passport-saml requires session support (session auth) — Is it possible to do with JWT auth instead? #869
Replies: 2 comments 7 replies
-
|
Beta Was this translation helpful? Give feedback.
-
@dangtony98 if I understood correctly you
So based on aforementioned links there is a chance that Furthermore if we link your stacktrace to codebases we can see that
Most interesting part is this (few lines before Internet search with
so without any further ado: have you tried to use If that does not work and since you have not used BTW. pay attention to single logout. If your Idp/deployment/application require single logout functionality (SLO) you are in a bit of a trouble even if you use |
Beta Was this translation helpful? Give feedback.
-
Thanks for this awesome module!
I've been implementing
passport-saml
for our codebase and stumbled upon an error after successfully integrating with Okta SAML 2.0:It seems that
passport-saml
requires session support which my project doesn't currently have (we use JWT authentication instead). There seems to be two options:passport-saml
to work with JWT authentication.Personally, I'm hoping that it would be possible to pursue the first option above that is after successful authentication, we can issue a JWT token back to the user.
It'd be amazing if you could help recommend a solution here!
To Reproduce
passport-saml
with Okta SAML 2.0 and create theMultiSamlStrategy
as below.console.log(profile)
does indeed print but then this error is received:Expected behavior
Be able to continue with JWT authentication approach.
v18.12.1
passport-saml
version:4.0.4
Beta Was this translation helpful? Give feedback.
All reactions