Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

KB-9946: Is Centrify vulnerable to SAML Authentication Bypass vulnerability?

App Access Service ,   App Gateway Service ,   Privileged Access Service ,  

28 February,18 at 04:56 PM

Question:



Is Centrify SAML susceptible to the recent SAML vulnerability allowing attackers to modify a SAML assertion and trick into logging in as a different user?
 


Answer:



In short, Centrify is not vulnerable to this exploit.

Centrify has reviewed the CERT vulnerability note and can confirm that Centrify’s SAML handling does not allow the described improper authentication.

This vulnerability affects the service provider side (assertion recipient) of the SAML connection. In cases where Centrify is the service provider (for example, B2B Federation) Centrify is not vulnerable.

Centrify also publishes a free C# SDK for developers who want to implement SAML as a Service Provider for their own applications. This code is also not vulnerable.

Customers are advised to check with their other SAML service providers to ensure they are not affected by this vulnerability.

If the service provider supports it, Centrify’s Application Services can be configured to fully encrypt the assertion (in addition to the SSL encryption and assertion signature), to provide further security.
 

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.