saml-2.0

Getting list of groups user is associated with in Okta

自作多情 提交于 2019-12-05 10:33:11
I'm trying to integrate with Okta SSO by implementing SAML 2.0 in my website as Service Provider (SP) and Okta env. as my Identity Provider (IDP) I can't understand how to configure my IDP to return for each Auth request, the groups a user is in. How can it be done? Also, Is it possible to have service account in my IDP that my backend can ask the IDP directly if a user is inside some specific group? It is possible to add groups to the SAMLResponse by configuring the SP App in the Okta admin dashboard correctly. In order to do it for an existing app, Go to Admin panel and edit the SAML

SAML Request Attributes In AuthnRequest

自作多情 提交于 2019-12-05 09:51:26
I kind of understand how basic SAML authentication supposed to work: User request resource at SP SP sends auth request to IDP IDP authenticates user and sends back some userId SP sends attribute query to IDP for additional details with userId IDP sends back attributes SP gives user resource My issue is, can you any way bypass AttributeQuery. When I make a SAML 2.0 request to my testing Gluu/Shibboleth server, I get back givenName (firstname) and sn (lastname). Is there anyway I can request inum user id and email in just the AuthnRequest? My request is pretty simple: <samlp:AuthnRequest xmlns

Keycloak IdP SAML 2 Export of XML metdata to an SP

醉酒当歌 提交于 2019-12-05 07:43:11
I'm using Keycloak version 1.6.1, newly installed as a standalone application. Keycloak should act as an IdP (Identity provider) for an SP (Service Provider) called Tableau. I have read from this page: http://blog.keycloak.org/2015/03/picketlink-and-keycloak-projects-are.html ... Keycloak from being Identity Broker grew into being fully fledged Identity Provider While it was an Identity Broker, it is now also an Identity Provider. My question is then: I have exported the SP XML Metadata from Tableau, which I imported into Keycloak, but when it comes to the export of the IdP XML Metadata from

Getting error while decryptition of Saml token

久未见 提交于 2019-12-05 05:40:57
I am getting error while decryption of saml token. However this issue is not consistent it works after restarting server. It was working properly till last night :( DEBUG Decrypter:631 - Attempt to decrypt EncryptedKey using credential from KEK KeyInfo resolver failed: org.opensaml.xml.encryption.DecryptionException: Probable runtime exception on decryption:unknown parameter type. at org.opensaml.xml.encryption.Decrypter.decryptKey(Decrypter.java:705) at org.opensaml.xml.encryption.Decrypter.decryptKey(Decrypter.java:628) at org.opensaml.xml.encryption.Decrypter

Laravel 5 integrate with SAML 2 with existing IDP

不想你离开。 提交于 2019-12-05 04:56:32
问题 I'm on Laravel 5, I'm trying to integrate SAML 2.0 with it. I've found this package = https://github.com/aacotroneo/laravel-saml2 I tried follow their steps, Under their Configuration Section , they said, "you need to configure your sp and IDP (remote server). " But in my case is a litte different, I work with other ITs that handle the existing iDP. They provided me their metadata end-point. In that case, do I still need to configure my own iDP/SP ? If so, how can I do that in Laravel ? I'm

Validating a signature without intermediate certificate

可紊 提交于 2019-12-05 04:07:35
Is it possible to validate a signature only having an ancestor or root certificate in the hierarchy? Disclaimer: I'm a newbie to the certificates handling so please forgive the naive terminology. Consider the following situation. We have two parties (let's call them IdP for Identity Provider and SP for service provider) and some central certificate authority CA which is definitely trusted by both IdP and SP. CA has it's own certificate CertCA known to both IdP and SP (imported into IdP's and SP's keystore under some alias) Out CA issues one certificate for IdP ( CertIdP ) and one for SP (

Configuring Spring SAML for SSO with PingFederate

我的未来我决定 提交于 2019-12-05 01:57:13
问题 We have decided to use Ping Federate to be our SSO solution. I have searched many examples but have not found a spring configuration that clearly describes how I need to set up my SP and/or IdP on the PingFederate side. I have not found a Spring document that describes what I need exactly to implement this. Any help, much appreciated. 回答1: Currently there's no step-by-step guide on establishing federation between Spring SAML and Ping, but the steps are very similar to what's described in the

How to integrate SAML authentication into WCF web service application

馋奶兔 提交于 2019-12-04 22:02:36
问题 I have a WCF web service application built and tested on IIS7. Regarding authentication I wanted to implement a sql server hosted userd id and password authentication for consumers accessing the operations in the web service. However I was told that my company policy dictates that I implement SAML into my web service. That means any client that is accessing my web service operations need to be authenticated using SAML 2.0. I am not familiar with SAML but like to know and get started on how to

Okta Group Attributes

那年仲夏 提交于 2019-12-04 18:51:32
I have two service providers that I am connecting to Okta in order to manage identities externally. Can you think of a way to configure Okta to accomplish the following: Associate attributes with groups, rather than directly to users. Users within groups would then inherit these attributes. Associate groups with applications, rather than directly associating users with applications. My end goal is to be able to leverage Okta for managing a role store for each service provider. I would expect SAML assertions coming from Okta to be able to be mapped into assertions for individual service

Configuring Ping Federate and Spring SAML to authenticate application

大兔子大兔子 提交于 2019-12-04 17:13:39
I installed PingFederate on an AWS EC2 running Windows_Server-2008-R2_SP1-English-64Bit-Base-2014.04.09. I have a Java application that is using Spring Security for authentication. I have read about how with PingFederate, I can set up an Identity Provider(IdP) and a Service Provider(SP). I have gathered that the IdP would be the Application User providing login credentials(the Identity) and passing this to the SP which has the Target Application apart of the SP in this diagram on this page here: http://documentation.pingidentity.com/display/PF66/Service+Providers+and+Identity+Providers This