Using Discourse as a SSO provider


(Arpit Jalan) #1

So you want to use Discourse as a SSO provider for your own web app? Great! Let’s get started.

Enable SSO provider setting

Under Discourse admin site settings (/admin/site_settings) enable setting enable sso provider and set sso secret to a secret string (used to hash SSO payloads).

Implement SSO in your web app:

  • Generate a random nonce. Save it temporarily so that you can verify it with returned nonce value

  • Create a new payload with nonce and return url (where the Discourse will redirect user after verification). Payload should look like: nonce=NONCE&return_sso_url=RETURN_URL

  • Base64 encode the above raw payload. Let’s call this payload as BASE64_PAYLOAD

  • URL encode the above BASE64_PAYLOAD. Let’s call this payload as URL_ENCODED_PAYLOAD

  • Generate a HMAC-SHA256 signature from BASE64_PAYLOAD using your sso_secret as the key, then create a lower case hex string from this. Let’s call this signature as HEX_SIGNATURE

Send auth request to Discourse

Redirect the user to DISCOURSE_ROOT_URL/session/sso_provider?sso=URL_ENCODED_PAYLOAD&sig=HEX_SIGNATURE

Get response from Discourse:

If the above steps are done correctly Discourse will redirect logged in user to the provided RETURN_URL. You will get query string parameters with sig and sso along with some user info. Now follow below steps:

  • Compute the HMAC-SHA256 of sso using sso_secret as your key.

  • Convert sig from it’s hex string representation back into bytes.

  • Make sure the above two values are equal.

  • Base64 decode sso, you’ll get the passed embedded query string. This will have a key called nonce whose value should match the nonce passed originally. Make sure that this is the case.

  • You’ll find this query string will also contain a bunch of user information, use as you see fit.

That’s it. By now you should have set up your web app to use Discourse as SSO provider!

Discourse official “Using Discourse as SSO provider” implementations:

Community contributed “Using Discourse as SSO provider” implementations:


Using the Discourse SSO provider feature
Discourse to handle all user logins for my website
Discourse as an SSO provider for a set of Discourse sites
Use Discourse login for second Rails app
Use discourse for SSO in a non-web app?
Can I require a Discourse login to view things on a different site?
How-to setup a Discourse network?
Discourse as SSO source of authority for Wordpress
Setting the session token '_t' on the entire domain, not just my subdomain
Discourse as the SSO provider
How to logout user when using discourse as a SSO provider
Using Discourse SSO with Mantis Bug Tracker
Login to Discourse with custom Oauth2 provider
Use the same user database and login credentials in multiple discourse instances
SSO Redirect Problem
Official Single-Sign-On for Discourse (sso)
Discourse as an SAML, OAUTH IDP?
[Paid?] Migrate comments from several Blogger & Wordpress blogs to Discourse, under an SSO
Can I log into multiple instances of discourse simultaneously?
How to use SSO (Discourse on subdomain)
How to use SSO (Discourse on subdomain)
Authentication using username and password
With so much out there on SSO I still have questions
How to get password hashes of users
Discourse a SSO provider for Wordpress
Inter-Discourse
SSO between discourse sites?
Discourse as SSO provider for Prosody
Reverse Single-Sign-On: Possible to use Discourse accounts on my other site?
[Paid] WP + Discourse user authentication for IRC or other chat
Discourse session variables
Using Discourse SSO with Mediawiki
(James Cook) #2

Great how to, thanks.

FYI, the term ‘nonce’ has an unfortunate meaning in Britain.


(david) #4

I wrote a class to implement the process in Ruby. I use it to work with devise in my web application.


Simplest way to send user ID and username to an external site? Is SSO overkill for this?
(Ian Mackinnon) #5

sso seems to have a trailing newline which needs to be included when sent to the HMAC function, so it’s important to make sure that SSO consumer applications don’t strip whitespace from these query arguments.


