Hi Tharindi, Thank you for the explanation. I will change the mentioned configuration and check the scenario again.
On Fri, 3 Aug 2018, 17:34 Tharindu Edirisinghe, <[email protected]> wrote: > Hi Achini, > > If you are trying this flow just for testing purpose, a quick solution is > to turn off signature validation in SAML response and assertion using > following two properties in the SAML2SSOAuthenticator configuration in > authenticators.xml file. > > <Parameter > name="ResponseSignatureValidationEnabled">false</Parameter> > <Parameter > name="AssertionSignatureValidationEnabled">false</Parameter> > > By default above are commented out. > > If you need to enable the response and assertion signature validation and > get it to working, then set the above two properties to true and add the > following property as well. > > <Parameter name="IdPCertAlias">wso2carbon</Parameter> > > Here you need to give the certificate alias of the public certificate of > the signing entity, which should be IS itself in this case. (If it is a > different entity, then we need to import the certificate to the > wso2carbon.jks with some alias and provide that alias in above property. > > Thanks, > TharinduE > > On Thu, Aug 2, 2018 at 7:25 AM Achini Jayasena <[email protected]> wrote: > >> Hi All, >> >> Signature validation failed, occurred in following scenario. >> >> *Scenario:* IAM it self enable multi factor authentication (scenario 05) >> and sp creation from metadata url configurations. >> >> *Test steps:* >> Step 01: Create user >> Step 02: Create IDP (twitter) >> Step 03: Create SP for carbon server from metadata file url >> configurations (please find the metadata file attached here with) >> Step 04: Update Sp for enable MFA >> >> <?xml version="1.0" encoding="UTF-8"?><soapenv:Envelope >> xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" >> xmlns:xsd="http://org.apache.axis2/xsd" >> xmlns:xsd1="http://model.common.application.identity.carbon.wso2.org/xsd"> >> <soapenv:Header /> >> <soapenv:Body> >> <xsd:updateApplication> >> <!--Optional:--> >> <xsd:serviceProvider> >> <!--Optional:--> >> <xsd1:applicationID>${appID}</xsd1:applicationID> >> <xsd1:applicationName>${spname}</xsd1:applicationName> >> <xsd1:description>${spdescription}</xsd1:description> >> <xsd1:inboundAuthenticationConfig> >> <xsd1:inboundAuthenticationRequestConfigs> >> <xsd1:inboundAuthKey>${carbonServer}</xsd1:inboundAuthKey> >> <xsd1:inboundAuthType>samlsso</xsd1:inboundAuthType> >> >> <xsd1:inboundConfigType>standardAPP</xsd1:inboundConfigType> >> <xsd1:properties> >> <xsd1:confidential>false</xsd1:confidential> >> <xsd1:defaultValue xsd:nil="true" /> >> <xsd1:description xsd:nil="true" /> >> <xsd1:displayName xsd:nil="true" /> >> <xsd1:displayOrder>0</xsd1:displayOrder> >> <xsd1:name>attrConsumServiceIndex</xsd1:name> >> <xsd1:required>false</xsd1:required> >> <xsd1:type xsd:nil="true" /> >> <xsd1:value>${serviceIndex}</xsd1:value> >> </xsd1:properties> >> </xsd1:inboundAuthenticationRequestConfigs> >> <xsd1:inboundAuthenticationRequestConfigs> >> <xsd1:friendlyName xsd:nil="true" /> >> <xsd1:inboundAuthKey>${carbonServer}</xsd1:inboundAuthKey> >> <xsd1:inboundAuthType>openid</xsd1:inboundAuthType> >> >> <xsd1:inboundConfigType>standardAPP</xsd1:inboundConfigType> >> </xsd1:inboundAuthenticationRequestConfigs> >> <xsd1:inboundAuthenticationRequestConfigs> >> <xsd1:friendlyName xsd:nil="true" /> >> <xsd1:inboundAuthKey>${carbonServer}</xsd1:inboundAuthKey> >> <xsd1:inboundAuthType>passivests</xsd1:inboundAuthType> >> >> <xsd1:inboundConfigType>standardAPP</xsd1:inboundConfigType> >> </xsd1:inboundAuthenticationRequestConfigs> >> </xsd1:inboundAuthenticationConfig> >> <xsd1:inboundProvisioningConfig> >> <xsd1:provisioningEnabled>false</xsd1:provisioningEnabled> >> <xsd1:provisioningUserStore /> >> </xsd1:inboundProvisioningConfig> >> /** Configure Multi Steps */ >> <xsd1:localAndOutBoundAuthenticationConfig> >> <!--Optional:--> >> >> <xsd1:alwaysSendBackAuthenticatedListOfIdPs>false</xsd1:alwaysSendBackAuthenticatedListOfIdPs> >> <!--Zero or more repetitions:--> >> <xsd1:authenticationSteps> >> <!