steven zhao Hace 12 años Where can I download the SAML Portlet WAR? -- Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto steven zhao Hace 12 años It's available in Customer Portal like all EE plugins. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,thanks for your post.i am able to use the single sign on functionality with salesforce with the admin user test@liferay.combut whenever i try to sign in with another user(imported from LDAP) this functionality is not working i am getting error "your login attempt with single sign on account have failed,please contact your salesforce administrator" Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi,One more question i want to ask is the user which is getting authenticated using liferay sign up this particular user have to be registered on saleforce.com means my use case is we have a liferay integrated with LDAP and we would like SSO LDAP users in salesforce.com without registering those users in salesforce.com we just want to create authentication certificate for salesforce.com how can we achieve above functionality.thanks kapil Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Kapil Burange Hace 9 años You'd need to provision the users from your LDAP to Salesforce or to configure Salesforce to automatically create users from attributes provided in SAML Assertion. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años is this the only way to register ldap user in sales force or can we generate the keystore with ldap group which contains all the users and register that certificate in salesforce.... Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años we cannot allow LDAP connectivity to Salesforce and would like to use SAML assertion for creating users. How to do that?and one thing we want to add some custom fields from LDAP to be inserted in the SAML how can we do that.please suggestthanks Kapil Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,can you please tell how to pass RelayState in the linkmy relay state value will be(tc=E1001)/c/portal/saml/sso?entityId=https://saml.salesforce.com&RelayState=tc=E1001RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,thanks for the reply.i just want to ask that on salesforce end how can we check the field firstname lastname email uuid and screenname and on liferay end we have configured saml.idp.metadata.attribute.names[https://saml.salesforce.com]=screenName,firstName,lastName,emailAddress,uuid this propertyplease reply because i am kind of stuck on this. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto steven zhao Hace 12 años It's available in Customer Portal like all EE plugins. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,thanks for your post.i am able to use the single sign on functionality with salesforce with the admin user test@liferay.combut whenever i try to sign in with another user(imported from LDAP) this functionality is not working i am getting error "your login attempt with single sign on account have failed,please contact your salesforce administrator" Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi,One more question i want to ask is the user which is getting authenticated using liferay sign up this particular user have to be registered on saleforce.com means my use case is we have a liferay integrated with LDAP and we would like SSO LDAP users in salesforce.com without registering those users in salesforce.com we just want to create authentication certificate for salesforce.com how can we achieve above functionality.thanks kapil Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Kapil Burange Hace 9 años You'd need to provision the users from your LDAP to Salesforce or to configure Salesforce to automatically create users from attributes provided in SAML Assertion. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años is this the only way to register ldap user in sales force or can we generate the keystore with ldap group which contains all the users and register that certificate in salesforce.... Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años we cannot allow LDAP connectivity to Salesforce and would like to use SAML assertion for creating users. How to do that?and one thing we want to add some custom fields from LDAP to be inserted in the SAML how can we do that.please suggestthanks Kapil Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,can you please tell how to pass RelayState in the linkmy relay state value will be(tc=E1001)/c/portal/saml/sso?entityId=https://saml.salesforce.com&RelayState=tc=E1001RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,thanks for the reply.i just want to ask that on salesforce end how can we check the field firstname lastname email uuid and screenname and on liferay end we have configured saml.idp.metadata.attribute.names[https://saml.salesforce.com]=screenName,firstName,lastName,emailAddress,uuid this propertyplease reply because i am kind of stuck on this. Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 9 años Hi Mika,thanks for your post.i am able to use the single sign on functionality with salesforce with the admin user test@liferay.combut whenever i try to sign in with another user(imported from LDAP) this functionality is not working i am getting error "your login attempt with single sign on account have failed,please contact your salesforce administrator" Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 9 años Hi,One more question i want to ask is the user which is getting authenticated using liferay sign up this particular user have to be registered on saleforce.com means my use case is we have a liferay integrated with LDAP and we would like SSO LDAP users in salesforce.com without registering those users in salesforce.com we just want to create authentication certificate for salesforce.com how can we achieve above functionality.thanks kapil Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Kapil Burange Hace 9 años You'd need to provision the users from your LDAP to Salesforce or to configure Salesforce to automatically create users from attributes provided in SAML Assertion. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años is this the only way to register ldap user in sales force or can we generate the keystore with ldap group which contains all the users and register that certificate in salesforce.... Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años we cannot allow LDAP connectivity to Salesforce and would like to use SAML assertion for creating users. How to do that?and one thing we want to add some custom fields from LDAP to be inserted in the SAML how can we do that.please suggestthanks Kapil Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,can you please tell how to pass RelayState in the linkmy relay state value will be(tc=E1001)/c/portal/saml/sso?entityId=https://saml.salesforce.com&RelayState=tc=E1001RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Kapil Burange Hace 9 años You'd need to provision the users from your LDAP to Salesforce or to configure Salesforce to automatically create users from attributes provided in SAML Assertion. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años is this the only way to register ldap user in sales force or can we generate the keystore with ldap group which contains all the users and register that certificate in salesforce.... Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años we cannot allow LDAP connectivity to Salesforce and would like to use SAML assertion for creating users. How to do that?and one thing we want to add some custom fields from LDAP to be inserted in the SAML how can we do that.please suggestthanks Kapil Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 9 años Hi Mika,can you please tell how to pass RelayState in the linkmy relay state value will be(tc=E1001)/c/portal/saml/sso?entityId=https://saml.salesforce.com&RelayState=tc=E1001RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 9 años is this the only way to register ldap user in sales force or can we generate the keystore with ldap group which contains all the users and register that certificate in salesforce.... Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 9 años we cannot allow LDAP connectivity to Salesforce and would like to use SAML assertion for creating users. How to do that?and one thing we want to add some custom fields from LDAP to be inserted in the SAML how can we do that.please suggestthanks Kapil Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 9 años Hi Mika,can you please tell how to pass RelayState in the linkmy relay state value will be(tc=E1001)/c/portal/saml/sso?entityId=https://saml.salesforce.com&RelayState=tc=E1001RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 9 años Hi Mika,thanks for the reply.i just want to ask that on salesforce end how can we check the field firstname lastname email uuid and screenname and on liferay end we have configured saml.idp.metadata.attribute.names[https://saml.salesforce.com]=screenName,firstName,lastName,emailAddress,uuid this propertyplease reply because i am kind of stuck on this. Por favor identifíquese para votar. Contestar como... Cancelar
Jonas Yuan Hace 12 años Cool! Thanks Mika! Por favor identifíquese para votar. Contestar como... Cancelar
Steven Zhao Hace 12 años Thanks Mika. I got the SAML WAR and it works like a charm!. Just one more question. How do I use Liferay as IdP to connect to two SPs? say one is Salesforce and another is Google App. And I would use different Liferay user fields other than email address as SSO subject, or two different email addresses, one for Salesforce, one for Google App. Por favor identifíquese para votar. Contestar como... Cancelar
Jay Patel Hace 12 años Cool..thnx Mika for sharing this.. Por favor identifíquese para votar. Contestar como... Cancelar Roger CARHUATOCTO Jay Patel Hace 12 años great job! Por favor identifíquese para votar. Contestar como... Cancelar
Roger CARHUATOCTO Jay Patel Hace 12 años great job! Por favor identifíquese para votar. Contestar como... Cancelar
Ankit Srivastava Hace 12 años Thanks Mika, Very useful blog..... Por favor identifíquese para votar. Contestar como... Cancelar Paul . Ankit Srivastava Hace 12 años Works very well, however on logout from salesforce, it's redirected to /c/portal/logout Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Paul . Hace 12 años Paul, that's because Salesforce does not support SAML Single Logout profile. Por favor identifíquese para votar. Contestar como... Cancelar Anand Anandan Mika Koivisto Hace 11 años Liferay SAML 2.0 IdP support is it only for EE edition. Is it not available for CE.Can CE be part of SP? Please let us know. Thank you.-Anand Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Anand Anandan Hace 11 años The SAML plugin is for EE only. Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Mika Koivisto Hace 7 años Hi Mika,we have a use case where we have to connect with one of the share point application which does not support SAML, so for that we have bring forward the ADFS as the broker between the liferay and share point application.We have configure the ADFS metadata in liferay and sending the userprinciplename as the name id to adfs, and we are able to send the saml response successfully. In ADFS liferay has been configured as the claim provider and share point application has been configured as the relying party.When we are posting the saml response to ADFS, it reaches the ADFS successfully but the application is not able to redirect to relying party , it stays on the ADFS only. Can you please help if you have came across such use case. Thanks in advance..It will be a great help. Por favor identifíquese para votar. Contestar como... Cancelar
Paul . Ankit Srivastava Hace 12 años Works very well, however on logout from salesforce, it's redirected to /c/portal/logout Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Paul . Hace 12 años Paul, that's because Salesforce does not support SAML Single Logout profile. Por favor identifíquese para votar. Contestar como... Cancelar Anand Anandan Mika Koivisto Hace 11 años Liferay SAML 2.0 IdP support is it only for EE edition. Is it not available for CE.Can CE be part of SP? Please let us know. Thank you.-Anand Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Anand Anandan Hace 11 años The SAML plugin is for EE only. Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Mika Koivisto Hace 7 años Hi Mika,we have a use case where we have to connect with one of the share point application which does not support SAML, so for that we have bring forward the ADFS as the broker between the liferay and share point application.We have configure the ADFS metadata in liferay and sending the userprinciplename as the name id to adfs, and we are able to send the saml response successfully. In ADFS liferay has been configured as the claim provider and share point application has been configured as the relying party.When we are posting the saml response to ADFS, it reaches the ADFS successfully but the application is not able to redirect to relying party , it stays on the ADFS only. Can you please help if you have came across such use case. Thanks in advance..It will be a great help. