Hi Tharindu,

When I tested this with single IS for SAML SSO (not the federated scenario)
everything worked fine for super tenant. I doubt this is related to the
federated scenario. Please have a look and let me know.

Thanks!

On Fri, Oct 2, 2015 at 8:52 PM, Tharindu Edirisinghe <tharin...@wso2.com>
wrote:

> Hi Nadeesha,
>
> For super tenant, sso.agent should be able to decrypt the encrypted saml
> assertion. However there was an issue [1] where for a tenant, when the
> tenant encrypts the SAML assertion from the public certificate of the
> client (i.e travelocity app), then sso.agent could not decrypt the
> assertion because in the code, the private key of travelocity's key store
> was not getting picked up because of the particular method called in open
> saml library. This was patched sometimes back for sso.agent 1.2 version but
> we need to check whether the same fix got correctly merged to higher
> versions (i.e 1.4). Ideally this should anyway work for super tenant, but
> we'll check the same scenario more and let you know.
>
> [1] https://wso2.org/jira/browse/IDENTITY-3186
>
> Regards,
> TharinduE
>
> On Fri, Oct 2, 2015 at 3:34 PM, Nadeesha Meegoda <nadees...@wso2.com>
> wrote:
>
>> Hi Darshana,
>>
>> Yes the response is encrypted. Sending the SAML sso trace attached with
>> the mail.
>>
>> @Ishara I used wso2carbon as the certificate alias since I'm using the
>> default key stores and also I'm testing this in super tenant mode.  Do I
>> need to import the public certificate of the private key of travelocity app
>> to IS keystores in super tenant mode?
>>
>> On Fri, Oct 2, 2015 at 3:19 PM, Ishara Karunarathna <isha...@wso2.com>
>> wrote:
>>
>>> Hi Nadeesha,
>>>
>>> On Fri, Oct 2, 2015 at 3:04 PM, Darshana Gunawardana <darsh...@wso2.com>
>>> wrote:
>>>
>>>> Hi Nadeesha,
>>>>
>>>> Have you checked whether the assertion is encrypted in the response IS
>>>> send back to travelocity app?
>>>>
>>>> And please provide the SSO Trace (save as a text file and attach in the
>>>> mail) for the whole flow.
>>>>
>>>> Thanks,
>>>> Darshana
>>>>
>>>> On Fri, Oct 2, 2015 at 2:53 PM, Nadeesha Meegoda <nadees...@wso2.com>
>>>> wrote:
>>>>
>>>>> Hi.
>>>>>
>>>>> I have configured the setup to Login to the Identity Server Using
>>>>> Another Identity Server as per the details in [1] in Super tenant mode.
>>>>> With the happy scenario according to the documentation this works fine. 
>>>>> But
>>>>> I have enabled some additional properties in IDP and SP used for IDP as
>>>>> following :
>>>>>
>>>>> *Properties enabled for Federated Authenticators* - SAML2 Web SSO
>>>>> Configuration
>>>>>
>>>>> 1. Enabled Assertion Encryption
>>>>> 2. Enable Assertion Signing
>>>>> 3. Enable Authentication Response Signing
>>>>>
>>>>> *Properties enabled fo SP used for IDP *
>>>>>
>>>>> 1. Enabled Assertion Encryption
>>>>> 2. Enabled Response Signing
>>>>>
>>>>> *Properties enabled fo SP used for travelocity app*
>>>>>
>>>>> 1. Enabled Assertion Encryption
>>>>>
>>>> What is the Certificate Alias you used here ?
>>> is that the public key in travelocity app ?
>>>
>>>> 2. Enabled Response Signing
>>>>>
>>>>> In the travelocity.properties file also I have enabled Assertion
>>>>> Encryption,Response signing and Assertion signing. I have already imported
>>>>> the Identity Provider Public Certificate to IDP
>>>>>
>>>>> When I'm signing in to travelocity.com I get Unable to decrypt the
>>>>> SAML Assertion error and error in [2] in tomcat.
>>>>>
>>>>> Note that only enabling "assertion signing" in IDP I was successfully
>>>>> able to login and no error was displayed. When I enabled the Assertion
>>>>> Encryption this error occurred. Why is this error occurred when I enable
>>>>> this property as mentioned above?
>>>>>
