Dear All,
a little update of my case. When I create SAML Internal Source I can't define a new rule because it's impossible ! There are any filed that permit this action so I add an HTTPASSWD
internal source and inside of it I create a rule named INFN-AAI-SAML.
After that I change INFN-AAI authorization field and restart PF so my current authentication.conf is:

[local]
......
[INFN-AAI]
authorization_source_id=INFN-AAI-SAML
idp_ca_cert_path=/usr/local/pf/conf/ssl/idp.crt
sp_cert_path=/usr/local/pf/conf/ssl/server.crt
idp_metadata_path=/usr/local/pf/conf/idp-metadata.xml
set_access_level_action=
username_attribute=urn:oid:0.9.2342.19200300.100.1.1
idp_cert_path=/usr/local/pf/conf/ssl/idp.crt
description=INFN AAI
idp_entity_id=https://idp.infn.it/saml2/idp/metadata.php
sp_key_path=/usr/local/pf/conf/ssl/server.key
sp_entity_id=https://pfsrv.pg.infn.it
type=SAML

[INFN-AAI-SAML]
realms=local
set_access_level_action=
path=/usr/local/pf/pippo
description=INFN-AAI-SAML
type=Htpasswd

[INFN-AAI-SAML rule INFN-AAI-SAML]
action0=set_role=PF-WEB
condition0=SSID,equals,27
match=all
class=authentication
action1=set_access_duration=12h

and from packetfence.log:

Dec 12 16:38:08 pfsrv packetfence_httpd.portal: httpd.portal(16956) INFO: [mac:a4:5e:60:c1:80:c3] User becchett has authenticated on the portal. (Class::MOP::Class:::after) Dec 12 16:38:08 pfsrv packetfence_httpd.portal: httpd.portal(16956) WARN: [mac:a4:5e:60:c1:80:c3] Calling match with empty/invalid rule class. Defaulting to 'authentication' (pf::authentication::match) Dec 12 16:38:08 pfsrv packetfence_httpd.portal: httpd.portal(16956) INFO: [mac:a4:5e:60:c1:80:c3] Using sources INFN-AAI for matching (pf::authentication::match) Dec 12 16:38:08 pfsrv packetfence_httpd.portal: httpd.portal(16956) INFO: [mac:a4:5e:60:c1:80:c3] User becchett has authenticated on the portal. (Class::MOP::Class:::after) Dec 12 16:38:08 pfsrv packetfence_httpd.portal: httpd.portal(16956) WARN: [mac:a4:5e:60:c1:80:c3] Calling match with empty/invalid rule class. Defaulting to 'authentication' (pf::authentication::match)

Is there any BUG or is my mistake ?????
Thanks a lot !
Bye
Enrico


Il 12/12/2018 08:36, Enrico Becchetti via PacketFence-users ha scritto:
Il 12/12/2018 08:17, Nicolas Quiniou-Briand ha scritto:
Hello,

On 2018-12-12 7:46 a.m., Enrico Becchetti wrote:
Hello !

"Configuration->Policies and Access Control-> Roles" I've added "PF-WEB",
"Max Nodes per user" equal to 0 and default Traffic Shaping.

You just create the role. To assign it, you need to create an authentication rule in your authentication source. For SAML source, you need to define first a source and then assign this source to your SAML source :

https://packetfence.org/doc/PacketFence_Installation_Guide.html#_saml_authentication
Dear Nicolas ,
my goal is to permit to all authenticated users the use of the network.
So my authorization rule can be very simply: all or catchall etc.

You wrote "For SAML source, you need to define first a source and then assign this source to your SAML source"
is right or there are too many  "Source"????

It almost seems that to assign an authorization to SAML I have to create a new source. Is that it?

In PacketFence_Installation_Guide there is INVERSE as authorization field
instead of my "local". So if I understand I need to create a new rule and than assign it to this SAML Source but inside "Configuration->Policies and Access Control->"
there isn't.

thanks for your quick reply
Enrico



--
_______________________________________________________________________

Enrico Becchetti                    Servizio di Calcolo e Reti

Istituto Nazionale di Fisica Nucleare - Sezione di Perugia
Via Pascoli,c/o Dipartimento di Fisica  06123 Perugia (ITALY)
Phone:+39 075 5852777             Mail: Enrico.Becchetti<at>pg.infn.it
______________________________________________________________________



_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to