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Paul . Hace 12 años Paul, that's because Salesforce does not support SAML Single Logout profile. Por favor identifíquese para votar. Contestar como... Cancelar Anand Anandan Mika Koivisto Hace 11 años Liferay SAML 2.0 IdP support is it only for EE edition. Is it not available for CE.Can CE be part of SP? Please let us know. Thank you.-Anand Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Anand Anandan Hace 11 años The SAML plugin is for EE only. Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Mika Koivisto Hace 7 años Hi Mika,we have a use case where we have to connect with one of the share point application which does not support SAML, so for that we have bring forward the ADFS as the broker between the liferay and share point application.We have configure the ADFS metadata in liferay and sending the userprinciplename as the name id to adfs, and we are able to send the saml response successfully. In ADFS liferay has been configured as the claim provider and share point application has been configured as the relying party.When we are posting the saml response to ADFS, it reaches the ADFS successfully but the application is not able to redirect to relying party , it stays on the ADFS only. Can you please help if you have came across such use case. Thanks in advance..It will be a great help. Por favor identifíquese para votar. Contestar como... Cancelar
Anand Anandan Mika Koivisto Hace 11 años Liferay SAML 2.0 IdP support is it only for EE edition. Is it not available for CE.Can CE be part of SP? Please let us know. Thank you.-Anand Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Anand Anandan Hace 11 años The SAML plugin is for EE only. Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Mika Koivisto Hace 7 años Hi Mika,we have a use case where we have to connect with one of the share point application which does not support SAML, so for that we have bring forward the ADFS as the broker between the liferay and share point application.We have configure the ADFS metadata in liferay and sending the userprinciplename as the name id to adfs, and we are able to send the saml response successfully. In ADFS liferay has been configured as the claim provider and share point application has been configured as the relying party.When we are posting the saml response to ADFS, it reaches the ADFS successfully but the application is not able to redirect to relying party , it stays on the ADFS only. Can you please help if you have came across such use case. Thanks in advance..It will be a great help. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Anand Anandan Hace 11 años The SAML plugin is for EE only. Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Mika Koivisto Hace 7 años Hi Mika,we have a use case where we have to connect with one of the share point application which does not support SAML, so for that we have bring forward the ADFS as the broker between the liferay and share point application.We have configure the ADFS metadata in liferay and sending the userprinciplename as the name id to adfs, and we are able to send the saml response successfully. In ADFS liferay has been configured as the claim provider and share point application has been configured as the relying party.When we are posting the saml response to ADFS, it reaches the ADFS successfully but the application is not able to redirect to relying party , it stays on the ADFS only. Can you please help if you have came across such use case. Thanks in advance..It will be a great help. Por favor identifíquese para votar. Contestar como... Cancelar
divya goyal Mika Koivisto Hace 7 años Hi Mika,we have a use case where we have to connect with one of the share point application which does not support SAML, so for that we have bring forward the ADFS as the broker between the liferay and share point application.We have configure the ADFS metadata in liferay and sending the userprinciplename as the name id to adfs, and we are able to send the saml response successfully. In ADFS liferay has been configured as the claim provider and share point application has been configured as the relying party.When we are posting the saml response to ADFS, it reaches the ADFS successfully but the application is not able to redirect to relying party , it stays on the ADFS only. Can you please help if you have came across such use case. Thanks in advance..It will be a great help. Por favor identifíquese para votar. Contestar como... Cancelar
Doug Storms Hace 11 años I cannot find the SAML portlet war. I looked for the Customer Portal, but could not find that either. Is this available with the 30 day free trial of 6.1 EE? I found the liferay-asb-sso-hook-1.0.1.war, is this what I need? Whenever I hit, http://localhost:8080/c/portal/saml/metadata, it redirects me to http://localhost:8080. Thanks. Por favor identifíquese para votar. Contestar como... Cancelar Doug Storms Doug Storms Hace 11 años Sorry, I didn't realize the customer portal was for actual customers and not trial users. The sales office gave me access to the necessary jar. Thanks again. Por favor identifíquese para votar. Contestar como... Cancelar Armaz Mellati Doug Storms Hace 11 años We tried to use it. It worked nicely, but not for us We need to have both SAML and plain-authentication available for users. Users must get forwarded to the login-page where they can choose. This was not possible (read: we didn't find out how) to set-up with SAML-plugin. When activated, all logins, are redirected right to the SAML (federatedt) in-logging-page only. Por favor identifíquese para votar. Contestar como... Cancelar vipin bardia Armaz Mellati Hace 11 años Can some one walk me thru the steps if we want to use our AD as the identity provider and use Liferay as the Service provider. This may help us to resolve our LDAP issue. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto vipin bardia Hace 11 años I don't think AD by itself can be SAML IdP but with Microsoft's Active Directory Federation Server (ADFS) 2.0 I think you could do that. The principals are the same but I can't help you with ADFS configuration as I've never used it. Por favor identifíquese para votar. Contestar como... Cancelar Vipin Bardia Mika Koivisto Hace 11 años Hi Mika,Thanks for prompt response.I will try your suggestion with my seniors and if we succeed , will also update you.Thanks,Vipin Bardiahttp://vkbardia.blogspot.in Por favor identifíquese para votar. Contestar como... Cancelar Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Doug Storms Doug Storms Hace 11 años Sorry, I didn't realize the customer portal was for actual customers and not trial users. The sales office gave me access to the necessary jar. Thanks again. Por favor identifíquese para votar. Contestar como... Cancelar Armaz Mellati Doug Storms Hace 11 años We tried to use it. It worked nicely, but not for us We need to have both SAML and plain-authentication available for users. Users must get forwarded to the login-page where they can choose. This was not possible (read: we didn't find out how) to set-up with SAML-plugin. When activated, all logins, are redirected right to the SAML (federatedt) in-logging-page only. Por favor identifíquese para votar. Contestar como... Cancelar vipin bardia Armaz Mellati Hace 11 años Can some one walk me thru the steps if we want to use our AD as the identity provider and use Liferay as the Service provider. This may help us to resolve our LDAP issue. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto vipin bardia Hace 11 años I don't think AD by itself can be SAML IdP but with Microsoft's Active Directory Federation Server (ADFS) 2.0 I think you could do that. The principals are the same but I can't help you with ADFS configuration as I've never used it. Por favor identifíquese para votar. Contestar como... Cancelar Vipin Bardia Mika Koivisto Hace 11 años Hi Mika,Thanks for prompt response.I will try your suggestion with my seniors and if we succeed , will also update you.Thanks,Vipin Bardiahttp://vkbardia.blogspot.in Por favor identifíquese para votar. Contestar como... Cancelar Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Armaz Mellati Doug Storms Hace 11 años We tried to use it. It worked nicely, but not for us We need to have both SAML and plain-authentication available for users. Users must get forwarded to the login-page where they can choose. This was not possible (read: we didn't find out how) to set-up with SAML-plugin. When activated, all logins, are redirected right to the SAML (federatedt) in-logging-page only. Por favor identifíquese para votar. Contestar como... Cancelar vipin bardia Armaz Mellati Hace 11 años Can some one walk me thru the steps if we want to use our AD as the identity provider and use Liferay as the Service provider. This may help us to resolve our LDAP issue. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto vipin bardia Hace 11 años I don't think AD by itself can be SAML IdP but with Microsoft's Active Directory Federation Server (ADFS) 2.0 I think you could do that. The principals are the same but I can't help you with ADFS configuration as I've never used it. Por favor identifíquese para votar. Contestar como... Cancelar Vipin Bardia Mika Koivisto Hace 11 años Hi Mika,Thanks for prompt response.I will try your suggestion with my seniors and if we succeed , will also update you.Thanks,Vipin Bardiahttp://vkbardia.blogspot.in Por favor identifíquese para votar. Contestar como... Cancelar Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
vipin bardia Armaz Mellati Hace 11 años Can some one walk me thru the steps if we want to use our AD as the identity provider and use Liferay as the Service provider. This may help us to resolve our LDAP issue. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto vipin bardia Hace 11 años I don't think AD by itself can be SAML IdP but with Microsoft's Active Directory Federation Server (ADFS) 2.0 I think you could do that. The principals are the same but I can't help you with ADFS configuration as I've never used it. Por favor identifíquese para votar. Contestar como... Cancelar Vipin Bardia Mika Koivisto Hace 11 años Hi Mika,Thanks for prompt response.I will try your suggestion with my seniors and if we succeed , will also update you.Thanks,Vipin Bardiahttp://vkbardia.blogspot.in Por favor identifíquese para votar. Contestar como... Cancelar Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto vipin bardia Hace 11 años I don't think AD by itself can be SAML IdP but with Microsoft's Active Directory Federation Server (ADFS) 2.0 I think you could do that. The principals are the same but I can't help you with ADFS configuration as I've never used it. Por favor identifíquese para votar. Contestar como... Cancelar Vipin Bardia Mika Koivisto Hace 11 años Hi Mika,Thanks for prompt response.I will try your suggestion with my seniors and if we succeed , will also update you.Thanks,Vipin Bardiahttp://vkbardia.blogspot.in Por favor identifíquese para votar. Contestar como... Cancelar Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Vipin Bardia Mika Koivisto Hace 11 años Hi Mika,Thanks for prompt response.I will try your suggestion with my seniors and if we succeed , will also update you.Thanks,Vipin Bardiahttp://vkbardia.blogspot.in Por favor identifíquese para votar. Contestar como... Cancelar Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Muru Annamalai Vipin Bardia Hace 11 años Good Information.Thank you Mika Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Muru Annamalai Hace 11 años Armaz Mellati, yeah the current version of the SP is very limited. I'll keep that in mind for the next version as I already had thought about adding support for multiple IdPs so that would fit right in with it.Thanks everyone for your feedback. I'm always interested in hearing how and with what other SAML IdP or SP you are using it with. Also I'm very interested in hearing what features you think it's missing. Feel free to post here or email me firstname.lastname @ liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Petr Zalesky Mika Koivisto Hace 11 años Mika, do you have a timeline for adding support for multiple IdPs? Por favor identifíquese para votar. Contestar como... Cancelar Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
Christopher Dawson Petr Zalesky Hace 10 años To clarify what "multiple IDPs" mean, Mika are you referring to the ability of a single LR server in IDP mode to support using different certificates for signing assertions to different service providers? The SAML plugin in its current state allows me to configure multiple SPs for an IDP Initiated Web SSO scenario - but even if I configure 50 different SPs I would be signing all of those assertions with the same single certificate, right? I have a client that is requiring that I provide them with a unique certificate for each of their SP entityIDs.What I believe I would need is a way to configure multiple IDP entity IDs - each with their own keystore certificate - and then a way to associate that specific entityID with a specific SP entityID. That way I could utilize a different certificate for each SSO "route". Example portal-ext.properties with proposed config changes:saml.enabled=truesaml.role=idpsaml.metadata.paths=\ /first.service.provider.metadata.xml, \ /second.service.provider.metadata.xml?? saml.entity.id=https://generic.identity.provider.entity.id ??saml.idp.enabled=true# First IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password># Second IDP Entity ID Configsaml.idp.entity.id[https\://first.service.provider.entity.id]=https\://first.identity.provider.entity.idsaml.keystore.credential.password[https\://first.identity.provider.entity.id]=<key-password>Mika: Is this something that is in the works at all? Or should I accept the fact that I'll need to roll my own to get this kind of functionality. Will try contacting you via email also.Cheers! Por favor identifíquese para votar. Contestar como... Cancelar sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