(Michael Geneles) #6

Our app users get their own subdomains. Is there a way to implement this with variable SSO urls?


(Sam Saffron) #7

interesting, this is tricky you would need to monkey patch this in, or better still make core extensible in this way and add a plugin.


(Daniel Eklund) #8

Hello,

I have created an Erlang implementation for encoding/decoding the payloads described in this specification. You can find it here:


Feedback is welcome.

Thanks to @mpalmer on another thread for setting me straight.

As I put together this implementation, I realized that the specification does not say too much about a few things:

  1. the user information that is returned in the query parameters,
  2. what happens when a user is not found

When I got around to testing I found the answers, and then confirmed by looking at the code, here: discourse/session_controller.rb at master · discourse/discourse · GitHub

I shall assume that in regards to 1. that while new user information may be added, that none of these values (“name”,“username”,“email”,“external_id”, etc) will be removed. This is just as important, contractually as what is described in the main post.

One piece of feedback I’d like to give the Discourse team is that it would be nice to add a means to optionally return back to the calling application in the case of a missing user.

Currently, at line 51 a non-logged-in or non-registered user will be forwarded to the Discourse login page. While this can be useful, I would rather programmatically have the option to learn that this person has not yet logged in (or registered) and give them the opportunity on my site to continue anonymously.

I can imagine something like this:

DISCOURSE_ROOT_URL/session/sso_provider?
sso=URL_ENCODED_PAYLOAD&sig=HEX_SIGNATURE&
returnBackIfUserMissing=true

and then the Discourse site sending back to the return_sso_url with either a special header, or an attribute, rather than redirecting to /login.

This change should be backwards compatible.
I’m new here, so if this is something that could be contributed via a pull-request, please tell me and I could take a shot at it next week.

thanks,
daniel


(Sam Saffron) #9

Sure, totally open to add another option to the payload you send us for create_new=false PR welcome.


(Daniel Eklund) #10

added a PR for this

Commit-Message:

Implemented an optional 'no_user_found_return_sso_url' parameter to be called
 by the client when client is using Discourse as an SSO and wants Discourse to 
redirect back to a place of the client's choosng when a user is not found.

Currently, the Discourse as an SSO implementation checks the cookies _t and
 _session_forum to see if the user is registered and present in the database 
(_t is the token that is located in the users table). If a user is not found, 
the current implemenation forwards to the forum's /login URL. This behavior 
may be what the client wants, but it would be good to give an option to the 
client to send somewhere else.

This commit allows the client to embed an optional 'no_user_found_return_sso_url' 
parameter in the payload, prior to base64 and URL-encoding. If the Discoure SSO
endpoint detects that this parameter is present in the payload (and has a non-empty
value) the Discourse server will redirect to this new location if it does not detect the 
user. If this parameter is not present, then the redirection to /login will take place 
as it currently does.

Additionally, as the client may choose to use the same URL for
'no_user_found_return_sso_url' as for 'return_url', this commit introduces a new 
query-string name-value pair to be sent back to the client 'no_user_found_return_sso_url' 
location. This parameter 'user_found' will ALWAYS be sent back to the client, either when 
the user is found and 'return_url' is used or when the user is not found 
'no_user_found_return_sso_url' is used (values will be 'true' and 'false' respectively).

thanks,
daniel


(Erick Guan) #11

Nice work :slight_smile:

redirect_to can be routed to a url with parameters. But isn’t a create_new=false enough? Or whatever name it is. You’ll get nonce and the flag back.


(Daniel Eklund) #12

I wanted to give the client the flexibility of sending a failure to a different URL than the success url (return_url). With complicated SSO architectures, this might be a requirement. (Selfishly, I wanted to make my return endpoint code less convoluted – i.e. on my side I have two codebases at /sso for success and /sso_failure for failure).

Implicitly there are already two URLs (return_url for success and ‘/login’ for failure) – I didn’t want to lose that.

