| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| | |
Deprecate the certFingerprint option.
|
| |
| |
| |
| |
| |
| | |
Issue a notice when the option is used nonetheless.
Closes: #432
|
| |
| |
| |
| | |
Even though the default "exact" is used by most people, and few products support anything else, there's people asking for this.
|
| |
| |
| |
| | |
SimpleSAML_Error_ProxyCountExceeded exceptions.
|
| | |
|
| |
| |
| |
| | |
Instead of keeping SAML-specific error exceptions in lib/SimpleSAML/Error, it makes more sense to have those in the saml module. Now that we have the recent NoAvailableIDP and NoSupportedIDP errors moved there, it's time to change the code implemented recently that uses them.
|
| |
| |
| |
| | |
This makes it easier to identify error conditions and return errors to an SP. More known errors should also be added here.
|
| |
| |
| |
| | |
The SAML2 IdP should keep the RequestedAuthnContext in the state array, so that authentication sources (or processing filters) can use that information during authentication.
|
| |
| |
| |
| |
| |
| |
| | |
- Bugfix: the modules/saml/www/proxy/invalid_session.php shouldn't call directly the error handler in sspmod_saml_IdP_SAML2. Instead, it should use the SimpleSAML_Auth_State::throwException() method to let it handle the exception appropriately (in this case, it should always return back to the requester).
- The standard specifies that a "urn:oasis:names:tc:SAML:2.0:status:NoSupportedIDP" or "urn:oasis:names:tc:SAML:2.0:status:NoAvailableIDP" second-level status code should be returned to the requester in case an error occurs. Add a couple of exceptions to represent both statuses, and use them to set the right status code in the response.
- We shouldn't ask the user to logout in case the IDPList does not offer an IdP we recognize, or in case the proxy enforces the use of an IdP ('idp' configuration option in the auth source) and such IdP is in the IDPList.
- Similarly, these two cases should also handled in case we are authenticating for the first time, not only when reauthenticating.
|
| |
| |
| |
| |
| |
| | |
attribute values.
Due to recent changes in the SAML2 library, when an attribute has a value that contains XML, its contents are returned as a DOMNodeList instead of a string. This causes problems when running as a proxy, since the SAML2 IdP will obtain attributes in a format that cannot be cast to string. Regardless of the attribute encoding configured in the IdP for a remote SP, we should handle those cases gracefully, so that the IdP don't end up in an uncaught exception.
|
|/
|
|
|
|
| |
When acting as a proxy, SimpleSAMLphp was re-authenticating the user in case the IdP that authenticated a user in a valid session was not included in the list of IdPs provided by an SP asking for authentication. Since we cannot use Single Sign On there, we should ask the user to logout before authenticating again, avoiding an inconsistent session with SPs associated to different IdPs.
This resolves #84.
|
|\
| |
| | |
Test for https://github.com/simplesamlphp/simplesamlphp/pull/400
|
| |
| |
| |
| | |
"saml:NameID"
|
| |
| |
| |
| | |
The saml:FilterScopes filter was removing values that did not contain a scope. It shouldn't.
|
| |
| |
| |
| |
| |
| | |
The new saml:FilterScopes allows a SAML Service Provider to remove the values from a scoped attribute whose scope is not declared in the IdP metadata and/or does not match with the domain in use by the IdP itself.
This closes #22.
|
|/
|
|
| |
Now we are finally using the 2.x branch of the SAML2 library, which was also migrated to use namespaces. Even though the library provides an autoloader that allows loading the classes with the old names using class aliasing, we need to do the migration in one commit (at least for most part of it). This is due to the way SimpleSAMLphp checks data types, using inheritance to check objects agains abstract or more general classes. Even though class aliasing works, there's no way to replicate those relationships, and type checks that use the old class names will fail because the aliases are virtually new classes that don't inherit from others.
|
|
|
|
| |
to log the sspmod_saml_Error exception itself, as that doesn't have any valuable information. We log the exception itself instead. Reword the previous message a bit, too.
|
|
|
|
| |
configuration, allowing to set not only the format, but also the value for "AllowCreate".
|
| |
|
| |
|
|
|
|
| |
(being respectful with occurences that might change the behaviour, i.e. default database prefixes)
|
|
|
|
| |
This reverts commit 09c5a23fce38022bc7ba1450902236383aaa90d7.
|
|
|
|
| |
SHA-1 is still supported but needs to be configured explicitly if you need it.
|
| |
|
|
|
|
| |
$state['SimpleSAML_Auth_Source.*'] where needed, while we are transitioning to 2.0. Leave those that will be removed in SimpleSAML_Auth_Default. Move the rest of the code to the new entries in the state array.
