SimpleSAML_Error_Error: SLOSERVICEPARAMS
Backtrace: 0 www/saml2/idp/SingleLogoutService.php:30 (N/A) Caused by: Exception: Unable to find the current binding. Backtrace: 2 vendor/simplesamlphp/saml2/src/SAML2/Binding.php:99 (SAML2\Binding::getCurrentBinding) 1 modules/saml/lib/IdP/SAML2.php:539 (sspmod_saml_IdP_SAML2::receiveLogoutMessage) 0 www/saml2/idp/SingleLogoutService.php:23 (N/A)
https://<IdP Domain>/simplesaml/module.php/saml/sp/metadata.php/google
You will find in the metadata the XML tag <md:SingleSignOnService>
which contains the right URL to input in the field, it will look something like this:
https://dev2.andreas.feide.no/simplesaml/saml2/idp/SSOService.php
You must also configure the IdP initiated Single LogOut endpoint of your server. You will find this in your metadata XML in the tag <md:SingleLogoutService>
. It will look something like:
http://dev2.andreas.feide.no/simplesaml/saml2/idp/SingleLogoutService.php
* 'Adam Murray' via SimpleSAMLphp <simple...@googlegroups.com> [2018-04-13 17:01]:
> I have found differing opinions about Google's support for SLO.
Then this is the last place to come looking for an authoriative
statement. As the vendor.
> I'm just not sure why the specific Google setup documentation says
> to put that URL in if it seemingly does not work.
So they can make it your problem while appearing to "support logout".
* James Harris <har...@adelphi.edu> [2018-04-30 22:25]:
> I pondering a SSP module that would provide a URL for Google's logout.
Jaime already provided the URL you could configure in your tenant settings:
* Jaime Perez Crespo <jaime...@uninett.no> [2018-04-13 15:39]:
> You may want to configure "/simplesaml/logout.php” instead.
As to your suggestion:
> Something gsuite/logout.php?entityid=google.com would remove the google.com
> association. So the user sees a successful log out if they click logout
> from Gmail. But do see an error with IDP initiated/other SP initiated
> logout. Not like SAML SLO. But at least gives the user a chance of
> correctly logging out.
No idea what that should do but at worst it's creating a false sense
of security.
*Instead* people should lock/logout from the device itself, which will
also protect their chat messages, private photos, email account, as
well as all other data at the device.
Why would you want to hand over your computer, with you being logged
in, to an untrusted person? That doesn't make any sense, even without
bringing SAML or SSO into the picture.
* If that's a PC lab of some kind have people log off from the
workstation instead (and make them responsible for any damage that
occurs from leaving an authenticated session on the PC behind for
others to misuse.)
* If it's a public kiosk of yours (1) I'd question whether you should
be offering any SSO-enabled services there at all, and (2) you have
options to make "logout" simple and secure by configuring the browser
to that closing the browser removes all session cookies (or better
yet: any local state, all cookies, HTML5 local storage, etc.).
Also add a big, friendly "END SESSION" button on the screen and make
people responsible to walking away without ending their session.
Sensitive services should probably use forced (re-)authentication with
their SAML authentication requests. The IDP might be configured to
disable SSO for the IP ranges (or user agent strings) for managed
kiosks or other "public" PCs. etc.pp.
* I'm not aware of many sensible use cases that require sharing a
device with someone else but in those cases it's trivial to start a
"private" browser window (or another browser implementation
altogether) before giving it to the other person, so that the browsers
don't share any state.
None of this has to do with Google, but all of those avoids "the
logout problem" in the general case, IMO.