Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Microsoft broke authentication with multiple roles #323

Open
sydorovdmytro opened this issue Apr 17, 2024 · 1 comment
Open

Microsoft broke authentication with multiple roles #323

sydorovdmytro opened this issue Apr 17, 2024 · 1 comment

Comments

@sydorovdmytro
Copy link

Hello people,

Since April 16 we have been facing a wired behavior of Microsoft that injects the .mcas.ms domain into the SAML URL: https://signin.aws.amazon.com.mcas.ms/saml?cas_app_landing_mgc=%7B%22sle%22%3Afalse%2C%22pt%22%3A0%7D

https://learn.microsoft.com/en-us/defender-cloud-apps/troubleshooting-proxy-url

The app can see the role selection page (see the screenshot) but we can't finish the authentication and fail with Unable to recognize page state! A screenshot has been dumped to aws-azure-login-unrecognized-state.png. If this problem persists, try running with --mode=gui or --mode=debug

The aws-azure-login-unrecognized-state.png file:

aws-azure-login-unrecognized-state

Is there any plan to handle this behavior too?

@morko
Copy link

morko commented May 1, 2024

I have made a bit of a spaghetti code fix in my fork if it is any help for you:

main...morko:aws-azure-login:main

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants