--
You received this message because you are subscribed to the Google Groups "pac4j-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Jaroslav,
--
Great ! I'm glad to hear you succeed in integrating pac4j with ADFS. Maybe you could make a pull request to update the README in pac4j.
<**** SAML Response / IssueInstant>
<Now: 1409242359281, IssueInstantMS: 1409242346678, Interval: 0, Skew: 120, IssueInstant: 2014-08-28T16:12:26.678Z>
<Before end OK: true>
<After start OK: true>
<*** Assertion / IssueInstant>
<Now: 1409242359345, IssueInstantMS: 1409242346678, Interval: 0, Skew: 120, IssueInstant: 2014-08-28T16:12:26.678Z>
<Before end OK: true>
<After start OK: true>
<**** Authentication statement / Authentication instant>
<Now: 1409242359346, IssueInstantMS: 1409229981270, Interval: 3600, Skew: 120, IssueInstant: 2014-08-28T12:46:21.270Z>
<Before end OK: true>
<After start OK: false>
The last one is not OK. That's an authentication created about 3.5 hours before the SAML assertion is sent back by ADFS. On ADFS side, it's still valid. On CAS side, it's already invalid.
Hi Jaroslav,
Hello everyone!I've been successfully using PAC4J for SAML integration for some time. I have tested it against a couple of Shibbolet IdP servers and also the Feide IdP server, which is written in PHP, as far as I know. However, when I tried to run it against Microsoft AD FS 2.0, I experienced problems preventing successful authentication. I wonder if someone has succeeded integrating PAC4J and ADFS.1. Entity ID cannot contain a question markIt seems that ADFS ignores everything after a question mark in an entity ID. As PAC4J uses question marks in URLs and IDs by default (e.g. http://localhost:8080/cas/login?client_name=Saml2Client), this is a problem. ADFS then complains in the log:A token request was received for a relying party identified by the key 'https://server:8443/cas/login', but the request could not be fulfilled because the key does not identify any known relying party trust. Key: https://server:8443/cas/login. When I added another ID without everything after the question mark (https://server:8443/cas/login) to the corresponding ADFS trust in the ADFS management console, the problem disappeared. I think the problem could be also eliminated by editing the SAML metadata first before importing them to ADFS.
I had never thought about having such customized callback URL, but as the clients are gathered in the Clients component which is also used to retrieve them, I have the feeling that subclassing the Clients component should allow you to do exactly what you want.The following methods: protected void updateCallbackUrlOfIndirectClient(final IndirectClient indirectClient) and public Client findClient(final WebContext context) could be overridden for your needs.We could certainly even go further on this by creating some interface and implementations or some delegated component to handle the addition and retrieval of the client name.
--
You received this message because you are subscribed to the Google Groups "pac4j-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users+unsubscribe@googlegroups.com.
--
To unsubscribe from this group and stop receiving emails from it, send an email to pac4j-users...@googlegroups.com.
Hi, I've just come across your post while I was testing a pac4j app using saml against AD FS. Thanks for pointing out some of the issues, I have a question though if anyone has further details