Skip to content

providers/saml: configuration for default NameID Policy#15109

Merged
BeryJu merged 1 commit intomainfrom
providers/saml/default-name-id-policy
Aug 3, 2025
Merged

providers/saml: configuration for default NameID Policy#15109
BeryJu merged 1 commit intomainfrom
providers/saml/default-name-id-policy

Conversation

@BeryJu
Copy link
Member

@BeryJu BeryJu commented Jun 18, 2025

Details

Allow specifying a default NameID Policy for IDP-initiated login requests or when AuthN requests don't have a NameID policy. Fixes issues with IDP-initiated logins for things like Notion and AWS Identity Center


Checklist

  • Local tests pass (ak test authentik/)
  • The code has been formatted (make lint-fix)

If an API change has been made

  • The API schema has been updated (make gen-build)

If changes to the frontend have been made

  • The code has been formatted (make web)

If applicable

  • The documentation has been updated
  • The documentation has been formatted (make website)

@BeryJu BeryJu requested review from a team as code owners June 18, 2025 09:40
@netlify
Copy link

netlify bot commented Jun 18, 2025

Deploy Preview for authentik-docs canceled.

Name Link
🔨 Latest commit 88b261c
🔍 Latest deploy log https://app.netlify.com/projects/authentik-docs/deploys/688f3b03e7ac45000811672c

@netlify
Copy link

netlify bot commented Jun 18, 2025

Deploy Preview for authentik-storybook ready!

Name Link
🔨 Latest commit 88b261c
🔍 Latest deploy log https://app.netlify.com/projects/authentik-storybook/deploys/688f3b0363b8fb00087ce0af
😎 Deploy Preview https://deploy-preview-15109--authentik-storybook.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@codecov
Copy link

codecov bot commented Jun 18, 2025

Codecov Report

❌ Patch coverage is 90.00000% with 2 lines in your changes missing coverage. Please review.
✅ Project coverage is 92.75%. Comparing base (56ff8b1) to head (88b261c).
⚠️ Report is 1 commits behind head on main.
✅ All tests successful. No failed tests found.

Files with missing lines Patch % Lines
authentik/providers/saml/processors/assertion.py 50.00% 1 Missing ⚠️
.../providers/saml/processors/authn_request_parser.py 83.33% 1 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##             main   #15109      +/-   ##
==========================================
+ Coverage   92.70%   92.75%   +0.04%     
==========================================
  Files         831      831              
  Lines       44471    44488      +17     
==========================================
+ Hits        41225    41263      +38     
+ Misses       3246     3225      -21     
Flag Coverage Δ
e2e 46.86% <50.00%> (+0.07%) ⬆️
integration 23.62% <15.00%> (-0.01%) ⬇️
unit 90.82% <90.00%> (+<0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@github-actions
Copy link
Contributor

github-actions bot commented Jun 18, 2025

authentik PR Installation instructions

Instructions for docker-compose

Add the following block to your .env file:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-88b261c9fed845fbb7c6d3a0886bb96072b2271f
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

Afterwards, run the upgrade commands from the latest release notes.

Instructions for Kubernetes

Add the following block to your values.yml file:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
global:
    image:
        repository: ghcr.io/goauthentik/dev-server
        tag: gh-88b261c9fed845fbb7c6d3a0886bb96072b2271f

Afterwards, run the upgrade commands from the latest release notes.

@BeryJu BeryJu force-pushed the providers/saml/default-name-id-policy branch from faf8bf5 to 1eaa41e Compare July 8, 2025 11:46
@netlify
Copy link

netlify bot commented Jul 8, 2025

Deploy Preview for authentik-integrations canceled.

Name Link
🔨 Latest commit 88b261c
🔍 Latest deploy log https://app.netlify.com/projects/authentik-integrations/deploys/688f3b0330aeb0000801a732

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@BeryJu BeryJu force-pushed the providers/saml/default-name-id-policy branch from 1eaa41e to 88b261c Compare August 3, 2025 10:33
@BeryJu BeryJu merged commit 8b1240f into main Aug 3, 2025
107 of 108 checks passed
@BeryJu BeryJu deleted the providers/saml/default-name-id-policy branch August 3, 2025 17:24
kensternberg-authentik added a commit that referenced this pull request Aug 6, 2025
* main: (77 commits)
  website/integrations: add hass-openid instructions (#14672)
  core: add updated_at field to user (#15571)
  root: Add more opencontainer labels to Dockerfiles (#15923)
  core: bump goauthentik.io/api/v3 from 3.2025064.2 to 3.2025064.3 (#15949)
  core, providers/ldap: add parent/child groups to api and ldap results (#14974)
  web: Make Webdriver optional during install. (#15952)
  core, web: update translations (#15945)
  packages/django-dramatiq-postgres: fix typo (#15932)
  web: bump API Client version (#15942)
  core: fix flow planner checking against wrong user when creating recovery link (#15390)
  providers/saml: configuration for default NameID Policy (#15109)
  core: bump boto3 from 1.39.15 to v1.40.1 (#15926)
  core: bump jsii from 1.112.0 to v1.113.0 (#15927)
  core: bump argon2-cffi-bindings from 21.2.0 to v25.1.0 (#15925)
  core: bump aiohttp from 3.12.14 to v3.12.15 (#15924)
  core: bump opentelemetry-api from 1.35.0 to v1.36.0 (#15928)
  web/admin: fix variable name (#15934)
  policies: fix typo (#15933)
  web: bump @sentry/browser from 9.43.0 to 10.0.0 in /web in the sentry group across 1 directory (#15911)
  core: bump github.com/prometheus/client_golang from 1.22.0 to 1.23.0 (#15908)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant