-
Bug
-
Resolution: Done
-
Blocker
-
7.1.0.DR15
In case when attribute allow-sasl-mechanisms from Elytron Authentication Configuration includes some SASL mechanisms then this attribute (and mechanisms configured there) is not taken into account during choosing SASL mechanism. It means that client tries to use all of mechanisms allowed on server side even if client does not allow them. e.g. in case when server side allowed DIGEST-MD5 and JBOSS-LOCAL-USER and client side allows PLAIN, then it tries to use DIGEST-MD5 and JBOSS-LOCAL-USER mechanisms.
See log from wireshark in attachments. This is log for server configured through "Steps to Reproduce".
This happens also for using allow-sasl-mechanisms from wildfly config and also for programatically configured client.
We request blocker since this issue blocks RFE EAP7-567 and EAP7-568 and it allows to use some SASL mechanisms even if they are not allowed on client side.
- is blocked by
-
JBEAP-10159 Sticky authentication is not working correctly
- Closed
-
JBEAP-10664 Setting sasl-mechanism-selector with some name value in Elytron client configuration file causes NPE during parsing
- Closed
- is caused by
-
ELY-1090 SASL mechanism selection strings with ordering and filtering
- Resolved
- is cloned by
-
WFCORE-2615 Attribute allow-sasl-mechanisms is ignored in Elytron Authentication Configuration
- Resolved
- is incorporated by
-
JBEAP-10479 Upgrade WildFly Elytron to 1.1.0.Beta38
- Closed
- relates to
-
JBEAP-10698 Propagate sasl-mechanism-selector to elytron subsystem
- Closed