-
Notifications
You must be signed in to change notification settings - Fork 72
Add Azure Active Directory Scan with Oauth2 #24
Comments
Hi @cocoytech , do you have an example app I can test with? This should already be supported, you can provide the login URL and the hook will try to login. |
This is application is using single sign on, but 2 things matter:
|
@cocoytech so if I understand it correctly you would like a feature that:
|
@dicksnel Exactly, thank you for this one sir, it would be valuable to us a nonprofit organization gearing to digital transformation |
@dicksnel I'm aware you're already working on this I'd just like to second that it would be very useful. Currently trying to do the same flow but getting the token from AWS Cognito. Thanks for the work, let me know if you need any testing done and I'd be happy to help. I will list the curl request that can be used to get the token below if that is useful for you
|
@JossSparkesAnswer I think it will get too complex to make a generic implementation for this. I'm thinking you could run the curl command before starting zap and then passing the response as a parameter to the docker run command. Then the auth plugin will parse the response and add the token to all requests. Something like this:
Can you post an example reponse that will be returned by Cognito? |
@dicksnel that makes sense, this was what I was trying to originally achieve but could not figure out how to pass the code through. Being able to pass it through would probably solve all the Oauth2 issues. So the full bash command we use is
This spits out just the section after "Bearer" in the auth token e.g.
|
@JossSparkesAnswer in that case I could add an extra config parameter, for example auth.bearer_token=eyJrxxxx. Using this the authentication module will not attempt to perform authentication but will just force the token on each request. Would that resolve this for you? |
@dicksnel yeah I’m pretty sure that will work perfectly for my instance, thanks |
@JossSparkesAnswer I just added the param auth.bearer_token. Could you give this a try? If you pass it a JWT token (eyJ...) it should force this token as the Authorization: Bearer on all requests. The Docker image is still building when it is done you can pull it: https://hub.docker.com/r/ictu/zap2docker-weekly/tags?page=1&ordering=last_updated |
@dicksnel Thanks for the quick work! It seems to not be working atm here. A little hard to debug but I think I may have a guess on the issue. Our webpage is very dumb and the API in the back does all the work. So I pointed the target to the frontend e.g. "-t https://{url}/projects" and I presume the authorization header gets added there which is fine but it doesn't actually authorize anything Typically then the API is called which needs the authorization header e.g. {apiURL}/project. I have included this in my auth.include with the base url and a wildcard after but I wonder if the authorization header is only being added to the target or if it is to all requests? |
@JossSparkesAnswer auth.include was intended for this, but maybe there is a bug. I will try to setup a test environment and discover why it is not working. |
@dicksnel let me know if there is anything more I could do. I can send you debug logs I would just have to remove all sensitive data |
Hello @JossSparkesAnswer / @CurlyBytes We are currently reviewing if there's still a usecase for this repository because in the meanwhile, ZAP seems to have included the same functionality. Do you (still) have a specific reason to use this repostory instead of the "original ZAP"? Sorry this answer took 2.5 years, but there's been a small shift in people working on this repository. :-) |
Hi i did stumble your article, i did amaze on how you customize the scripts(not a python developer here)
do you have any example on how to do it on Single Sign On scan application? like using Azure Active directory, by supplying, client id, client password/secret and scope
Thanks a lot
The text was updated successfully, but these errors were encountered: