use of org.opensaml.saml.saml2.ecp.RelayState in project ddf by codice.
the class LogoutRequestServiceTest method getPostLogoutRequest.
@Test
public void getPostLogoutRequest() throws Exception {
String relayState = UUID.randomUUID().toString();
String encodedSamlRequest = "encodedSamlRequest";
String issuerStr = "issuer";
LogoutRequest logoutRequest = mock(LogoutRequest.class);
Issuer issuer = mock(Issuer.class);
OpenSAMLUtil.initSamlEngine();
LogoutResponse logoutResponse = new LogoutResponseBuilder().buildObject();
when(logoutMessage.extractSamlLogoutRequest(any(String.class))).thenReturn(logoutRequest);
when(logoutRequest.getIssuer()).thenReturn(issuer);
when(logoutRequest.getIssueInstant()).thenReturn(new DateTime());
when(logoutRequest.getVersion()).thenReturn(SAMLVersion.VERSION_20);
when(logoutRequest.getID()).thenReturn("id");
when(issuer.getValue()).thenReturn(issuerStr);
when(logoutMessage.buildLogoutResponse(eq(issuerStr), eq(StatusCode.SUCCESS), anyString())).thenReturn(logoutResponse);
when(idpMetadata.getSingleLogoutBinding()).thenReturn(SamlProtocol.POST_BINDING);
when(idpMetadata.getSingleLogoutLocation()).thenReturn(postLogoutUrl);
Response response = logoutRequestService.postLogoutRequest(encodedSamlRequest, null, relayState);
assertEquals(Response.Status.OK.getStatusCode(), response.getStatus());
assertTrue("Expected logout url of " + postLogoutUrl, response.getEntity().toString().contains(postLogoutUrl));
}
use of org.opensaml.saml.saml2.ecp.RelayState in project ddf by codice.
the class IdpEndpoint method processLogin.
@GET
@Path("/login/sso")
public Response processLogin(@QueryParam(SAML_REQ) String samlRequest, @QueryParam(RELAY_STATE) String relayState, @QueryParam(AUTH_METHOD) String authMethod, @QueryParam(SSOConstants.SIG_ALG) String signatureAlgorithm, @QueryParam(SSOConstants.SIGNATURE) String signature, @QueryParam(ORIGINAL_BINDING) String originalBinding, @Context HttpServletRequest request) {
LOGGER.debug("Processing login request: [ authMethod {} ], [ sigAlg {} ], [ relayState {} ]", authMethod, signatureAlgorithm, relayState);
try {
Binding binding;
String template;
if (!request.isSecure()) {
throw new IllegalArgumentException("Authn Request must use TLS.");
}
//the authn request is always encoded as if it came in via redirect when coming from the web app
Binding redirectBinding = new RedirectBinding(systemCrypto, serviceProviders);
AuthnRequest authnRequest = redirectBinding.decoder().decodeRequest(samlRequest);
String assertionConsumerServiceBinding = ResponseCreator.getAssertionConsumerServiceBinding(authnRequest, serviceProviders);
if (HTTP_POST_BINDING.equals(originalBinding)) {
binding = new PostBinding(systemCrypto, serviceProviders);
template = submitForm;
} else if (HTTP_REDIRECT_BINDING.equals(originalBinding)) {
binding = redirectBinding;
template = redirectPage;
} else {
throw new IdpException(new UnsupportedOperationException("Must use HTTP POST or Redirect bindings."));
}
binding.validator().validateAuthnRequest(authnRequest, samlRequest, relayState, signatureAlgorithm, signature, strictSignature);
if (HTTP_POST_BINDING.equals(assertionConsumerServiceBinding)) {
if (!(binding instanceof PostBinding)) {
binding = new PostBinding(systemCrypto, serviceProviders);
}
} else if (HTTP_REDIRECT_BINDING.equals(assertionConsumerServiceBinding)) {
if (!(binding instanceof RedirectBinding)) {
binding = new RedirectBinding(systemCrypto, serviceProviders);
}
}
org.opensaml.saml.saml2.core.Response encodedSaml = handleLogin(authnRequest, authMethod, request, null, false, false);
LOGGER.debug("Returning SAML Response for relayState: {}" + relayState);
NewCookie newCookie = createCookie(request, encodedSaml);
Response response = binding.creator().getSamlpResponse(relayState, authnRequest, encodedSaml, newCookie, template);
if (newCookie != null) {
cookieCache.addActiveSp(newCookie.getValue(), authnRequest.getIssuer().getValue());
logAddedSp(authnRequest);
}
return response;
} catch (SecurityServiceException e) {
LOGGER.info("Unable to retrieve subject for user.", e);
return Response.status(Response.Status.UNAUTHORIZED).build();
} catch (WSSecurityException e) {
LOGGER.info("Unable to encode SAMLP response.", e);
} catch (SimpleSign.SignatureException e) {
LOGGER.info("Unable to sign SAML response.", e);
} catch (IllegalArgumentException e) {
LOGGER.info(e.getMessage(), e);
return Response.status(Response.Status.BAD_REQUEST).build();
} catch (ValidationException e) {
LOGGER.info("AuthnRequest schema validation failed.", e);
return Response.status(Response.Status.BAD_REQUEST).build();
} catch (IOException e) {
LOGGER.info("Unable to create SAML Response.", e);
} catch (IdpException e) {
LOGGER.info(e.getMessage(), e);
return Response.status(Response.Status.BAD_REQUEST).build();
}
return Response.status(Response.Status.INTERNAL_SERVER_ERROR).build();
}
use of org.opensaml.saml.saml2.ecp.RelayState in project ddf by codice.
the class IdpEndpoint method processRedirectLogout.
/**
* aka HTTP-Redirect
*
* @param samlRequest the base64 encoded saml request
* @param samlResponse the base64 encoded saml response
* @param relayState the UUID that references the logout state
* @param signatureAlgorithm this signing algorithm
* @param signature the signature of the url
* @param request the http servlet request
* @return Response redirecting to an service provider
* @throws WSSecurityException
* @throws IdpException
*/
@Override
@GET
@Path("/logout")
public Response processRedirectLogout(@QueryParam(SAML_REQ) final String samlRequest, @QueryParam(SAML_RESPONSE) final String samlResponse, @QueryParam(RELAY_STATE) final String relayState, @QueryParam(SSOConstants.SIG_ALG) final String signatureAlgorithm, @QueryParam(SSOConstants.SIGNATURE) final String signature, @Context final HttpServletRequest request) throws WSSecurityException, IdpException {
LogoutState logoutState = getLogoutState(request);
Cookie cookie = getCookie(request);
try {
if (samlRequest != null) {
LogoutRequest logoutRequest = logoutMessage.extractSamlLogoutRequest(RestSecurity.inflateBase64(samlRequest));
validateRedirect(relayState, signatureAlgorithm, signature, request, samlRequest, logoutRequest, logoutRequest.getIssuer().getValue());
return handleLogoutRequest(cookie, logoutState, logoutRequest, SamlProtocol.Binding.HTTP_REDIRECT, relayState);
} else if (samlResponse != null) {
LogoutResponse logoutResponse = logoutMessage.extractSamlLogoutResponse(RestSecurity.inflateBase64(samlResponse));
String requestId = logoutState != null ? logoutState.getCurrentRequestId() : null;
validateRedirect(relayState, signatureAlgorithm, signature, request, samlResponse, logoutResponse, logoutResponse.getIssuer().getValue(), requestId);
return handleLogoutResponse(cookie, logoutState, logoutResponse, SamlProtocol.Binding.HTTP_REDIRECT);
}
} catch (XMLStreamException e) {
throw new IdpException("Unable to parse Saml Object.", e);
} catch (ValidationException e) {
throw new IdpException("Unable to validate Saml Object", e);
} catch (IOException e) {
throw new IdpException("Unable to deflate Saml Object", e);
}
throw new IdpException("Could not process logout");
}
use of org.opensaml.saml.saml2.ecp.RelayState in project ddf by codice.
the class IdpEndpoint method showLoginPage.
private Response showLoginPage(String samlRequest, String relayState, String signatureAlgorithm, String signature, HttpServletRequest request, Binding binding, String template, String originalBinding) throws WSSecurityException {
String responseStr;
AuthnRequest authnRequest = null;
try {
Map<String, Object> responseMap = new HashMap<>();
binding.validator().validateRelayState(relayState);
authnRequest = binding.decoder().decodeRequest(samlRequest);
authnRequest.getIssueInstant();
binding.validator().validateAuthnRequest(authnRequest, samlRequest, relayState, signatureAlgorithm, signature, strictSignature);
if (!request.isSecure()) {
throw new IllegalArgumentException("Authn Request must use TLS.");
}
X509Certificate[] certs = (X509Certificate[]) request.getAttribute(CERTIFICATES_ATTR);
boolean hasCerts = (certs != null && certs.length > 0);
boolean hasCookie = hasValidCookie(request, authnRequest.isForceAuthn());
if ((authnRequest.isPassive() && hasCerts) || hasCookie) {
LOGGER.debug("Received Passive & PKI AuthnRequest.");
org.opensaml.saml.saml2.core.Response samlpResponse;
try {
samlpResponse = handleLogin(authnRequest, PKI, request, null, authnRequest.isPassive(), hasCookie);
LOGGER.debug("Passive & PKI AuthnRequest logged in successfully.");
} catch (SecurityServiceException e) {
LOGGER.debug(e.getMessage(), e);
return getErrorResponse(relayState, authnRequest, StatusCode.AUTHN_FAILED, binding);
} catch (WSSecurityException e) {
LOGGER.debug(e.getMessage(), e);
return getErrorResponse(relayState, authnRequest, StatusCode.REQUEST_DENIED, binding);
} catch (SimpleSign.SignatureException | ConstraintViolationException e) {
LOGGER.debug(e.getMessage(), e);
return getErrorResponse(relayState, authnRequest, StatusCode.REQUEST_UNSUPPORTED, binding);
}
LOGGER.debug("Returning Passive & PKI SAML Response.");
NewCookie cookie = null;
if (hasCookie) {
cookieCache.addActiveSp(getCookie(request).getValue(), authnRequest.getIssuer().getValue());
} else {
cookie = createCookie(request, samlpResponse);
if (cookie != null) {
cookieCache.addActiveSp(cookie.getValue(), authnRequest.getIssuer().getValue());
}
}
logAddedSp(authnRequest);
return binding.creator().getSamlpResponse(relayState, authnRequest, samlpResponse, cookie, template);
} else {
LOGGER.debug("Building the JSON map to embed in the index.html page for login.");
Document doc = DOMUtils.createDocument();
doc.appendChild(doc.createElement("root"));
String authn = DOM2Writer.nodeToString(OpenSAMLUtil.toDom(authnRequest, doc, false));
String encodedAuthn = RestSecurity.deflateAndBase64Encode(authn);
responseMap.put(PKI, hasCerts);
responseMap.put(GUEST, guestAccess);
responseMap.put(SAML_REQ, encodedAuthn);
responseMap.put(RELAY_STATE, relayState);
String assertionConsumerServiceURL = ((ResponseCreatorImpl) binding.creator()).getAssertionConsumerServiceURL(authnRequest);
responseMap.put(ACS_URL, assertionConsumerServiceURL);
responseMap.put(SSOConstants.SIG_ALG, signatureAlgorithm);
responseMap.put(SSOConstants.SIGNATURE, signature);
responseMap.put(ORIGINAL_BINDING, originalBinding);
}
String json = Boon.toJson(responseMap);
LOGGER.debug("Returning index.html page.");
responseStr = indexHtml.replace(IDP_STATE_OBJ, json);
return Response.ok(responseStr).build();
} catch (IllegalArgumentException e) {
LOGGER.debug(e.getMessage(), e);
if (authnRequest != null) {
try {
return getErrorResponse(relayState, authnRequest, StatusCode.REQUEST_UNSUPPORTED, binding);
} catch (IOException | SimpleSign.SignatureException e1) {
LOGGER.debug(e1.getMessage(), e1);
}
}
} catch (UnsupportedOperationException e) {
LOGGER.debug(e.getMessage(), e);
if (authnRequest != null) {
try {
return getErrorResponse(relayState, authnRequest, StatusCode.UNSUPPORTED_BINDING, binding);
} catch (IOException | SimpleSign.SignatureException e1) {
LOGGER.debug(e1.getMessage(), e1);
}
}
} catch (SimpleSign.SignatureException e) {
LOGGER.debug("Unable to validate AuthRequest Signature", e);
} catch (IOException e) {
LOGGER.debug("Unable to decode AuthRequest", e);
} catch (ValidationException e) {
LOGGER.debug("AuthnRequest schema validation failed.", e);
}
return Response.status(Response.Status.INTERNAL_SERVER_ERROR).build();
}
use of org.opensaml.saml.saml2.ecp.RelayState in project ddf by codice.
the class IdpHandler method createEcpRelayState.
private String createEcpRelayState(HttpServletRequest request) throws WSSecurityException {
RelayStateBuilder relayStateBuilder = new RelayStateBuilder();
RelayState relayState = relayStateBuilder.buildObject();
relayState.setSOAP11Actor(HTTP_SCHEMAS_XMLSOAP_ORG_SOAP_ACTOR_NEXT);
relayState.setSOAP11MustUnderstand(true);
relayState.setValue(createRelayState(request));
return convertXmlObjectToString(relayState);
}
Aggregations