-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Session timeout in Kibana SAML #159
Comments
It seems SAML does not adhere to the set session timeouts and always uses 1 h by default, and disabled keepalive ...https://github.com/opendistro-for-elasticsearch/security-kibana-plugin/blob/88f7dd343e53fabc466f92b90a9165db105d9b7b/lib/auth/types/saml/Saml.js#L70 Edit: After further debugging and reading of the code I came to the following conclusions:
whereas the 1440 is the minutes, possible values for the first part are AUTO, SESSION and NOW. NOW => always takes now as the session basis To any of those values the expiry is added (default value is 60 for 1 h) |
@thoro Thank you for your suggestion. However, I am getting the following error:
|
should look like that:
|
I also encountered the same issue, adding the configuration doesn't work... |
Is there a fix for this yet? Currently experiencing the same issues |
Same here |
might be a duplicate of https://github.com/opendistro-for-elasticsearch/security-kibana-plugin/issues/71 |
This is actually a defect with the In my case it's related to the fact that Auth0 does not store the This breaks the |
This is still an active issue for anyone using openid_auth_domain |
[Triage] We'd love to see a pull request that addresses this issue. |
any update on this? We are facing same issue using openid_auth_domain -> type: openid |
any update on this? |
HI!
Indicate the length of time you want in milliseconds, for example, 8 hours as in the example above. Tested on 2 clusters of OpenSearch 2.7.0 version. Cluster A - work without session timeout |
We are seeing this issue with |
So I have made all these setting changes and still getting logged out exactly at 60 minutes. Is all users can login just fine, but exactly at 60 min whether active or not they get redirected to login screen. Click the SSO button and are back in. My latest update was to change the order so that OpenID was order: 0 and internal auth was order :1 authc: |
Any plans to fix this issue? We are also having this problem and it's quite annoying. |
FYI this issue persists with opensearch 2.8.0 |
It seems this isnt a config issue as many users are experiencing it. WIll there be a defect opened? |
After digging deeper into the config I came to the conclusion that the reason for the behaviour is based on the default access-token-lifetime of the IdP. I evaluated that with an Entra-ID (formerly Azure AD)-based system with a custom based token lifetime policy (details can be seen at https://learn.microsoft.com/en-us/azure/active-directory/develop/configure-token-lifetimes). The following pwsh has been used by me and resulted in a session-life-time of 8hours. To be sure that the access token lifetime is the reason for the behavior I configured the session-cookie-lifetime to 24hours. i.e.
|
Bump! I'm facing this issue as well. Running Dashboards 2.8.0 using SAML. Logs user out after exactly 60 minutes even when the session is not that short i tried everything described here but still not honoring the TTL. |
same here, running Dashboards 2.9.0 using SAML (Google as IDP) the user is logged out exactly after 60 minutes even when custom settings for TTL are set in the yaml config. |
Seem's to be the same issue with Google-IdP. You need to change the default lifetime of the access token. Look at https://cloud.google.com/docs/authentication/token-types#at-lifetime |
big caveat: |
bump |
Any Update on this issue? We have used all the suggested options. We are using Ping ID (OIDC) and facing forced session timeout of 15 min irrespective of the configuration we add in security plugins for dashboard or OpenSearch PODs. Dashboard: opensearch_security: Opensearch: |
SAML Azure AD - same issue. |
This issue is getting a little long in the tooth. It seems to me like there's several issues mentioned, some related, and some not, and some based on opendistro, which may or may not be out of date. From what I see the issues are:
I will be closing this issue with the merging of #1773. Anybody please feel free to open a follow-up issue with detailed reproduction steps (IDP, opensearch_dashboards.yml settings, opensearch security backend config, etc.) so I can better address individual concerns. Thanks! Additionally, we have a RFC #1711 to discuss confusion around some of the settings. If anyone has any thoughts, please leave them there, thanks! @snarmaev @thoro @smalltown @jonbev @jbarnett1981 @bbrendon @mvanderlee @mhoydis13 @sushovan23 @taltsafrirpx @hm2thr33 @StefanStroebel @hobti01 @dominik-paiha-auva @elnoxgdl @tomuk5 @dominik-paiha-auva @danielwhatmuff |
Closing this as #1773 was merged. |
Hi @derek-ho thanks for taking your time to make a fix for this I am asking this because the same hasn't been mentioned in the releases notes https://github.com/opensearch-project/security-dashboards-plugin/releases/tag/2.12.0.0 |
@shree1999 sorry I just saw this - this didn't make it into the 2.12.0 release, and instead will be available in 2.13. That should be released by April 2nd: https://opensearch.org/releases.html |
Is this session timeout issue fixed in latest OpenSearch 2.16.0 release? |
In 2.14 work fine. |
Is the session issue fixed in 2.14 or we need to configure below ones Extend the session timeoutopensearch_security.session.ttl: 28800000 |
Hello, I have the same issue with the expiring session time in Kibana. However, I have set options to keep session for 24 hours in kibana.yml
opendistro_security.cookie.ttl: 86400000
opendistro_security.session.ttl: 86400000
opendistro_security.session.keepalive: true
Could you please help with this issue?
The text was updated successfully, but these errors were encountered: