spring-saml

Issues while integrating ADFS with Spring SAML Extension

一笑奈何 提交于 2019-11-27 23:58:14
I am working on integrating Spring SAML Extension within our appliaction and for SSO with one of our client's ADFS2.0 as the IDP we have generated Service provider meta data from our appliaction and imported ADFS meta data into our appliaction.When i select the clients idp and click on start single sign and give the proper clients credentials we are seeing the the SAML response as follows: Saml Response. <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" Destination="https://sso.spire2grow.com:8443/<our application>/saml

Spring Security SAML + HTTPS to another page

大憨熊 提交于 2019-11-27 21:51:18
问题 I created a project with Spring Security SAML. I need to write a code (same project), which connects with another server by HTTPS POST with SOAP: PostMethod post = new PostMethod("https://www.somepage.com"); post.setRequestHeader("SOAPAction", "action"); post.setRequestEntity(new StringRequestEntity(soapXML, "text/xml", "UTF-8")); HttpClient httpclient = new HttpClient(); httpclient.executeMethod(post); String responseString = post.getResponseBodyAsString(); There is an error: SSL peer failed

Setting the ExtendedMetadata 'signingAlgorithm' field

允我心安 提交于 2019-11-27 14:57:33
问题 I'm having an issue getting the Spring SAML integration to generate the correct metadata file for my IdP. I was issued new SHA256 SSL certs. I've gone through all of the steps to create the appropriate keyStore and have my Spring security configuration file all set. I am literally like 98% of the way there but there is one thing missing in the generated metadata file that I can't for the life of me figure out why it's not getting set. Here is my ExtendedMetadata config for

Single Sign-On in Spring by using SAML Extension and Shibboleth

[亡魂溺海] 提交于 2019-11-27 00:45:01
问题 I'd like to implement a Single Sign-on (SSO) authentication layer in my Spring-based application with the aim of supporting authentication and authorization from different security domains. I've chosen Shibboleth as IdP, but I have yet to identify what I will use for the SP. The choices are: Spring Security SAML Extension: component enables both new and existing applications to act as a Service Provider in federations based on SAML 2.0 protocol and enable Web Single Sign-On. Spring Security

Issues while integrating ADFS with Spring SAML Extension

陌路散爱 提交于 2019-11-26 21:37:07
问题 I am working on integrating Spring SAML Extension within our appliaction and for SSO with one of our client's ADFS2.0 as the IDP we have generated Service provider meta data from our appliaction and imported ADFS meta data into our appliaction.When i select the clients idp and click on start single sign and give the proper clients credentials we are seeing the the SAML response as follows: Saml Response. <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" Consent="urn:oasis