sanjay datta Christopher Dawson Hace 8 años Did you every got to configure Multiple Idp ?. Did you have to develop custom code to achieve this feature Por favor identifíquese para votar. Contestar como... Cancelar
ryan baldwin Hace 11 años - Editado Is the download for the WAR In the "Official Plugins"? When I do a search for SAML I can't find it. I can find the AssureBridge SAML war in the community plugins, but can't find the official one... Point me in the right direction? Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto ryan baldwin Hace 11 años Ryan, this is a EE only plugin so you need to be EE subscriber to get it. For EE subscribers it's found in the customer portal where you download EE version of the portal etc. Por favor identifíquese para votar. Contestar como... Cancelar Harish Kumar Mika Koivisto Hace 11 años I have followed the steps to setup liferay as idp but when I try to access http://localhost:8080/c/portal/saml/metadataIts redirecting me to home page instead of displaying metadata. Por favor identifíquese para votar. Contestar como... Cancelar Steven Zhao Harish Kumar Hace 11 años Did you login to Liferay before accessing the page? The URL pointed to a private page I believe Por favor identifíquese para votar. Contestar como... Cancelar Aaron Weikle Steven Zhao Hace 11 años I followed these steps to a T and I keep getting:Error [KeyStoreManagerImpl:122] Unable to load Keystorejava.io.IOException: Keystore was tampered with, or password was incorrectI have checked numerous times to make sure all information in my portal-ext.properties file is correct and it is. So not sure why I am getting this error. Por favor identifíquese para votar. Contestar como... Cancelar Imad T. Harish Kumar Hace 10 años I have followed the steps but when I try to access the url "http://localhost:8080/c/portal/saml/metadata" I got "Internal Server Error"Any suggestions ? Por favor identifíquese para votar. Contestar como... Cancelar Anup Arya Imad T. Hace 9 años Has it worked for you, i am getting the following errors " Unable to process SAML request "when i try to access the URL http://localhost:8080/c/portal/saml/metadata, in the logs the error is "Credential is Required" Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto ryan baldwin Hace 11 años Ryan, this is a EE only plugin so you need to be EE subscriber to get it. For EE subscribers it's found in the customer portal where you download EE version of the portal etc. Por favor identifíquese para votar. Contestar como... Cancelar Harish Kumar Mika Koivisto Hace 11 años I have followed the steps to setup liferay as idp but when I try to access http://localhost:8080/c/portal/saml/metadataIts redirecting me to home page instead of displaying metadata. Por favor identifíquese para votar. Contestar como... Cancelar Steven Zhao Harish Kumar Hace 11 años Did you login to Liferay before accessing the page? The URL pointed to a private page I believe Por favor identifíquese para votar. Contestar como... Cancelar Aaron Weikle Steven Zhao Hace 11 años I followed these steps to a T and I keep getting:Error [KeyStoreManagerImpl:122] Unable to load Keystorejava.io.IOException: Keystore was tampered with, or password was incorrectI have checked numerous times to make sure all information in my portal-ext.properties file is correct and it is. So not sure why I am getting this error. Por favor identifíquese para votar. Contestar como... Cancelar Imad T. Harish Kumar Hace 10 años I have followed the steps but when I try to access the url "http://localhost:8080/c/portal/saml/metadata" I got "Internal Server Error"Any suggestions ? Por favor identifíquese para votar. Contestar como... Cancelar Anup Arya Imad T. Hace 9 años Has it worked for you, i am getting the following errors " Unable to process SAML request "when i try to access the URL http://localhost:8080/c/portal/saml/metadata, in the logs the error is "Credential is Required" Por favor identifíquese para votar. Contestar como... Cancelar
Harish Kumar Mika Koivisto Hace 11 años I have followed the steps to setup liferay as idp but when I try to access http://localhost:8080/c/portal/saml/metadataIts redirecting me to home page instead of displaying metadata. Por favor identifíquese para votar. Contestar como... Cancelar Steven Zhao Harish Kumar Hace 11 años Did you login to Liferay before accessing the page? The URL pointed to a private page I believe Por favor identifíquese para votar. Contestar como... Cancelar Aaron Weikle Steven Zhao Hace 11 años I followed these steps to a T and I keep getting:Error [KeyStoreManagerImpl:122] Unable to load Keystorejava.io.IOException: Keystore was tampered with, or password was incorrectI have checked numerous times to make sure all information in my portal-ext.properties file is correct and it is. So not sure why I am getting this error. Por favor identifíquese para votar. Contestar como... Cancelar Imad T. Harish Kumar Hace 10 años I have followed the steps but when I try to access the url "http://localhost:8080/c/portal/saml/metadata" I got "Internal Server Error"Any suggestions ? Por favor identifíquese para votar. Contestar como... Cancelar Anup Arya Imad T. Hace 9 años Has it worked for you, i am getting the following errors " Unable to process SAML request "when i try to access the URL http://localhost:8080/c/portal/saml/metadata, in the logs the error is "Credential is Required" Por favor identifíquese para votar. Contestar como... Cancelar
Steven Zhao Harish Kumar Hace 11 años Did you login to Liferay before accessing the page? The URL pointed to a private page I believe Por favor identifíquese para votar. Contestar como... Cancelar Aaron Weikle Steven Zhao Hace 11 años I followed these steps to a T and I keep getting:Error [KeyStoreManagerImpl:122] Unable to load Keystorejava.io.IOException: Keystore was tampered with, or password was incorrectI have checked numerous times to make sure all information in my portal-ext.properties file is correct and it is. So not sure why I am getting this error. Por favor identifíquese para votar. Contestar como... Cancelar
