*
gou...@wrlc.org <
gou...@wrlc.org> [2017-02-13 22:06]:
> I am using SSP 1.14 as a service provider. I've successfully integrated
> with 6 IdPs, including Shibb, AD FS and Azure AD. I am trying to add
> another AD FS and having trouble. At first I was getting an
> "urn:oasis:names:tc:SAML:2.0:status:InvalidNameIDPolicy" error in their
> response. I figured out how to change the specification of the NameIDFormat
> to "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" in my auth
> request.
If you don't require a specific NameID format then don't
request/require one (not specifically request the "unspecified" one).
For an SSP SP you'd have to set the format to NULL, IIRC, in the
saml:sp authsource.
> I don't see a NameID in the SAML Subject that I receive...and that
> looks like the 2nd argument on the call on line 190, so I'm thinking
> that SSP can't handle a missing NameID? Is that a bug or is NameID
> required by the SAML2 protocol? Is there any way I can get SSP to
> accept this response?
As long as I can remember SSP indeed insisted on recieving a NameID
(which is optional in SAML, fyi). There should be an issue for this in
Github, and maybe it's already fixed, but I don't think it's part of a
released SSP version yet.
*But* when I encountered that issue SSP presented an UNHANDLED
EXCEPTION during SSO, with the reason clearly stated (AFAIR), so no
digging through code was necessary.
So this may or may not in fact be your issue.
-peter