Enabling SAML gradual rollout on WSS Agent fails to redirect user to IDP server login page
search cancel

Enabling SAML gradual rollout on WSS Agent fails to redirect user to IDP server login page

book

Article ID: 269098

calendar_today

Updated On:

Products

Cloud Secure Web Gateway - Cloud SWG

Issue/Introduction

Users accessing internet sites via Cloud SWG using IPSEC and WSS agent access methods.

WSS Agent users retrieve group information using Auth Connector but goal is to move to SAML based authentication and remove the auth connector.

SAML federation enabled on Cloud SWG where IPSEC users can authenticate successfully.

WSS Agent installed on hosts with AU=unauthenticated to enabled SAML gradual rollout but users are not redirected to the SAML IDP server to login. Instead they remain with local logins.

Issue seen with WSS Agents on both macOS and Windows.

Environment

WSS Agent.

SAML gradual rollout process enabled.

Cloud SWG managed using UPE policies.

Cause

pod.threatpulse.com bypassed from authentication in Cloud SWG policy.

Resolution

Remove pod.threatpulse.com from the auth bypass list.

Policy included auth bypass condition which was removed to solve the problem:

define url.domain condition "BC_Auth_Bypass_Custom_auth_bypass_UrlList_14196201_Auth_bypassed_destinations_domains"
:
   'pod.threatpulse.com'
:

Additional Information

As per the WSS Agent SAML docs, pod.threatpulse.com is heavily used in the SAML authentication process. WHen a request comes in for this domain, from an agent, it will typically trigger a 307 HTTP redirect to saml.threatpulse.net:8443. 

In non working case, the HTTP response code was  200 OK and the SAML authentication process would not complete.

Symdiag PCAPs showed the 200 error returned, as did HAR files, with no redirects.