Aaron Weikle Steven Zhao Hace 11 años I followed these steps to a T and I keep getting:Error [KeyStoreManagerImpl:122] Unable to load Keystorejava.io.IOException: Keystore was tampered with, or password was incorrectI have checked numerous times to make sure all information in my portal-ext.properties file is correct and it is. So not sure why I am getting this error. Por favor identifíquese para votar. Contestar como... Cancelar
Imad T. Harish Kumar Hace 10 años I have followed the steps but when I try to access the url "http://localhost:8080/c/portal/saml/metadata" I got "Internal Server Error"Any suggestions ? Por favor identifíquese para votar. Contestar como... Cancelar Anup Arya Imad T. Hace 9 años Has it worked for you, i am getting the following errors " Unable to process SAML request "when i try to access the URL http://localhost:8080/c/portal/saml/metadata, in the logs the error is "Credential is Required" Por favor identifíquese para votar. Contestar como... Cancelar
Anup Arya Imad T. Hace 9 años Has it worked for you, i am getting the following errors " Unable to process SAML request "when i try to access the URL http://localhost:8080/c/portal/saml/metadata, in the logs the error is "Credential is Required" Por favor identifíquese para votar. Contestar como... Cancelar
Venkatesh Prasad Hace 11 años how do i access the source code for SAML portlet plugin? Por favor identifíquese para votar. Contestar como... Cancelar
Al Faller Hace 11 años HI, Thanks for the plugin - in Service Provider mode, is it capable of getting a user's groups from attributes? I am an EE user, and am potentially interested in using this plugin.Thanks,Al Por favor identifíquese para votar. Contestar como... Cancelar
haikel thamri Hace 10 años I need it for WSRP (remote portlets) - How to make it work? does liferay support that? Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto haikel thamri Hace 10 años Haikel, we don't currently support SAML with WSRP although it is on our future roadmap. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I went through the setup steps you outlined, but I am getting a null pointer exception. The authnRequest is coming back null after this line in: com.liferay.saml.profile.WebSsoProfileImpl:AuthnRequest authnRequest = samlMessageContext.getInboundSAMLMessage();I am trying to debug why and have this question: do I need to generate a keystore.js from the command line AS WELL AS in the SAML UI? They both seem to be doing the same exactly thing so do I need to do both of them or just from the command line?Thank you. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años If you got UI then use it only because using both will just make a mess. Make sure your Idp knows about your SP and vise versa. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años MIka,Thanks for the quick response.Just to be clear, I am talking about the form to generate a Certificate and Private Key in the General tab of the SAML portlet. I ask because you didn't mention that in your initial instructions, and it seems to require the same inputs as the command line you mentioned. I did submitted the form, but will that cause a mess if I also specify the jeystore.jks file in portal-ext.properties as you said?Thanks again,ClintThank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años When this blog post was written there was no UI. The UI writes to the same keystore specified in the portal-ext.properties if FileSystemKeyStoreManagerImpl is in use and it is the default one for backwards compatibility. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 8 años HI Mika,Please reply as i am stuck on this since a long time.besides that does liferay support http redirect binding.in my case the request is coming from the Service provider in the query string with request method as GET. can you please confirm.Thanks & RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Kapil Burange Hace 7 años Hi Mika,Quite an informative blog, i am able to setup the idp sso successfully, just quick query in the saml response the signature tag is not getting generated, besides that all the other tags are generated correctly.Please let me know if any other property needs to be added in the saml configuration to add the signature in the saml response.RegardsDivya Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto haikel thamri Hace 10 años Haikel, we don't currently support SAML with WSRP although it is on our future roadmap. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I went through the setup steps you outlined, but I am getting a null pointer exception. The authnRequest is coming back null after this line in: com.liferay.saml.profile.WebSsoProfileImpl:AuthnRequest authnRequest = samlMessageContext.getInboundSAMLMessage();I am trying to debug why and have this question: do I need to generate a keystore.js from the command line AS WELL AS in the SAML UI? They both seem to be doing the same exactly thing so do I need to do both of them or just from the command line?Thank you. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años If you got UI then use it only because using both will just make a mess. Make sure your Idp knows about your SP and vise versa. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años MIka,Thanks for the quick response.Just to be clear, I am talking about the form to generate a Certificate and Private Key in the General tab of the SAML portlet. I ask because you didn't mention that in your initial instructions, and it seems to require the same inputs as the command line you mentioned. I did submitted the form, but will that cause a mess if I also specify the jeystore.jks file in portal-ext.properties as you said?Thanks again,ClintThank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años When this blog post was written there was no UI. The UI writes to the same keystore specified in the portal-ext.properties if FileSystemKeyStoreManagerImpl is in use and it is the default one for backwards compatibility. