2014-04-04 19:20:40 |
David Barth |
bug |
|
|
added bug |
2014-04-04 19:20:46 |
David Barth |
webbrowser-app: importance |
Undecided |
High |
|
2014-04-04 19:20:48 |
David Barth |
webbrowser-app: status |
New |
Confirmed |
|
2014-04-04 19:20:56 |
David Barth |
tags |
|
webapps-hotlist |
|
2014-04-17 14:49:10 |
David Barth |
summary |
[webapp-container] SSO for Google Apps for Your Domain break when the URL containment is in effect |
[webapp-container] Google Apps For Business support when using an external SSO provider |
|
2014-04-17 14:49:57 |
David Barth |
description |
When using an SSD provider and Google Apps for Your Domain, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in. |
When using an SSD provider and Google Apps For Business, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in.
We have released a solution for that particular case.
All Google Apps webapps have been patched to support their "Business" version almost transparently, except when using an external SSO provider.
In that case, users need to manually add the URL of that specific SSO provider to a configuration file, to authorize it within the webapp-container
For example, to authorize Gmail to verify your password using login.mycompany.com, you need to create the file ~/.local/share/Gmailmailgooglecom/extra-url-patterns.conf:
[Extra Patterns]
Patterns=https://login.mycompany.com/*
On the phone, the name of the file is: ~/.local/share/com.ubuntu.developer.webapps.webapp-gmail/extra-url-patterns.conf |
|
2014-04-22 11:04:55 |
Nobuto Murata |
bug |
|
|
added subscriber Nobuto MURATA |
2014-04-22 16:19:18 |
David Barth |
webbrowser-app: assignee |
|
Alberto Mardegan (mardy) |
|
2014-04-23 13:00:12 |
Launchpad Janitor |
branch linked |
|
lp:~mardy/webbrowser-app/lp1302780 |
|
2014-04-25 13:02:51 |
David Barth |
description |
When using an SSD provider and Google Apps For Business, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in.
We have released a solution for that particular case.
All Google Apps webapps have been patched to support their "Business" version almost transparently, except when using an external SSO provider.
In that case, users need to manually add the URL of that specific SSO provider to a configuration file, to authorize it within the webapp-container
For example, to authorize Gmail to verify your password using login.mycompany.com, you need to create the file ~/.local/share/Gmailmailgooglecom/extra-url-patterns.conf:
[Extra Patterns]
Patterns=https://login.mycompany.com/*
On the phone, the name of the file is: ~/.local/share/com.ubuntu.developer.webapps.webapp-gmail/extra-url-patterns.conf |
[Impact]
When using an SSD provider and Google Apps For Business, the URL containment prevents the login sequence to succeed. The navigation is redirected to an external browser and the user can never log in from within the webapp itself.
[Testcase]
- Open the Gmail webapp (look for Gmail in the Dash, then click on the application launcher)
- At the Google login prompt, authenticate with your Google Apps for Businness acccount: username@mydomain.com
Expected result:
- You authenticate successfully and can access Gmail
Actual result:
- As soon as you validate your login, you are redirected to the default browser where the transaction finishes, and are then logged to Gmail, from within your browser; not inside the webapp itself
[Regression potential]
None, the issue itself is a regression compared to the previous releases where the browser was used as the webapp container and was sharing credentials in a way sufficient to allow a successful authentication with Google Apps for Business. |
|
2014-04-28 10:14:32 |
David Barth |
webbrowser-app (Ubuntu Trusty): importance |
Undecided |
High |
|
2014-04-28 10:14:35 |
David Barth |
webbrowser-app (Ubuntu Trusty): status |
New |
Fix Committed |
|
2014-04-28 10:14:39 |
David Barth |
webbrowser-app: status |
Confirmed |
Fix Committed |
|
2014-04-28 10:14:42 |
David Barth |
webbrowser-app (Ubuntu Trusty): milestone |
|
trusty-updates |
|
2014-04-28 17:12:19 |
Robert Bruce Park |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2014-05-02 10:05:51 |
Colin Watson |
bug |
|
|
added subscriber SRU Verification |
2014-05-02 10:05:59 |
Colin Watson |
tags |
webapps-hotlist |
verification-needed webapps-hotlist |
|
2014-05-04 02:21:25 |
Launchpad Janitor |
branch linked |
|
lp:ubuntu/trusty-proposed/webbrowser-app |
|
2014-05-16 05:35:49 |
Timo Jyrinki |
tags |
verification-needed webapps-hotlist |
verification-done webapps-hotlist |
|
2014-05-19 09:15:00 |
Launchpad Janitor |
webbrowser-app (Ubuntu Trusty): status |
Fix Committed |
Fix Released |
|
2014-05-19 09:15:05 |
Colin Watson |
removed subscriber Ubuntu Stable Release Updates Team |
|
|
|
2014-05-27 16:01:17 |
David Barth |
webbrowser-app: status |
Fix Committed |
Fix Released |
|