15:54:11.535 - DEBUG
[org.opensaml.ws.message.encoder.BaseMessageEncoder:54] - Successfully
encoded message.
15:54:11.536 - INFO [Shibboleth-Audit:695] -
20110423T135411Z|urn:mace:shibboleth:1.0:profiles:AuthnRequest||urn:sitefromme|urn:mace:shibboleth:2.0:profiles:saml1:sso|https://idpdns/default|urn:oasis:names:tc:SAML:1.0:profiles:browser-post|_db63d91dbdda3ccf4c8e378fa159e442|shibboleth|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport||_d43267b0b689600973dcb8ec0fae0ff8|_aad4132ec88d81252ec7c985bd0e13ec,|
But then it redirects me to: https://spdns/Shibboleth.sso/SAML/POST ????
I want to go to https://spdns/secure/index.html
Who knows what is happening?
Cheerz
Ben
I am expecting the user to be redirected to the page he wanted to get
acces to. For example:
1. User goes to: https://myurl/secure [and then the index.html]
2. He is redirected to the IDP by the SP
3. He uses the authenticationprotocol i set in the IDP for the SP
4. User is logged in correctly and also has the right to go to the URL
https://myurl/secure
5. He expect to get on the right URL = https://myurl/secure , but
instead he get to https://myurl/secure/Shibboleth.sso/Shibboleth/SSO <--
I changed the SAML/POST to Shibbolth/SSO
That's why I think it is wrong ;-))
Cheerz
Ben
Nate Klingenstein schreef:
Ben,
No, they don't. handler.xml is an IdP configuration file, and ACS endpoints are an SP issue.
> and the key/certificate information I flushed from the logging. I do not think
> the problem is in the handshaking from certificates.
Your problem is undoubtedly what Nate indicated, you've changed settings that don't need to be changed.
-- Scott
Cheerz
Ben
Cantor, Scott E. schreef:
_I did not changes the settings other than the:_
- metadata.xml (for SP and IDP seperate...yes this I changed)
- handler.xml (i did not change!)
- relying-party.xml (yes this I changed)
- shibboleth2.xml (yes this I changed on SP side [IDP side does not have
one])
- atrribute-resolver.xml (i did not change)
So where do i have to look at....metadata's or shibboleth2.xml.......but
where. My guts say it must be easy, but I keep looking at the same
things and don't seem te see it..
Cheerz
Ben
Cantor, Scott E. schreef:
Another answer from me. I put every configuration back and followed the
URL Nate gave me. I Also get a SAML2 respons. No problem so it looks
like. But than it redirects me to
https://dnsfromsp/Shibboleth.sso/SAML2/POST/SSO but I expact it to go to
https://dnsfromsp/secure/index.html [where a test page stands and where
the user initial went to]
I suspect it is something in my metadata, but where do I have to search
for??
Cheerz
Ben
Cantor, Scott E. schreef:
It MUST send you to that location, that's where the SAML response is processed. If that succeeds, it will redirect you to wherever the relay state information tells it to. If it fails, it will report an error.
It will not, can not, and does not ever skip the URL you seem obsessed with avoiding.
-- Scott
Then you're still suffering from self-inflicted problems by randomly
changing stuff. If your IdP sends you to an ACS URL ending in
/Shibboleth.sso/SAML2/POST/SSO the metadata the IdP has for your SP is
wrong, as no such endpoint exists at the SP.
I won't comment on your "but I want to go to /secure/" since this has
been explained to you twice already. If the above errors wouldn't
prevent the SAML flow from working, you'd end up at the desired URL.
-peter
The solution for me was: in IIS with the extension .sso i had enabled
"check if file exists". That's why i did not recieve the correct error
and logging. After unchecking this option I saw that my certificates
where not correct. After changing this everything works like a charm!
Thanks you all.
Cheerz
Ben
Peter Schober schreef:
So what to do next? IDP and SP on one machine and placing it in the DMZ?
Or using a reversed proxy?
If you're using SAML 2.0 and standard HTTP POST flows, there's
generally no need for the IdP and the SP to be able to directly
communicate with each other. All communication is done through the
user agent. You'll be unable to use protocols that rely on direct
bindings, such as attribute queries, artifact resolution and some
forms of single logout. Most deployments will be okay with this.
