Hello all,
I’ve run into a couple of issues I’m looking for solutions for with Automox’s implementation of SAML, one of which is a security concern.
Scenario 1: You have an Entra joined Windows device that you log into with an Entra ID account (joel@contoso.com). Once logged in, you open up a fresh copy of Microsoft Edge with no stored credentials, cookies, or cache. Finally, attempt to log into Automox.
Expectation: Edge will use your device credential by default to SSO authenticate you into Automox, if that is rejected, you will be prompted to create a browser token via Microsoft to authenticate to Automox.
Reality: The device credential created by Edge is rejected by Automox, no attempt is made by Automox to request your computer create a browser token, and there is no way to prevent Edge from using your device credential in the browser.
Result: You simply cannot use Edge to log into Automox in this circumstance unless you use an incognito window.
Scenario 2: You have a regular account and an admin account for Entra. In the browser, you are signed into your admin account (admin_joel@contoso.com). You attempt to log into Automox in that browser, but your Automox login is your regular account, so you attempt to log in with your regular account.j
Expectation: You put joel@contoso.com into the username field of Automox, you click next, and you are prompted to log into Microsoft to create a browser SSO token because one doesn’t exist for that account in the browser you’re using.
Reality: Automox will confidently ignore the email address you put in the field and immediately attempt to use whatever Entra SSO token already exists in the browser and then tell you that admin_joel@contoso.com isn’t allowed to log into Automox.
Result: You simply cannot use this browser to log into Automox unless you clear the cached credential from any other Entra account that is stored in the browser.
Here is the security concern with scenario 2: If the account whose token is stored in your browser has EVER been allowed to use Automox via SAML in the past, even if the account no longer exists in Automox and isn’t currently in any groups connected to the Automox SAML enterprise app in Entra, if you type in the email address of an account that should be able to use SAML to log into Automox, Automox will instead create a credential for the account associated to the active token in the browser instead.
admin_joel@contoso.com is in Automox_users which is connected to the Automox SAML application in Entra for constoso.com
You use admin_joel@contoso to log into Automox using SAML
You then use a different account to delete the admin_joel@contoso.com user from Automox.
You remove admin_joel@contoso.com from Automox_users
At some later point, you add joel@contoso.com to Automox_users
You sign into a microsoft website (entra.microsoft.com) as admin_joel@contoso.com creating a cached token for that account in the browser.
You then go to Automox’s website and try to login using joel@contoso.com
Result: Automox will see that joel@contoso.com is allowed to log into Automox using SAML, but Automox won’t prompt for a new token for joel@contoso.com, instead Automox will attempt to use whatever Entra token is already stored in the browser (admin_joel@contoso.com) and if that user has ever in the past been approved to use SAML to log into Automox, then Automox will create a read-only account for that user today, even if the user isn’t currently in any group that would approve it for login using SAML.