7.9. Extended Policy Conditions¶
extended policy conditions allow to define more advanced rules for policy matching, i.e. for determining which policies are valid for a specific request.
Conditions can be added to a policy via the WebUI. In order for a policy to take effect during the processing of a request, the request has to match not only the ordinary policy attributes (see Policies), but also all additionally defined conditions that are currently active. If no active conditions are defined, only the ordinary policy attributes are taken into account.
Each policy condition performs a comparison of two values. The left value is taken from the current request. The comparison operator (called Comparator) and the right value are entered in the policy definition. Each condition consists of five parts:
Active
determines if the condition is currently active.
Section
refers to an aspect of the incoming request on which the condition is applied. The available sections are predefined, see Sections.The meaning of
Key
depends on the chosenSection
. Typically, it determines the exact property of the incoming request on which the condition is applied.
Comparator
defines the comparison to be performed. The available comparators are predefined, see Comparators.
Value
determines the value the property should be compared against.
7.9.1. Sections¶
eduMFA implements the sections userinfo
, token
, tokeninfo
, HTTP Request Headers
and HTTP Environment
.
7.9.1.1. userinfo
¶
The section userinfo
can be used to define conditions that are checked against attributes of the
current user in the request (the so-called handled user).
The validity of a policy condition with section userinfo
is determined as follows:
eduMFA retrieves the userinfo of the currently handled user. These are the user attributes as they are determined by the respective resolver. This is configured via the attribute mappings of resolvers (see UserIdResolvers).
Then, it retrieves the userinfo attribute given by
Key
Finally, it uses the
Comparator
to compare the contents of the userinfo attribute with the givenValue
. The result of the comparison determines if the request matches the condition or not.
Note
There are situations in which the currently handled user
cannot be determined. If eduMFA encounters a policy with userinfo
conditions in such a situation, it throws an error and the current request is
aborted.
Likewise, eduMFA raises an error if Key
refers to an unknown userinfo
attribute, or if the condition definition is invalid due to some other reasons.
More detailed information are then written to the logfile.
As an example for a correct and useful userinfo
condition, let us assume
that you have configured a realm ldaprealm with a single LDAP resolver called
ldapres. This resolver is configured to fetch users from a OpenLDAP server,
with the following attribute mapping:
{ "phone": "telephoneNumber",
"mobile": "mobile",
"email": "mailPrimaryAddress",
"groups": "memberOf",
"surname": "sn",
"givenname": "givenName" }
You can further define groups
to be a multi-value attribute by setting the
Multivalue Attributes option to ["groups"]
.
According to this mapping, users of ldaprealm will have userinfo entries
phone
, mobile
, email
, groups
, surname
and givenname
which are filled with the respective values from the LDAP directory.
You can now configure a policy that disables the WebUI login for all users in
the LDAP group cn=Restricted Login,cn=groups,dc=test,dc=intranet
with an
email address ending in @example.com
:
Scope: webui
Action:
login_mode=disable
additional condition (active):
Section:
userinfo
Key:
email
Comparator:
matches
Value:
.*@example.com
additional condition (active):
Section:
userinfo
Key:
groups
Comparator:
contains
Value:
cn=Restricted Login,cn=groups,dc=test,dc=intranet
The policy only takes effect if the user that is trying to log in has a matching
email address and is a member of the specified group. In other words, members
of the group with an email address ending in @eduMFA.org
will still be
allowed to log in.
Note
Keep in mind that changes in the LDAP directory may not be immediately visible to eduMFA due to caching settings (see LDAP resolver).
If the userinfo of the user that is trying to log in does not contain attributes
email
or groups
(due to a resolver misconfiguration, for example), eduMFA
throws an error and the request is aborted.
7.9.1.2. tokeninfo
¶
The tokeninfo condition works the same way as userinfo but matches the tokeninfo instead.
Note
Similar to the userinfo condition, a policy with an active tokeninfo condition will throw an exception whenever the token object cannot be determined (usually from the serial).
7.9.1.3. token
¶
The token condition works on the database columns of the token. This would be
description
, otplen
, count
, serial
, active
but most importantly
also failcount
and tokentype
.
Note
A policy with an active token condition will
throw an exception whenever the token object cannot be determined.
It will also throw an error, if the request Key
does not exist
as a database column.
Note
The matching is case sensitive. Note, that e.g. token types are stored in lower case in the database.
Example: The administrator could define a dedicated policy in the scope user with the
action delete
and the token condition active
, <
, 1
. For an inactive token the attribute active
would evaluate to 0
and thus be smaller than 1
. An active
token would evaluate to 1
.
This would allow the user to delete only inactive tokens, but not still active tokens.
7.9.1.4. HTTP Request Header
¶
The section HTTP Request header
can be used to define conditions that are checked against
the request header key-value pairs.
The Key
specifies the request header key. It is case-sensitive.
eduMFA uses the Comparator
to check if the value of a header is equal or a substring
of the required value.
Note
eduMFA raises an error if Key
refers to an unknown request header.
If the header in question is missing, the policy can not get completely evaluated.
Be aware that requests, that do not contain the header Key
will always fail!
Thus, if you are using uncommon headers you should
in addition restrict the policy e.g. to client IPs, to assure, that a request from
this certain IP address will always contain the header, that is to be checked.
7.9.1.5. HTTP Environment
¶
The section HTTP Environment
can be used to define conditions that are checked against
the HTTP environment key-value pairs.
The Key
is case sensitive.
The environment contains information like the PATH_INFO
which contains the name of the
endpoint like /validate/check
or /auth
.
Note
eduMFA raises an error if Key
refers to an unknown environment key.
The log file then contains information about the available keys.
The behaviour is similar to the extended conditions of HTTP Request Header.
7.9.2. Comparators¶
The following comparators can be used in definitions of policy conditions:
equals
evaluates to true if the left value is equal to the right value, according to Python semantics.!equals
evaluates to true if this is not the case.contains
evaluates to true if the left value (a list) contains the right value as a member.!contains
evaluates to true if this is not the case.in
evaluates to true if the left value is contained in the list of values given by the right value. The right value is a comma-separated list of values. Individual values can be quoted using double-quotes.!in
evaluates to true if the left value is not found in the list given by the right value.matches
evaluates to true if the left value completely matches the regular expression given by the right value.!matches
evaluates to true if this is not the case.
7.9.3. Error Handling¶
eduMFA’s error handling when checking policy conditions is quite strict, in order to prevent policy misconfiguration from going unnoticed. If eduMFA encounters a policy condition that evaluates neither to true nor false, but simply invalid due to a misconfiguration, eduMFA throws an error and the current request is aborted.