Regardless, the user agent will need to be able to communicate with
both. You'll still need some way to exchange metadata, too, which can
be done through any method of your choice(e.g. out of band).
Glad you got it working,
Nate.
I find the activity and support on this product very good. Very
important to have an active community. If I can contribute in some
matter I will participate.
The problem is on the internet the IDP and SP have their own DNS. This
is because they are on sepperate machines. My testlab only has one
public IP. So the firewall can't determine where to go to. One public IP
is also critical cause this is the whole point of indentifying ;-))
I read about Squid and reverse proxy....maybe this is the way to go. I
use SAML 2.0 and HTTP POST (ssl) so this is not the problem.
Cheerz
Ben
Nate Klingenstein schreef:
Shibboleth doesn't care about IP adresses, for the most part.
Each component (IdP, SP) can have its own hostname (on the same
machine or on different machines) or they can just as well be on the
same (v)host.
So there are no requirements whatsoever with regrad to firewalls,
DMZs, DNS or anything else from Shibboleth. While you might have such
constraints from your network or test lab setup, this is nothing
anyone here can help you with and, again, Shibboleth doesn't change
or introduce anything new here.
-peter
I must be seeing things then:
In my metadatafiles:
<md:AssertionConsumerService
Location="https://dnsfromsp/Shibboleth.sso/SAML2/POST-SimpleSign" index="2"
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign"/>
<md:SingleSignOnService
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://dnsfromidp/idp/profile/SAML2/POST/SSO"/>
So there is definitly a direction to a machine [IDP and SP]. Where the
metadata tells where to find what.
I do not know what you are suggesting.....
Cheerz
Ben
Peter Schober schreef:
I guess you are.
> In my metadatafiles:
>
> <md:AssertionConsumerService
> Location="https://dnsfromsp/Shibboleth.sso/SAML2/POST-SimpleSign" index="2"
> Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign"/>
This has nothing to do with anything in this thread. Or your error,
for that matter.
> <md:SingleSignOnService
> Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
> Location="https://dnsfromidp/idp/profile/SAML2/POST/SSO"/>
>
> So there is definitly a direction to a machine [IDP and SP]. Where
> the metadata tells where to find what.
I have no idea what you're talking about and what the above should
indicate or prove. You wrote:
* B.E.N. van der Veen <bvd...@time-less.nl> [2011-04-24 13:22]:
> But than it redirects me to
> https://dnsfromsp/Shibboleth.sso/SAML2/POST/SSO
which is an invald endpoint at your SP, so an error is to be
expected.
Above you present a different (and completely unrelated) endpoint at
your SP (which might exist, but that's irrelevant) and present yet
another endpoint at the IdP -- which, again, is irrelevant.
If you get redirected to
"https://dnsfromsp/Shibboleth.sso/SAML2/POST/SSO" as you say, then
your IdP must have this URL somewhere in the metadata for the SP.
This is wrong, as, this endpoint does not exist and it does not make
any sense (SSO is a function of an IdP, so there cannot be an "SSO"
endpoint at an SP).
All of this still points to you changing random stuff and asking
questions about the effects on the list here.
What you should do:
* The SP can generate an approximation of its own metadata, check the
documentation on how and do this (a hint: access the URL
https://dnsfromsp/Shibboleth.sso/Metadata )
* Give this piece of metadata to your IdP (according to the
documentation for the IdP configuration) instead of any of the
existing metadata resources.
* If none of this helps post your IdP and SP metadata somewhere on the
net and provide a link here so that people can look at it.
If all else fails, start from scratch and follow the documentation to
the letter.
-peter
This explains a lot! Thank you for the critical answer. I will try al
the suggestions you have. I have everything up and running. But that it
is running does not say it is correct configured ;-))
Cheerz
Ben
Peter Schober schreef:
Cheerz
Ben
--
View this message in context: http://shibboleth.1660669.n2.nabble.com/Shibboleth-sso-SAML-POST-redirect-tp6299489p6307598.html
Sent from the Shibboleth - Users mailing list archive at Nabble.com.