saml

OpenSaml3 Documentation

烂漫一生 提交于 2019-12-07 07:44:53
问题 Does anyone know if there is any documentation for OpenSaml3 anywhere? Paid or otherwise? I know there used to be a $15 book available, but I believe that only covers OpenSaml2. I know this will probably get voted down as it not a programming specific question, but Spring-Saml lists SO as it's primary forum now (http://projects.spring.io/spring-security-saml/). SAML is a pain to implement without a good library and I think that Spring-SAML is the best thing available to someone writing on the

Validating a signature without intermediate certificate

岁酱吖の 提交于 2019-12-06 23:04:52
问题 Is it possible to validate a signature only having an ancestor or root certificate in the hierarchy? Disclaimer: I'm a newbie to the certificates handling so please forgive the naive terminology. Consider the following situation. We have two parties (let's call them IdP for Identity Provider and SP for service provider) and some central certificate authority CA which is definitely trusted by both IdP and SP. CA has it's own certificate CertCA known to both IdP and SP (imported into IdP's and

SAML 2.0 password authentication

老子叫甜甜 提交于 2019-12-06 14:56:43
I'm aware of how SAML is used for single sign on (SSO). That is, redirection to IDP from SP and getting the user's identity from the SAML response/assertion. My question is - Does SAML 2.0 specification define how to pass username and password as part of a SAML request xml for authentication? Note that I'm not talking about single sign on and just want authentication of username/password. Thanks, The SAML standard supports passing a user identifier in the <saml:Subject> field of the <AuthnRequest> (i.e. the request for authentication). There is however no built in support for passing a

Python SAML OneLogin - How to support multiple Identity Providers

▼魔方 西西 提交于 2019-12-06 13:25:57
I'm relatively new to SAML and came across the OneLogin Python SAML library. I was able to get it up and running with my web app being the Service provider (SP) and OneLogin being the Identity Provider (Idp). I would like to be able to add support for other Identity Providers as well. However, I find that the python-saml library is using a settings.json to get the Idp information. I have looked at the following issues on their Github project but have been unable to get an actionable solution: [1] https://github.com/onelogin/python-saml/issues/64 [2] https://github.com/onelogin/python-saml

Azure AD - SAML Single Logout - Unsupported binding HTTP-POST

烂漫一生 提交于 2019-12-06 13:23:36
I am integrating a SAML Service Provider with MS AAD and I have found an issue with Single Logout. My Service Provider only supports logout binding "HTTP-POST". And it seems that AAD only supports logout binding "HTTP-Redirect". I think so based on the SAML metadata I got from AAD - this is the only SingleLogoutService element I can see: <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/saml2" /> Is it really the only supported SLO binding or is it possible to switch other bindings

Delphi & SAML (Web apps or desktop apps)?

偶尔善良 提交于 2019-12-06 13:21:34
is the SAML protocol (Sing Sign ON) used soley for web apps and web services, or is it also used for standard applications? REVISED: I am looking for some windows (Standard Applications (not web based)) protocols for Single Sign On If you are looking at Windows specifically, why not use Kerberos and Integrated Windows Authentication? It's built into Active Directory and Domain Controllers. It doesn't really work once you start crossing into the Internet and different security domains but it works well behind your firewall in a corporate environment. However, SAML can be used for desktop

An unsecured or incorrectly secured fault was received from the other party.(When working with SAML )

白昼怎懂夜的黑 提交于 2019-12-06 12:33:45
I'm new to WCF web service. currently i'm working on a federated web service with federation binding(SAML) .I took help of MSDN examples on 'SAML Token Provider'.but the problem is that i'm not able to consume the service ,when i consume it, it throws " An unsecured or incorrectly secured fault was received from the other party" with inner exception as "An error occurred when processing the security tokens in the message." this is my web config file at server side <?xml version="1.0"?> <configuration> <system.web> <compilation debug="true" targetFramework="4.0"/> </system.web> <system

SAML LogOutRequest processing failed on ADFS server

只谈情不闲聊 提交于 2019-12-06 11:00:27
问题 I have ADFS server as an IdP. I have separate SP application. These are defined in circle of trust. SSO over SAML protocol is working fine. When I try SP initated log out request I got error on ADFS side : MSIS7000: The sign in request is not compliant to the WS-Federation language for web browser clients or the SAML 2.0 protocol WebSSO profile. EDIT More detail message from ADFS Event Trace : MSIS7015: This request does not contain the expected protocol message or incorrect protocol

How to avoid 'SamlAssertion.NotOnOrAfter condition is not satisfied' errors

Deadly 提交于 2019-12-06 10:38:40
Recently I have started using claim-based authentication on an existing web application. Because the application makes use of jQuery & more notably, the AJAX functions, I have had to alter the handlers not to attempt to redirect the XmlHTTPRequests , and instead return a 403 status which is easier to handle. Here is the FederatedAuthentication.WSFederationAuthenticationModule.AuthorizationFailed event hanlder: protected void WSFederationAuthenticationModule_AuthorizationFailed(object sender, AuthorizationFailedEventArgs e) { //WSFederationAuthenticationModule sam =

SSO : Should SP validate session with IDP in every request

戏子无情 提交于 2019-12-06 10:10:51
As per SP initiated SSO flow, User tries to access SP. Since the user is unauthenticated, he is redirected to IDP where he enters his credentials, post successful login, IDP sets cookies in user's browser(under IDP's domain) and redirects the user back to SP with SAML response. Once SP verifies SAML response it creates it's own cookie/token and sets in user's browser under sp's domain. What should ideally happen in subsequent requests : Should SP rely only on it's own cookie to fetch user info Should SP validate user session with IDP in every request. If option 1 is advised, Is it ok from