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar Kapil Burange Mika Koivisto Hace 8 años HI Mika,Please reply as i am stuck on this since a long time.besides that does liferay support http redirect binding.in my case the request is coming from the Service provider in the query string with request method as GET. can you please confirm.Thanks & RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Kapil Burange Hace 7 años Hi Mika,Quite an informative blog, i am able to setup the idp sso successfully, just quick query in the saml response the signature tag is not getting generated, besides that all the other tags are generated correctly.Please let me know if any other property needs to be added in the saml configuration to add the signature in the saml response.RegardsDivya Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años Mika,I went through the setup steps you outlined, but I am getting a null pointer exception. The authnRequest is coming back null after this line in: com.liferay.saml.profile.WebSsoProfileImpl:AuthnRequest authnRequest = samlMessageContext.getInboundSAMLMessage();I am trying to debug why and have this question: do I need to generate a keystore.js from the command line AS WELL AS in the SAML UI? They both seem to be doing the same exactly thing so do I need to do both of them or just from the command line?Thank you. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años If you got UI then use it only because using both will just make a mess. Make sure your Idp knows about your SP and vise versa. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años MIka,Thanks for the quick response.Just to be clear, I am talking about the form to generate a Certificate and Private Key in the General tab of the SAML portlet. I ask because you didn't mention that in your initial instructions, and it seems to require the same inputs as the command line you mentioned. I did submitted the form, but will that cause a mess if I also specify the jeystore.jks file in portal-ext.properties as you said?Thanks again,ClintThank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años When this blog post was written there was no UI. The UI writes to the same keystore specified in the portal-ext.properties if FileSystemKeyStoreManagerImpl is in use and it is the default one for backwards compatibility. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años If you got UI then use it only because using both will just make a mess. Make sure your Idp knows about your SP and vise versa. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años MIka,Thanks for the quick response.Just to be clear, I am talking about the form to generate a Certificate and Private Key in the General tab of the SAML portlet. I ask because you didn't mention that in your initial instructions, and it seems to require the same inputs as the command line you mentioned. I did submitted the form, but will that cause a mess if I also specify the jeystore.jks file in portal-ext.properties as you said?Thanks again,ClintThank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años When this blog post was written there was no UI. The UI writes to the same keystore specified in the portal-ext.properties if FileSystemKeyStoreManagerImpl is in use and it is the default one for backwards compatibility. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años MIka,Thanks for the quick response.Just to be clear, I am talking about the form to generate a Certificate and Private Key in the General tab of the SAML portlet. I ask because you didn't mention that in your initial instructions, and it seems to require the same inputs as the command line you mentioned. I did submitted the form, but will that cause a mess if I also specify the jeystore.jks file in portal-ext.properties as you said?Thanks again,ClintThank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años When this blog post was written there was no UI. The UI writes to the same keystore specified in the portal-ext.properties if FileSystemKeyStoreManagerImpl is in use and it is the default one for backwards compatibility. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años When this blog post was written there was no UI. The UI writes to the same keystore specified in the portal-ext.properties if FileSystemKeyStoreManagerImpl is in use and it is the default one for backwards compatibility. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años Thanks Mika, that helps.After submitting the form, restarting Tomcat and refreshing the page:com.liferay.saml.SamlException: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:127) at com.liferay.saml.profile.WebSsoProfileUtil.processAuthnRequest(WebSsoProfileUtil.java:36)2Am I missing a parameter somewhere?Here's the saml props from my portal-ext.properties:saml.enabled=truesaml.role=idpsaml.entity.id=liferaysamlidpdemosaml.require.ssl=falsesaml.sign.metadata=truesaml.idp.authn.request.signature.required=truesaml.keystore.path=${liferay.home}/SAML-DATA/keystore.jkssaml.keystore.password=liferaysaml.keystore.type=jkssaml.keystore.credential.password[liferaysamlidpdemo]=liferaysaml.metadata.paths=${liferay.home}/SAML-DATA/salesforce-metadata.xmlThanks,Clint Por favor identifíquese para votar. Contestar como... Cancelar
Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Do you know when was the UI introduced? I'm on 3.1.20 ee ga2 and I don't have UI. I have configured SAML sso between 2 instances of LR (IdP and SP) and it seems to be working well to an extent (can't seem to get custom user fields working) but I can't even see SAML portlet anywhere in the portal, except for in portal properties in system administration. Now wondering if my installion is ok or If I'm missing something.Thanks Ash Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Ash Gupta Hace 10 años The UI should be included in the next release. When it will be made generally available I don't know the latest should be with 6.2 EE. Por favor identifíquese para votar. Contestar como... Cancelar Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar
Ash Gupta Mika Koivisto Hace 10 años Hi Mika,Thanks for the quick reply! Can I also draw your attention to another question I posted related to SAML here -https://www.liferay.com/community/forums/-/message_boards/view_message/28886644Apologies for crossposting! Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años Mika,I apologize in advance for cross-posting, but I wanted to ask an urgent question about this:Original link here:https://www.liferay.com/web/armin.dahncke/blog/-/blogs/setting-up-liferay-portal-6-1-ee-as-a-spWe have a client who needs to implement Liferay as an SP for BOTH user login *and application login. We are already implementing SAML plugin for user login. The Application login will be Liferay(SP) logging in to the IDP as an application user, not as a specific user so we need both. Does the SAML plugin have any support for this out of the box?If not, would we need a BOTH a SAML metadata IDP XML for the user login *AND another SAML metadata IDP XML for the application login?Is this completely out of the use case of SAML to do an application login? Please tell me we are not the first ones to be asked to use SAML to do this?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años Well it depends what you mean by application login. We don't support ECP profile yet which is something you'd need for example to do SAML based authentication to WSRP. You could use JAAS with SAML but that depends on your use case whether that works or not. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I just received more clarification. Does the SAML portlet support doing an AttributeQuery and getting a specific attribute from the IDP?Thanks Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años AttributeQuery is not supported at this point. You can include attributes in the Response only. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años ughh... Thanks. General question to gage difficulty: can you give me a rough estimate on how long you would expect a good java java developer (with no knowledge of this plugin and limited knowledge of SAML) to get in and make those changes to support AttributeQuery and are there any external roadblocks that would prevent us from adding that? Again, I appreciate your help. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años I took a quick look at the spec to refresh my memory on AttributeQuery and it seems that implementing just that part shouldn't be all that difficult. I'd say that a week should be more than enough for someone that knows SAML. I don't see any roadblocks from adding it and the plugin is fairly extendable. If you don't mind sharing more details on your use case I'd be interested in hearing. You can do that privately by emailing me directly. My email is firstname.lastname at liferay.com Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Mika Koivisto Hace 10 años Thanks Mika. I may take you up on that when we get closer to implementation.We have another issue related to setting up an IDP:18:25:44,140 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Intended message destination endpoint: https://idp.sample.org/c/portal/saml/sso18:25:44,141 DEBUG [http-bio-8080-exec-14][BaseSAMLMessageDecoder:46] Actual message receiver endpoint: http://idp.sample.org/c/portal/saml/ssoBoth SP and IDP are Liferay. When both servers were only listening on HTTP, the connection worked fine, but we just enabled https on the servers and now we are getting this error. We did set saml.require.ssl=true, but we are still seeing the same error. What do we need to do to get past this error?Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Clint Wilde Clint Wilde Hace 10 años Hi Mika,We are also getting this Exception in the logs of the IDP. They don't appear to be related:Caused by: org.opensaml.ws.message.decoder.MessageDecodingException: No SAMLRequest or SAMLResponse query path parameter, invalid SAML 2 HTTP Redirect message at org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder.doDecode(HTTPRedirectDeflateDecoder.java:98) at org.opensaml.ws.message.decoder.BaseMessageDecoder.decode(BaseMessageDecoder.java:79) at org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder.decode(BaseSAML2MessageDecoder.java:70) at com.liferay.saml.profile.BaseProfile.decodeSamlMessage(BaseProfile.java:73) at com.liferay.saml.profile.WebSsoProfileImpl.decodeAuthnRequest(WebSsoProfileImpl.java:284) at com.liferay.saml.profile.WebSsoProfileImpl.doProcessAuthnRequest(WebSsoProfileImpl.java:309) at com.liferay.saml.profile.WebSsoProfileImpl.processAuthnRequest(WebSsoProfileImpl.java:119)Do you have any idea what is causing this? Any tips would be very appreciated!Thank you! Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años This could be caused by someone accessing /c/portal/saml/sso or /c/portal/saml/acs without correct parameters. Por favor identifíquese para votar. Contestar como... Cancelar Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar
Ajit Gauli Mika Koivisto Hace 10 años Hi Mika, I am following up your conversation with Clint Wilde. We work in the same team. Now we are getting the response back from IDP, I can see NameID in SAML reponse.<NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">YjY3ODliOGUtNGUwMy00MGIwLWEyYmYtZWE5MTk1OTUzYWE1JjNCRTk4MzIwLTA0RkEtNDQ1Ny04MTBFLTgwQkM0MTlGNUE4NA==</NameID>But still getting this exception on our side (we are SP):00:01:52,509 ERROR [http-bio-8080-exec-30][status_jsp:665] com.liferay.saml.SamlException: Name ID not present in subjectcom.liferay.saml.SamlException: Name ID not present in subject at com.liferay.saml.profile.WebSsoProfileImpl.doProcessResponse(WebSsoProfileImpl.java:486)Your insight would be much appreciated. Thanks in advance. Por favor identifíquese para votar. Contestar como... Cancelar Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Ajit Gauli Hace 10 años First of all Liferay doesn't support transient NameID. Secondly the SubjectConfirmationMethod has to be urn:oasis:names:tc:SAML:2.0:cm:bearer in order for the subject to be accepted. Por favor identifíquese para votar. Contestar como... Cancelar
Salman Jan Clint Wilde Hace 9 años Did u get this error resolved? If so plz advise. Por favor identifíquese para votar. Contestar como... Cancelar
Mika Koivisto Clint Wilde Hace 10 años Make sure you are consuming the metadata from https url otherwise it will generate the urls with http. Por favor identifíquese para votar. Contestar como... Cancelar
Kapil Burange Mika Koivisto Hace 8 años HI Mika,Please reply as i am stuck on this since a long time.besides that does liferay support http redirect binding.in my case the request is coming from the Service provider in the query string with request method as GET. can you please confirm.Thanks & RegardsKapil Por favor identifíquese para votar. Contestar como... Cancelar divya goyal Kapil Burange Hace 7 años Hi Mika,Quite an informative blog, i am able to setup the idp sso successfully, just quick query in the saml response the signature tag is not getting generated, besides that all the other tags are generated correctly.Please let me know if any other property needs to be added in the saml configuration to add the signature in the saml response.RegardsDivya Por favor identifíquese para votar. Contestar como... Cancelar
divya goyal Kapil Burange Hace 7 años Hi Mika,Quite an informative blog, i am able to setup the idp sso successfully, just quick query in the saml response the signature tag is not getting generated, besides that all the other tags are generated correctly.Please let me know if any other property needs to be added in the saml configuration to add the signature in the saml response.RegardsDivya Por favor identifíquese para votar. Contestar como... Cancelar