You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[IdP with multiple certificates](#idp-with-multiple-certificates)
57
+
-[Replay attacks](#replay-attacks)
58
+
-[Demo included in the toolkit](#demo-included-in-the-toolkit)
59
+
-[SP setup](#sp-setup)
60
+
-[IdP setup](#idp-setup)
61
+
-[How it works](#how-it-works-1)
23
62
24
63
## Why add SAML support to my software?
25
64
26
65
SAML is an XML-based standard for web browser single sign-on and is defined by
27
-
the OASIS Security Services Technical Committee. The standard has been around
66
+
the OASIS Security Services Technical Committee. The standard has been around
28
67
since 2002, but lately it has become popular due to its advantages as follows:
29
68
30
-
***Usability** - One-click access from portals or intranets, deep linking,
69
+
***Usability** - One-click access from portals or intranets, deep linking,
31
70
password elimination and automatically renewing sessions make life
32
71
easier for the user.
33
72
***Security** - Based on strong digital signatures for authentication and
@@ -40,7 +79,7 @@ since 2002, but lately it has become popular due to its advantages as follows:
40
79
***IT Friendly** - SAML simplifies life for IT because it centralizes
41
80
authentication, provides greater visibility and makes directory
42
81
integration easier.
43
-
***Opportunity** - B2B cloud vendor should support SAML to facilitate the
82
+
***Opportunity** - B2B cloud vendor should support SAML to facilitate the
44
83
integration of their product.
45
84
46
85
@@ -75,7 +114,7 @@ In production, the **onelogin.saml2.strict** setting parameter MUST be set as **
75
114
76
115
In production also we highly recommend to register on the settings the IdP certificate instead of using the fingerprint method. The fingerprint, is a hash, so at the end is open to a collision attack that can end on a signature validation bypass. Other SAML toolkits deprecated that mechanism, we maintain it for compatibility and also to be used on test environment.
77
116
78
-
The IdPMetadataParser class does not validate in any way the URL that is introduced in order to be parsed.
117
+
The IdPMetadataParser class does not validate in any way the URL that is introduced in order to be parsed.
79
118
80
119
Usually the same administrator that handles the Service Provider also sets the URL to the IdP, which should be a trusted resource.
81
120
@@ -97,7 +136,7 @@ Install it as a maven dependency:
@@ -665,7 +704,7 @@ and later executing the redirection manually.
665
704
666
705
### Extending the provided implementation
667
706
668
-
All the provided SAML message classes (`AuthnRequest`, `SamlResponse`, `LogoutRequest`, `LogoutResponse`) can be extended to add or change the processing behavior.
707
+
All the provided SAML message classes (`AuthnRequest`, `SamlResponse`, `LogoutRequest`, `LogoutResponse`) can be extended to add or change the processing behavior.
669
708
670
709
In particular, the classes used to produce outgoing messages (`AuthnRequest`, `LogoutRequest`, and `LogoutResponse`) also provide a `postProcessXml` method that can be overridden to customise the generation of the corresponding SAML message XML, along with the ability to pass in proper extensions of the input parameter classes (`AuthnRequestParams`, `LogoutRequestParams`, and `LogoutResponseParams` respectively).
auth.login(relayState, newAuthnRequestParamsEx()); // the custom generation of AuthnReqeustEx will be executed
689
728
// ... or process the response as usual
@@ -700,12 +739,12 @@ For Apache Tomcat this is done by setting the proxyName, proxyPort, scheme and s
700
739
701
740
702
741
### IdP with multiple certificates
703
-
742
+
704
743
In some scenarios the IdP uses different certificates for
705
744
signing/encryption, or is under key rollover phase and more than one certificate is published on IdP metadata.
706
-
745
+
707
746
In order to handle that the toolkit offers the `onelogin.saml2.idp.x509certMulti` parameters where you can set additional certificates that will be used to validate IdP signature. However just the certificate set in `onelogin.saml2.idp.x509cert` parameter will be used for encrypting.
0 commit comments