7.9. Extended Policy Conditions

extended policy conditions allow to define more advanced rules for policy matching, i.e. for determining which policies are valid for a specific request.

Conditions can be added to a policy via the WebUI. In order for a policy to take effect during the processing of a request, the request has to match not only the ordinary policy attributes (see Policies), but also all additionally defined conditions that are currently active. If no active conditions are defined, only the ordinary policy attributes are taken into account.

Each policy condition performs a comparison of two values. The left value is taken from the current request. The comparison operator (called Comparator) and the right value are entered in the policy definition. Each condition consists of five parts:

  • Active determines if the condition is currently active.

  • Section refers to an aspect of the incoming request on which the condition is applied. The available sections are predefined, see Sections.

  • The meaning of Key depends on the chosen Section. Typically, it determines the exact property of the incoming request on which the condition is applied.

  • Comparator defines the comparison to be performed. The available comparators are predefined, see Comparators.

  • Value determines the value the property should be compared against.

7.9.1. Sections

eduMFA implements the sections userinfo, token, tokeninfo, HTTP Request Headers and HTTP Environment.

7.9.1.1. userinfo

The section userinfo can be used to define conditions that are checked against attributes of the current user in the request (the so-called handled user). The validity of a policy condition with section userinfo is determined as follows:

  • eduMFA retrieves the userinfo of the currently handled user. These are the user attributes as they are determined by the respective resolver. This is configured via the attribute mappings of resolvers (see UserIdResolvers).

  • Then, it retrieves the userinfo attribute given by Key

  • Finally, it uses the Comparator to compare the contents of the userinfo attribute with the given Value. The result of the comparison determines if the request matches the condition or not.

Note

There are situations in which the currently handled user cannot be determined. If eduMFA encounters a policy with userinfo conditions in such a situation, it throws an error and the current request is aborted.

Likewise, eduMFA raises an error if Key refers to an unknown userinfo attribute, or if the condition definition is invalid due to some other reasons. More detailed information are then written to the logfile.

As an example for a correct and useful userinfo condition, let us assume that you have configured a realm ldaprealm with a single LDAP resolver called ldapres. This resolver is configured to fetch users from a OpenLDAP server, with the following attribute mapping:

{ "phone": "telephoneNumber",
  "mobile": "mobile",
  "email": "mailPrimaryAddress",
  "groups": "memberOf",
  "surname": "sn",
  "givenname": "givenName" }

You can further define groups to be a multi-value attribute by setting the Multivalue Attributes option to ["groups"].

According to this mapping, users of ldaprealm will have userinfo entries phone, mobile, email, groups, surname and givenname which are filled with the respective values from the LDAP directory.

You can now configure a policy that disables the WebUI login for all users in the LDAP group cn=Restricted Login,cn=groups,dc=test,dc=intranet with an email address ending in @example.com:

  • Scope: webui

  • Action: login_mode=disable

    1. additional condition (active):

    • Section: userinfo

    • Key: email

    • Comparator: matches

    • Value: .*@example.com

    1. additional condition (active):

    • Section: userinfo

    • Key: groups

    • Comparator: contains

    • Value: cn=Restricted Login,cn=groups,dc=test,dc=intranet

The policy only takes effect if the user that is trying to log in has a matching email address and is a member of the specified group. In other words, members of the group with an email address ending in @eduMFA.org will still be allowed to log in.

Note

Keep in mind that changes in the LDAP directory may not be immediately visible to eduMFA due to caching settings (see LDAP resolver).

If the userinfo of the user that is trying to log in does not contain attributes email or groups (due to a resolver misconfiguration, for example), eduMFA throws an error and the request is aborted.

7.9.1.2. tokeninfo

The tokeninfo condition works the same way as userinfo but matches the tokeninfo instead.

Note

Similar to the userinfo condition, a policy with an active tokeninfo condition will throw an exception whenever the token object cannot be determined (usually from the serial).

7.9.1.3. token

The token condition works on the database columns of the token. This would be description, otplen, count, serial, active but most importantly also failcount and tokentype.

Note

A policy with an active token condition will throw an exception whenever the token object cannot be determined. It will also throw an error, if the request Key does not exist as a database column.

Note

The matching is case sensitive. Note, that e.g. token types are stored in lower case in the database.

Example: The administrator could define a dedicated policy in the scope user with the action delete and the token condition active, <, 1. For an inactive token the attribute active would evaluate to 0 and thus be smaller than 1. An active token would evaluate to 1. This would allow the user to delete only inactive tokens, but not still active tokens.

7.9.1.4. HTTP Request Header

The section HTTP Request header can be used to define conditions that are checked against the request header key-value pairs.

The Key specifies the request header key. It is case-sensitive.

eduMFA uses the Comparator to check if the value of a header is equal or a substring of the required value.

Note

eduMFA raises an error if Key refers to an unknown request header. If the header in question is missing, the policy can not get completely evaluated. Be aware that requests, that do not contain the header Key will always fail! Thus, if you are using uncommon headers you should in addition restrict the policy e.g. to client IPs, to assure, that a request from this certain IP address will always contain the header, that is to be checked.

7.9.1.5. HTTP Environment

The section HTTP Environment can be used to define conditions that are checked against the HTTP environment key-value pairs.

The Key is case sensitive.

The environment contains information like the PATH_INFO which contains the name of the endpoint like /validate/check or /auth.

Note

eduMFA raises an error if Key refers to an unknown environment key. The log file then contains information about the available keys. The behaviour is similar to the extended conditions of HTTP Request Header.

7.9.2. Comparators

The following comparators can be used in definitions of policy conditions:

  • equals evaluates to true if the left value is equal to the right value, according to Python semantics. !equals evaluates to true if this is not the case.

  • contains evaluates to true if the left value (a list) contains the right value as a member. !contains evaluates to true if this is not the case.

  • in evaluates to true if the left value is contained in the list of values given by the right value. The right value is a comma-separated list of values. Individual values can be quoted using double-quotes. !in evaluates to true if the left value is not found in the list given by the right value.

  • matches evaluates to true if the left value completely matches the regular expression given by the right value. !matches evaluates to true if this is not the case.

7.9.3. Error Handling

eduMFA’s error handling when checking policy conditions is quite strict, in order to prevent policy misconfiguration from going unnoticed. If eduMFA encounters a policy condition that evaluates neither to true nor false, but simply invalid due to a misconfiguration, eduMFA throws an error and the current request is aborted.