|
|
|
|
| |
many, instead of being obtained every time we are using it (that could lead to clock discrepancies between several timestamps in the same assertion). Additionally, if authentication happened in the past (that is, we got a request that is not the one that triggered authentication, and this is pure SSO), we should calculate the value for SessionNotOnOrAfter relative to the start of the session, not the current time. This resolves #244.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|\
| |
| | |
Make SQLPersistentNameID more flexible
|
| |
| |
| |
| | |
about creating entries in the SQL datastore, whilst preserving default behaviour
|
| |
| |
| |
| | |
getPersistentAuthData() to avoid confusions around the behaviour of this method.
|
|/
|
|
| |
persistent authentication data. This resolves #247.
|
|
|
|
| |
sspmod_saml_Auth_Source_SP::handleUnsolicitedAuth() and deprecate the former.
|
|
|
|
| |
SimpleSAML_Auth_State::extractPersistentAuthState() and deprecate the former.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
SimpleSAML\Utils\HTTP::checkSessionCookie() and deprecate the former.
|
|
|
|
| |
redirectTrustedURL() and deprecate the former.
|
|
|
|
| |
deprecate the former.
|
|
|
|
| |
SimpleSAML\Utils\HTTP::getSelfURLNoQuery() and deprecate the former.
|
|
|
|
| |
and deprecate the former.
|
| |
|
|
|
|
| |
SimpleSAML\Utils\HTTP::addURLParameters() and deprecate the former.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
SimpleSAML_Utils_Config::getSecretSalt(). Deprecate the former and stop using it.
|
|
|
|
| |
SimpleSAML_Utils_Random::generateID(). Deprecate the former and schedule it for removal in 2.0.
|
|
|
|
| |
using it.
|
|
|
|
| |
and stop using it.
|
|
|
|
|
|
| |
SimpleSAML_Utils_Crypto.
Mark the old ones as deprecated and schedule them for removal in 2.0.
|
|
|
|
|
|
| |
arrayize().
Schedule SimpleSAML_Utilities:: arrayize() for removal.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
`preg_match` returns `0` if no matches are found, `FALSE` only on error. This means that with the previous check unmatching certificates would not be identified, only when the preg_match itself would error.
|
| |
|
| |
|
|
|
|
|
|
| |
Add statistics data to saml:idp:Response and saml:idp:Response:error
with the total time since we began processing the authentication
request.
|
|
|
|
|
| |
This change makes it easier to add elements to the statistics data
logged when the IdP sends an authentication response.
|
| |
|
|
|
|
| |
SimpleSAML_Session::getSessionFromRequest(), and leave the former as deprecated.
|
|
|
|
| |
IdP authenticating the user, not an intermediate proxy.
|
| |
|
|
|
|
| |
removed back in 2009. Fixes #78.
|
|
|
|
| |
PKCS#1 v1.5 padding) by default.
|
|
|
|
| |
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3349 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
| |
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3326 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
| |
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3319 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
such option is configured for an SP.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3312 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
getEndpointPrioritizedByBinding function.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3303 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
support HTTPRedirect.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3301 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
examples showing how to start using SHA-256, and warning about SHA-1 being disallowed starting in 2014.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3297 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
|
|
|
|
|
| |
AssertionConsumerServiceIndex.
This patch adds support for sending the AttributeConsumingService and
AssertionConsumerServiceIndex attributes in the authentication request.
Thanks to Dale Clarke for providing this patch!
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3266 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
the SP. Working for both traditional logout and iframe version.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3262 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
This reverts commit 391145ae84d5aa4150ff5747a304d0af2aeb161f.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3261 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
| |
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3259 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
|
|
| |
hosted metadata (SingleSignOnServiceBinding and SingleLogoutServiceBinding) to control the bindings published as supported in the metadata.
Bugfix in the logout handler (SOAP binding should be reused when responding a request).
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3257 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
|
|
|
|
| |
The saml:sp:IdP authentication data was only saved for SAML 2.0
authentication. This patch moves this variable into common code, so
that it is shared between SAML 2.0 and SAML 1.1.
Thanks to Tim Jobling for reporting this bug!
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3240 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
| |
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3225 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
in eduPersonTargetedID attribute.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3221 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
|
|
| |
The PostgreSQL database server returns all column names in lowercase,
but we are using mixed case column names. This patch changes the query
to always request lowercase column names.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3207 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
|
|
| |
This function should not return NULL, but did so due to a missing
return statement. This patch adds that return statement, and fixes
the documentation for the function.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3206 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
|
| |
Instead of always adding the endpoint to the metadata, require
setting a separate option to enable it.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3194 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
response from the same entity ID we sent the request to.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3189 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
new SHA signatures support.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3186 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
Signature algorithm can now be set also in the remote IdP metadata, with more priority than the one specified in hosted SP metadata.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3181 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
| |
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3165 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
algorithms. New hosted IdP metadata option 'signature.algorithm' to configure this, defaults to SHA1 for backwards compatibility.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3164 44740490-163a-0410-bde0-09ae8108e29a
|
|
|
|
|
|
| |
This option allows us to disable some encryption algorithms.
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3139 44740490-163a-0410-bde0-09ae8108e29a
|