spring-saml

OpenSaml3 Documentation

只谈情不闲聊 提交于 2019-12-05 12:17:18
Does anyone know if there is any documentation for OpenSaml3 anywhere? Paid or otherwise? I know there used to be a $15 book available, but I believe that only covers OpenSaml2. I know this will probably get voted down as it not a programming specific question, but Spring-Saml lists SO as it's primary forum now ( http://projects.spring.io/spring-security-saml/ ). SAML is a pain to implement without a good library and I think that Spring-SAML is the best thing available to someone writing on the JVM. Since Spring-Saml looks to be abandoned and with OpenSaml2 coming to end-of-life soon. I would

SAML service provider spring security

大城市里の小女人 提交于 2019-12-05 10:02:11
When using pre-configured service provider metadata, in spring security, should there be 2 beans definitions for extended metadata delegate ? one for IDP metadata, and one for SP metadata ? <bean class="org.springframework.security.saml.metadata.ExtendedMetadataDelegate"> <constructor-arg> <bean class="org.opensaml.saml2.metadata.provider.FilesystemMetadataProvider"> <constructor-arg> <value type="java.io.File">classpath:security/localhost_sp.xml</value> </constructor-arg> <property name="parserPool" ref="parserPool"/> </bean> </constructor-arg> <constructor-arg> <bean class="org

java.io.IOException: Invalid keystore format Spring Security SAML Extension

烈酒焚心 提交于 2019-12-05 09:46:16
I have successfully gotten the Spring Security SAML Extension sample application to run. Now, I'm trying to integrate it into my main application. Before I tried to integrate with my application, I created a sample application to integrate it with and it works fine. In my sample application, I used the keystore from downloaded sample application. Now, I'm trying to use the same keystore and I'm getting the following error: Caused by: org.springframework.beans.factory.BeanCreationException: Could not autowire method: public void org.springframework.security.saml.metadata.MetadataGenerator

Getting error while decryptition of Saml token

久未见 提交于 2019-12-05 05:40:57
I am getting error while decryption of saml token. However this issue is not consistent it works after restarting server. It was working properly till last night :( DEBUG Decrypter:631 - Attempt to decrypt EncryptedKey using credential from KEK KeyInfo resolver failed: org.opensaml.xml.encryption.DecryptionException: Probable runtime exception on decryption:unknown parameter type. at org.opensaml.xml.encryption.Decrypter.decryptKey(Decrypter.java:705) at org.opensaml.xml.encryption.Decrypter.decryptKey(Decrypter.java:628) at org.opensaml.xml.encryption.Decrypter

Configure Spring Security SAML to use SHA-256 as secure hash algorithm

吃可爱长大的小学妹 提交于 2019-12-05 03:23:45
I'm working on an integration between Spring SAML and Microsoft ADFS 3.0. Even it is already stated in the documentation of Spring SAML as: Open the provider by double-clicking it, select tab Advanced and change "Secure hash algorithm" to SHA-1 that I understand that Spring SAML supports currently only SHA-1 as hash algorithm, but my requirement is using SHA-256. If I try configure only in ADFS for SHA-256, it doesn't work. I suppose that I have to do something with Spring SAML. Do you have any idea how to do so? R. Oosterholt You should configured the Spring security configuration to use SHA

Configuring Spring SAML for SSO with PingFederate

我的未来我决定 提交于 2019-12-05 01:57:13
问题 We have decided to use Ping Federate to be our SSO solution. I have searched many examples but have not found a spring configuration that clearly describes how I need to set up my SP and/or IdP on the PingFederate side. I have not found a Spring document that describes what I need exactly to implement this. Any help, much appreciated. 回答1: Currently there's no step-by-step guide on establishing federation between Spring SAML and Ping, but the steps are very similar to what's described in the

Configuring Ping Federate and Spring SAML to authenticate application

大兔子大兔子 提交于 2019-12-04 17:13:39
I installed PingFederate on an AWS EC2 running Windows_Server-2008-R2_SP1-English-64Bit-Base-2014.04.09. I have a Java application that is using Spring Security for authentication. I have read about how with PingFederate, I can set up an Identity Provider(IdP) and a Service Provider(SP). I have gathered that the IdP would be the Application User providing login credentials(the Identity) and passing this to the SP which has the Target Application apart of the SP in this diagram on this page here: http://documentation.pingidentity.com/display/PF66/Service+Providers+and+Identity+Providers This

Spring SAML ADFS: java.security.InvalidKeyException

回眸只為那壹抹淺笑 提交于 2019-12-04 13:09:29
I have the task to implement a accessibility to an Active Directory Federation Services (SSL) with a LDAP behind. At first I have to to say that my experience in ADFS and SAML is very small. I have decide to take the Spring Security SAML Extension to implement this feature. I download and install the SAML extension for the Spring Security project from GIThub: https://github.com/spring-projects/spring-security-saml I found in the official documentation http://docs.spring.io/spring-security-saml/docs/1.0.x/reference/html/ under point "6. IDP integration guide" the instructions which I have all

Getting authentication object is null even after successfully login by IDP using SAML

本小妞迷上赌 提交于 2019-12-04 12:40:52
I have configured spring-saml and spring security in my application. I have given different url pattern to recognize request. if I append /rest in app URL then it will create spring-security context with basic authentication. If I append /saml in app URL then it will populate IDP login page and redirect to index.html after successful login. But I am getting redirected to login.html page again instead of index.html. After eclipse debugging and putting some logs here and there I got there is no authentication object available. I have read this jira link and updated spring-security version to 3.1

SAMLException: NameID element must be present as part of the Subject in the Response message, please enable it in the IDP configuration

人盡茶涼 提交于 2019-12-04 10:28:14
Iam using spring-saml implementation. In the class WebSSOProfileConsumerImpl, I could find the following lines of code which checks for nameId in the assertion of the SAML response . NameID nameID; if (subject.getEncryptedID() != null) { Assert.notNull(context.getLocalDecrypter(), "Can't decrypt NameID, no decrypter is set in the context"); nameID = (NameID) context.getLocalDecrypter().decrypt(subject.getEncryptedID()); } else { nameID = subject.getNameID(); } Based on the code, its clear that the nameId should be part of the subject. But most of the IDP's including the one that I am using