Hi,
I have a requirement to add role based authorization for some secure pages. I want to set a property for pages called "Security Groups". This property will contain group names which shall have access to that page. I have configured SAML authn handler with Okta IDP . After login when SAML response is submitted to AEM ACS url , viz - /content/****/saml_login , I want to read the "Security Groups" from page property and groups of loggedin user from SAML response , and if there is a match between page property value and SAML response groups attribute , then allow user to view the page , if not then redirect user to error page.
User data is maintained in active directory and Okta provides those details, so I don't want to recreate those groups in AEM, just want to do the authorization on the go. I want to set the groups coming from Okta into user session , and on every page request , match Security groups property of page with groups in session.
Request you to let me know how to implement this.
Thanks!
Solved! Go to Solution.
Views
Replies
Total Likes
I want to point out that the code presented here (and marked as correct answer) is not "security". It prevents you just from accessing that page directly (with a direct request), but it does not prevent other pages from including it.
For example, if you secured the pages below /content/brand/securepages with the approach described, they can be accessed by using the /content/brand.2.json; content in there can be referenced directly (using reference component), etc. If you really want proper authorization for this content, you need to use ACLs on the content level, as they are always enforced, no matter at what level you want to access that content.
You can use a sling servlet filter where each request first comes to this before actually dispatching the AEM page.
https://sling.apache.org/documentation/the-sling-engine/filters.html
1. Get current user details using UserManager:
ex: final UserManager userManager = request.getResourceResolver().adaptTo(UserManager.class);
2. Get the current URL from the request & check if the group "Security Groups" present in page properties or not using the page manager API.
3. If true => validate the current user is in the list of "Security Groups" and if yes, store it in boolean flag isValidRequest.
4. if isValidRequest true => filterChain.doFilter -> return normal AEM page with response 200
5. if false: return 404
ex:
if(runModes.contains("author")) {
if (isValidRequest) {
filterChain.doFilter(request, response);
} else {
return404Response();
return;
}
}
Thanks for your comments. I have written Servlet filter code in which I am able to get page properties , including security groups. But before that I need to check if the page is secured or not. I am not able to get "cq:authenticationRequired" or "jcr:mixinTypes" in filter code. These are set when we check 'Enable Authentication' checkbox in Advanced page properties. In CRX DE , I dont see "cq:authenticationRequired" in jcr:content node properties, I do see "jcr:mixinTypes" as property of page node.
Any hints on why these properties are not available in filter? Or if there is any other way of knowing if page requires Authentication
Below is my code .
PageManager pageManager = resourceResolver.adaptTo(PageManager.class);
Page page = pageManager.getContainingPage(resource.getPath());
for(Entry<String, Object> e : page.getProperties().entrySet()) {
String key = e.getKey();
Object value = e.getValue();
log.info("Key : {} . Value : {} ",key, value.toString() );
}
Views
Replies
Total Likes
Views
Replies
Total Likes
AEM can do that for you:
* Create a group on Okta side, which members should be able to perform this action
* Make sure that this group is synchronized to AEM (login with a user of that group and check that this group is synchronized to AEM).
* Adjust the permissions assigned to this group in the way you require.
This is straight forward way and doesn't require any coding.
Views
Replies
Total Likes
Recently i did this, you can achieve this using the roles you are getting from okta.
Once a user logged in to AEM will be assigned that role coming from okta and in aem u need to assign specific permission to that group.
I want to point out that the code presented here (and marked as correct answer) is not "security". It prevents you just from accessing that page directly (with a direct request), but it does not prevent other pages from including it.
For example, if you secured the pages below /content/brand/securepages with the approach described, they can be accessed by using the /content/brand.2.json; content in there can be referenced directly (using reference component), etc. If you really want proper authorization for this content, you need to use ACLs on the content level, as they are always enforced, no matter at what level you want to access that content.
Hi,
Thanks for pointing this out. As I mentioned earlier I dont have fixed groups which I can preset in AEM. Groups keep getting created & deleted in Active Directory. The filter I have written works fine for ".html" but was allowing access to page json as you mentioned, so I changed the filter to run on ".json" also and that prevents access to page json also. Is this approach fine ? Will the filter cause any performance issue since it will evaluate all html & json requests ?
Thanks!
Views
Replies
Total Likes
Views
Replies
Total Likes
Views
Likes
Replies