-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add generic OIDC login option #10614
base: dev
Are you sure you want to change the base?
Conversation
DryRun Security SummaryThe code changes introduce support for multiple authentication methods in DefectDojo, including OpenID Connect, OAuth, and SAML, aiming to enhance application security by leveraging trusted identity providers while requiring careful configuration to prevent potential vulnerabilities. Expand for full summarySummary: The provided code changes introduce support for various authentication methods in the DefectDojo application, including OpenID Connect (OIDC), Google OAuth, Azure AD, Gitlab, Keycloak, GitHub Enterprise, and SAML 2.0. These changes aim to provide a more secure and flexible authentication system for the application. From an application security perspective, the changes are generally positive as they allow the application to leverage trusted identity providers for user authentication. This can help improve the overall security of the application by delegating authentication to these providers and enforcing strong security practices, such as secure token exchange, token signature verification, and proper access control. However, it is crucial to ensure that the integration with these authentication providers is properly configured and follows security best practices. This includes validating the OIDC token signature and claims, implementing robust session management and token revocation mechanisms, enforcing strong password policies, and enabling multi-factor authentication where possible. Additionally, the application's configuration management and the handling of multiple authentication options should be reviewed to prevent any potential security vulnerabilities. Files Changed:
Code AnalysisWe ran
Overall Riskiness🔴 Risk threshold exceeded. We've notified @mtesauro, @grendel513. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
Conflicts have been resolved. A maintainer will review the pull request shortly. |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
e7a6740
to
f97900e
Compare
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Hi @dandersonsw are you able to back out the formatting changes that aren not directly related to this PR? It is making review a little challenging |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
f97900e
to
855842e
Compare
Conflicts have been resolved. A maintainer will review the pull request shortly. |
Hi @Maffooch I was able to back out the formatting changes on all the files except for the documentation file. Hopefully that makes it easier to review. Happy to make further changes if needed. Thank you. |
@dandersonsw Just kicked off the tests 🤞 |
This pull request has conflicts, please resolve those before we can evaluate the pull request. |
We are narrowing the scope of acceptable enhancements to DefectDojo in preparation for v3. Learn more here:
https://github.com/DefectDojo/django-DefectDojo/blob/master/readme-docs/CONTRIBUTING.md
Description
This adds the option of using a generic OIDC identity provider for login, rather than a specific one like Google, Keycloak, etc...
Test results
Ideally you extend the test suite in
tests/
anddojo/unittests
to cover the changed in this PR.Alternatively, describe what you have and haven't tested.
Tested logging in using an OIDC identity provider
Documentation
Please update any documentation when needed in the documentation folder)
Checklist
This checklist is for your information.
dev
.dev
.bugfix
branch.