e614c70b/ \
--loginUrl=https://login.microsoftonline.com/fb536a7a-7251-4895-a09a-abd8e614c70b/saml2 \
--logoutUrl=https://login.microsoftonline.com/common/wsfederation?wa=wsignout1.0 \
--x509cert="MIIC0jCCAbqgAw...CapVR4ncDVjvbq+/S" \
--metadata="customer:11235,anotherfield:value" // you might add some customer parameters here to simplify logging in your customer afterwards
Once you successfully created the tenant, you will receive the following output:
The tenant #1 (63fffdd1-f416-4bed-b3db-967b6a56896b) was successfully created.
Credentials for the tenant
--------------------------
Identifier (Entity ID): https://yourdomain.com/saml/63fffdd1-f416-4bed-b3db-967b6a56896b/metadata
Reply URL (Assertion Consumer Service URL): https://yourdomain.com/saml/63fffdd1-f416-4bed-b3db-967b6a56896b/acs
Sign on URL: https://yourdomain.com/saml/63fffdd1-f416-4bed-b3db-967b6a56896b/login
Logout URL: https://yourdomain.com/saml/63fffdd1-f416-4bed-b3db-967b6a56896b/logout
Relay State: / (optional)
Step 3. Configure Identity Provider
Using the output below, assign parameters to your IdP on application Single-Sign-On settings page.
Step 4. Make sure your application accessible by Azure AD
Test your application directly from Azure AD and make sure it's accessible worldwide.
Running locally
If you want to test it locally, you may use ngrok.
In case if you have a problem with URL creation in your application, you can overwrite host header in your nginx host config file by adding the following parameters:
fastcgi_param HTTP_HOST your.ngrok.io;
fastcgi_param HTTPS on;
Replace
your.ngrok.io
with your actual ngrok URL
Tests
Run the following in the package folder:
vendor/bin/phpunit
Security
If you discover any security related issues, please email brezzhnev@gmail.com instead of using the issue tracker.
Credits
License
The MIT License (MIT). Please see License File for more information.