From Fedora Project Wiki

No edit summary
No edit summary
Line 11: Line 11:
For starters we need to configure the browser to work with the IPA CA and configure it to work with Kerberos.
For starters we need to configure the browser to work with the IPA CA and configure it to work with Kerberos.


In the browser, hit the web UI of the IPA server at http://ipa.example.com/ipa/config/browserconfig.html and follow the steps.
In the browser, hit the web UI of the IPA server at http://idp.example.com/ipa/config/browserconfig.html and follow the steps.
 
The SP's will be configured with a non-IPA SSL certificate so you'll get a warning dialog the first time you hit the page. Go ahead and add an exception.


===== Forms-based login =====
===== Forms-based login =====

Revision as of 23:34, 11 March 2015

Description

SAML login/logout testing.

Setup

  1. The IDP and both SPs need to be installed

How to test

Verify the basics

For starters we need to configure the browser to work with the IPA CA and configure it to work with Kerberos.

In the browser, hit the web UI of the IPA server at http://idp.example.com/ipa/config/browserconfig.html and follow the steps.

The SP's will be configured with a non-IPA SSL certificate so you'll get a warning dialog the first time you hit the page. Go ahead and add an exception.

Forms-based login

You will want to open a shell/console window to test this. You'll want to execute these as the user you started Firefox as.

Ensure you have no Kerberos credentials:

$ kdestroy -A

Bring up your Firefox window and in the upper-right select admin->Logout if you are still logged into the IDP.

Go the protected site you just created on the SP, https://sp.example.com/sp

You should be prompted with a login form.

User the user and password that was created during the IPA installation, ttest.

Once you've authenticated you should see a success page and a Logout link. If you see only a page with a Logout link this is a known issu, you should be redirected back to the SP, so let's go there manually. Go back to https://sp.example.com/sp/

You should get the welcome page.

Click Logout

Go back to the SP page, https://sp.example.com/sp/ and you should be redirected for login again.

Kerberos-based login

Now we will try login using Kerberos authentication.

Go to a shell and run:

$ kinit ttest

Go to https://sp.example.com/sp/ (or hit reload)

You may see a quick redirect to the IDP, then a return to the SP, and the welcome page displayed. If so then success!

Click Logout

If you click login again it should once again quickly redirect to the IDP and drop you back on the SP.

Single-Sign On

Single sign-on is best demonstrated using the forms-based login (because with Kerberos you could arguably just be re-authenticated and as an end-user there is no way to know whether Kerberos authenticated you or the IDP). Let us destroy the Kerberos ticket.

$ kdestroy -A

Go to your SP, https://sp.example.com/sp/ and you will be redirected to the IDP. Authenticate and hopefully you'll be redirected back, if not surf back to the secure page on the SP. You should see the welcome page.

Now bring up another tab or window and access the secure page on the second SP you configured, https://sp2.example.com/sp/. You should be presented with the welcome page without having to provide credentials. Welcome to federated Single-Sign on (SSO).

Single Logout

The inverse of SSO is Single Logout (SLO). In this test we'll log out of one SP and this should log you out of both.

On either SP select the Logout link.

Switch to the other tab/window and refresh the secured page, https://sp[2].example.com/sp/. You should be redirected to the login form. If so then success!

You can try logging back into both SP's and log out of the other SP this time. The order of login/logout shouldn't make a difference (if it does then it's a bug).

Expected Results

All the test steps should end with the specified results.