Improved Security in SAML/OIDC Sign-in Redirection Flow
To enhance the security of our authentication system, we’ve made a change to how SAML and OIDC sign-in redirections are handled. This update resolves a potential open redirection vulnerability and adds an extra layer of protection during the sign-in process.
What’s changing?
Previously, when an account was set up to use only SAML or OIDC for sign-in, users were automatically redirected to the configured SSO URL without any intermediate steps.
However, this behavior could be misused. If an attacker managed to configure a malicious redirect URL as part of the SSO setup and sent that sign-in link to a user, the user could be unknowingly redirected to a harmful site, even if they don’t belong to the attacker’s organization.
To prevent this, we now present users with a consent screen (shown below) before redirecting them to the SSO URL. This screen clearly displays the Sign-in URL and asks users to confirm that they trust the site before proceeding.
Note: You may see this consent screen when signing in through a direct link or from a site that is not part of your organization’s trusted domains.
This is a security measure to help verify the origin of your sign-in
attempts. If you're unsure about the URL displayed, please contact your
administrator before proceeding.