So just to be clear, the payload you send to the Discourse endpoint should have both return_url and no_user_found_return_sso_url if you want Discourse to send it back when no user is found. It should have return_url only if you are ok with Discourse forwarding to /login.

Should look like this:

1.If you want Discourse to forward to login if no user found, then:

PAYLOAD = return_url=mydomain.com/clientendpoint&nonce=xE787euK
2. If you want Discourse to send back to you to the same endpoint for failure as success:

PAYLOAD = no_user_found_return_sso_url=mydomain.com/clientendpoint&return_url=mydomain.com/clientendpoint&nonce=xE787euK
3. If you want Discourse to send back to you to a different endpoint as success:

PAYLOAD = no_user_found_return_sso_url=sub.mydomain.com/handleNewUser&return_url=mydomain.com/clientendpoint&nonce=xE787euK

Potentially a bit over-engineered, but that was my thought process.


(Erick Guan) #13

To be clear, it’s not user_not_found, it’s not logged in.

It’s about protocol not engineering in the first place. Given two endpoints, you have to deal with two possible endpoints. In both cases you must validate the nonce and destroy it. It’s a hurdle not benefit.

In extreme case, a client can ask Discourse several times with/without session (current_user), thus you would get n responses in each endpoints. It would be twice as hard to secure it due to changing cookies on your end.


(Daniel Eklund) #14

Completely agree on protocol over engineering. Hence, my submission.

The semantics are equivalent to an if-else block, or more generally a case/switch block. result_url is our true condition, and user_not_found_url is our else block. If we didn’t provide it, we would force the client to have to deal with the ‘failure’ condition in the same codebase/endpoint – and for 90% of the people, this will be fine.

90% of people who want Discourse to return back to them will set return_url and user_not_found_url to be exact same thing. This bears repeating, and really renders the motivations for the 10% moot.

90% of the time you will make return_url and user_not_found_url the exact same thing. These 90%-ers will use their JSESSIONID/ PHPSESSID/ ASPSESSIONID /_session to look up the returned encoded nonce in their framework-supplied session-store and engineer accordingly.

7% of people will be happy to pass it to a different URL on their same app-server, which does some decoration (servlet-chains anyone?) or routing, but still looks up the nonce in their session.

3% will have some complicated polyglotish system that uses a distributed session store (like memcache) to store sessions for different app servers implemented in different legacy codebases. It’s up to them to store/invalidate the nonce across these different systems.

I realize I might not have been completely clear, but the user_not_found_url still receives the sso and sig parameters, just like the return_url.

So, if you are the 90% scenario, when you get the payload and verify/decode it, you will find the parameter user_found=false|true to know why it’s coming back to you.


(Daniel Eklund) #15

@fantasticfears, as per your recommendation on the PR, I have renamed the attribute from user_not_found_url to return_sso_unlogged_in_url.


(Erlend Sogge Heggen) #16

3 posts were split to a new topic: Can Discourse be used as an OAuth provider?


(Thomas Schmit) #17

Great job !

Do you know how it possible to adapt it to GitLab in order to allow the Discourse users to directly login there?


(Ed) #18

Hey folks, I could not find anything, so I created a npm for Discourse auth using Passport for node.js.

It’s here, and in npm if anyone needs it:

(really appreciate the team’s work, we’ve been a user since the very early days @ talk.wigwag.com)


(Daniel Eklund) #19

@sam,

I have submitted a reply back to your rejection of the PR:
Optional 'no_user_found_return_sso_url' parameter for using Discourse as SSO by reverendpaco · Pull Request #4211 · discourse/discourse · GitHub

As I have been relying on my patched version of discourse for these months, I would be interested in convincing you as to my need.


(Daniel Eklund) #20

If this PR is going to be rejected, could you explain what I can do to get the functionality that I need?


(Sveinn Svavarsson) #21

Does anyone know of a wordpress plugin that works with discourse as the SSO provider?