Reading the SAML token response objects using openAM? - saml-2.0

I have a saml2.0 response token from IDP and I am using OpenAM as a Service provider. I want to read the SAML using openAM Java api and validate the response. Any help is appreciated. Thanks in advance.

You don't have to do anything manual, if OpenAM is the SP it will consume the SAML assertions from the IdP just fine.

Related

Generate token from SAML assertion

I have this repo: https://github.com/oktadeveloper/okta-spring-boot-saml-example . After user login in identity provider(okta, azure AD,...), user can access website.
Flow is:
website request SAML assertion
user login with user and password
identity provider return SAML assertion
server make a post request to /saml/sso with SAML assertion to do authentication
But I have a question: how i get SAML assertion from ReactJS and send SAML assertion to springboot to get access token.
Thanks you for your reading!
the SAML bearer assertion flow of OAuth does help in fetching an OAuth token (access-token) using a SAML Assertion as described here: https://learn.microsoft.com/en-us/azure/active-directory/develop/scenario-token-exchange-saml-oauth
After some brain storm,
I use spring mvc to create a page: server.com/sso, Angular will re-direct to server.com/sso, after user provide credentials to microsoft AD, I will generate token from information in SAML assertion, then send it to Angular by re-direct.
Thanks.

Missing InResponseTo SAML attribute in SP initiated Okta sign on

I am trying to add a new service to an existing Okta setup. The service relies on SAML for authentication and uses strict checking of SAML messages.
When Okta session state is already present in the browser, everything works fine. Okta SAML response contains all the necessary attributes to get verified and everything just works.
However, when using a "clean" browser to initiate a new session, my service can not properly validate the Okta SAML response. The response is valid and properly signed, but is missing the InResponseTo attribute which is required for strict verification.
I wonder if somebody may have encountered an issue like that before? May there be some hidden setting in Okta or some common setup mistake in the authentication provider?
Your service is complaining about the sequence of steps you use to initiate the SSO flow. In a so-called service provider-initiated SSO flow, you click on a link that goes to your service. Your service acting as a SAML service provider (SP) then sends a SAML authentication request to the identity provider (Okta) which then responds to this request with a SAML response. Since the identity provider is responding to the request from a service provider, the SAML response will contain an InResponseTo element.
How do you fix this? This is all about your service rather than Okta. You need to determine the correct URL and/or format of the request to your service that will cause it to fire a SAML authentication request to the identity provider.
See Okta docs for more info

Will be possible to call directly IDP in SAML?

Because of xyz reasons, we don't have Service Provider (SP) to place SAML login request. So, here my question is will it be possible to login into SAML through IDP directly? If it is possible, could you please explain steps? We are using Webservices, please remind this.
The IdP can read SAML tokens but only when they are grouped using a profile. A common profile is the browser based WBSSO. So in order to talk to the IdP you need an SP. The SP just groups the SAML tokens into a profile the IdP can understand. Most SAML profiles are browser based but have a look at the ECP profile for non browser access https://wiki.shibboleth.net/confluence/display/CONCEPT/ECP

Can I setup SAML IDP without ADFS?

I want to setup a SAML 2.0 Identity Provider, without the overhead of ADFS. Is this possible?
Sure, you can do it using any other SAML IDP implementation.
Examples include:
Shibboleth
SimpleSAMLPHP
OpenAM
SSOCircle
Auth0

Using salesforce as saml 2.0 idp provider

I am trying to configure salesforce as idp for my saml2.0 based sp. I have enabled domain, sso, created connected app with appropriate profile. with all this I am able to login into sp using using idp initiated url. idp initiated salesforce url correctly, my sp gets correct saml response. but when I try to use sp initiated flow and post saml request to salesforce endpoint, it give error "Insufficient Privileges". Have anyone faced this issue or knows something about this?
I was able to solve this issue. Apparently salesforce doesn't give what is the error. Here I was using redirect request sending to post url.

Resources