>>>>> Any help regarding this is highly appreciated!
>>>>>
>>>>>
>>>>>
>>>>> [1] -
>>>>> https://docs.wso2.com/pages/viewpage.action?title=Login%2Bto%2Bthe%2BIdentity%2BServer%2BUsing%2BAnother%2BIdentity%2BServer&spaceKey=IS510
>>>>>
>>>>> [2] - Oct 02, 2015 2:10:47 PM
>>>>> org.wso2.carbon.identity.sso.agent.SSOAgentFilter doFilter
>>>>> SEVERE: An error has occurred
>>>>> org.wso2.carbon.identity.sso.agent.exception.SSOAgentException: Unable
>>>>> to decrypt the SAML Assertion
>>>>>         at
>>>>> org.wso2.carbon.identity.sso.agent.saml.SAML2SSOManager.processSSOResponse(SAML2SSOManager.java:254)
>>>>>         at
>>>>> org.wso2.carbon.identity.sso.agent.saml.SAML2SSOManager.processResponse(SAML2SSOManager.java:198)
>>>>>         at
>>>>> org.wso2.carbon.identity.sso.agent.SSOAgentFilter.doFilter(SSOAgentFilter.java:89)
>>>>>         at
>>>>> org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
>>>>>         at
>>>>> org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
>>>>>         at
>>>>> org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:220)
>>>>>         at
>>>>> org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:122)
>>>>>         at
>>>>> org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:505)
>>>>>         at
>>>>> org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:170)
>>>>>         at
>>>>> org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
>>>>>         at
>>>>> org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:956)
>>>>>         at
>>>>> org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
>>>>>         at
>>>>> org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:423)
>>>>>         at
>>>>> org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1079)
>>>>>         at
>>>>> org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:625)
>>>>>         at
>>>>> org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:318)
>>>>>         at
>>>>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
>>>>>         at
>>>>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
>>>>>         at
>>>>> org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
>>>>>         at java.lang.Thread.run(Thread.java:745)
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Thanks!
>>>>> --
>>>>> *Nadeesha Meegoda*
>>>>> Software Engineer - QA
>>>>> WSO2 Inc.; http://wso2.com
>>>>> lean.enterprise.middleware
>>>>> email : nadees...@wso2.com
>>>>> mobile: +94783639540
>>>>> <%2B94%2077%202273555>
>>>>>
>>>>
>>>>
>>>>
>>>> --
>>>> Regards,
>>>>
>>>>
>>>> *Darshana Gunawardana*Senior Software Engineer
>>>> WSO2 Inc.; http://wso2.com
>>>>
>>>> *E-mail: darsh...@wso2.com <darsh...@wso2.com>*
>>>> *Mobile: +94718566859 <%2B94718566859>*Lean . Enterprise . Middleware
>>>>
>>>
>>>
>>>
>>> --
>>> Ishara Karunarathna
>>> Senior Software Engineer
>>> WSO2 Inc. - lean . enterprise . middleware |  wso2.com
>>>
>>> email: isha...@wso2.com,   blog: isharaaruna.blogspot.com,   mobile:
>>> +94717996791
>>>
>>
>>
>>
>> --
>> *Nadeesha Meegoda*
>> Software Engineer - QA
>> WSO2 Inc.; http://wso2.com
>> lean.enterprise.middleware
>> email : nadees...@wso2.com
>> mobile: +94783639540
>> <%2B94%2077%202273555>
>>
>> _______________________________________________
>> Dev mailing list
>> Dev@wso2.org
>> http://wso2.org/cgi-bin/mailman/listinfo/dev
>>
>>
>
>
> --
>
> Tharindu Edirisinghe
> Software Engineer | WSO2 Inc
> Identity Server Team
> Blog : tharindue.blogspot.com
> mobile : +94 775 181586
>
>
>


-- 
*Nadeesha Meegoda*
Software Engineer - QA
WSO2 Inc.; http://wso2.com
lean.enterprise.middleware
email : nadees...@wso2.com
mobile: +94783639540
<%2B94%2077%202273555>
_______________________________________________
Dev mailing list
Dev@wso2.org
http://wso2.org/cgi-bin/mailman/listinfo/dev

Reply via email to