--Optional:--> >> <xsd1:attributeStep>true</xsd1:attributeStep> >> <xsd1:subjectStep>true</xsd1:subjectStep> >> <!--Zero or more repetitions:--> >> <!--Zero or more repetitions:--> >> <xsd1:localAuthenticatorConfigs> >> <!--Optional:--> >> <xsd1:displayName>basic</xsd1:displayName> >> <!--Optional:--> >> <xsd1:enabled>false</xsd1:enabled> >> <!--Optional:--> >> <xsd1:name>BasicAuthenticator</xsd1:name> >> <!--Zero or more repetitions:--> >> <!--Optional:--> >> <xsd1:valid>true</xsd1:valid> >> </xsd1:localAuthenticatorConfigs> >> <!--Optional:--> >> <xsd1:stepOrder>1</xsd1:stepOrder> >> <!--Optional:--> >> </xsd1:authenticationSteps> >> <xsd1:authenticationSteps> >> <!--Optional:--> >> <xsd1:attributeStep>false</xsd1:attributeStep> >> <xsd1:subjectStep>false</xsd1:subjectStep> >> <!--Zero or more repetitions:--> >> <xsd1:federatedIdentityProviders> >> <xsd1:defaultAuthenticatorConfig> >> <xsd1:alais /> >> <xsd1:certificate /> >> <xsd1:claimConfig /> >> <xsd1:displayName>${idpname}</xsd1:displayName> >> <xsd1:enabled>false</xsd1:enabled> >> <xsd1:name>TwitterAuthenticator</xsd1:name> >> <xsd1:valid>true</xsd1:valid> >> </xsd1:defaultAuthenticatorConfig> >> <!--Zero or more repetitions:--> >> <xsd1:federatedAuthenticatorConfigs> >> <xsd1:displayName>${idpname}</xsd1:displayName> >> <xsd1:enabled>false</xsd1:enabled> >> <xsd1:name>TwitterAuthenticator</xsd1:name> >> <xsd1:valid>true</xsd1:valid> >> </xsd1:federatedAuthenticatorConfigs> >> <!--Optional:--> >> >> <xsd1:identityProviderName>${idpname}</xsd1:identityProviderName> >> <xsd1:enable>false</xsd1:enable> >> <xsd1:primary>false</xsd1:primary> >> <xsd1:federationHub>false</xsd1:federationHub> >> </xsd1:federatedIdentityProviders> >> <!--Optional:--> >> <xsd1:stepOrder>2</xsd1:stepOrder> >> <!--Optional:--> >> </xsd1:authenticationSteps> >> <!--Optional:--> >> <xsd1:authenticationType>flow</xsd1:authenticationType> >> <xsd1:subjectClaimUri>id</xsd1:subjectClaimUri> >> </xsd1:localAndOutBoundAuthenticationConfig> >> <xsd1:outboundProvisioningConfig> >> <xsd1:provisionByRoleList xsd:nil="true" /> >> </xsd1:outboundProvisioningConfig> >> <xsd1:permissionAndRoleConfig> >> <xsd1:idpRoles /> >> </xsd1:permissionAndRoleConfig> >> <xsd1:saasApp>false</xsd1:saasApp> >> </xsd:serviceProvider> >> </xsd:updateApplication> >> </soapenv:Body></soapenv:Envelope> >> >> Step 04: Change <isHome>/repository/conf/security/authenticators.xml >> file, following tags as below. >> <Authenticator name="SAML2SSOAuthenticator" disabled="false"> >> <Priority>1</Priority> >> Step 05:Restart the carbon server >> Step 06: Do basic authenticate >> Step 07: Do twitter authenticate >> >> *Expected result:* >> Navigate to the IS home >> >> *Actual result:* >> >> Error log: >> >> [2018-08-02 06:35:45,738] WARN >> {org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler} >> - Subject claim could not be found amongst service provider mapped >> unfiltered local claims >> [2018-08-02 06:35:45,739] WARN >> {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultStepBasedSequenceHandler} >> - Subject claim could not be found. Defaulting to Name Identifier. >> [2018-08-02 06:35:49,612] ERROR >> {org.wso2.carbon.identity.authenticator.saml2.sso.SAML2SSOAuthenticator} - >> SAML Response is not signed or response not available. Authentication >> process will be terminated. >> [2018-08-02 06:35:49,613] ERROR >> {org.wso2.carbon.identity.authenticator.saml2.sso.SAML2SSOAuthenticator} - >> Authentication Request is rejected. Signature validation failed. >> [2018-08-02 06:35:49,615] WARN >> {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} - Failed >> Administrator login attempt 'admin[-1234]' at [2018-08-02 06:35:49,615+0530] >> [2018-08-02 06:35:49,637] ERROR >> {org.wso2.carbon.identity.authenticator.saml2.sso.ui.authenticator.SAML2SSOUIAuthenticator} >> - Authentication failed. >> >> >> >> >> >> >> It seems like the certificate is not valid. Please find the certificate >> .jks file attached here with which available in the >> <ishome>/repository/resources/sceurity. >> >> Anyone have an idea what would be the reason for the issue. >> >> >> *Thanks & Best Regards!* >> >> *Achini Jayasena* >> *Software Engineer - QA | WSO2* >> >> Email: [email protected] >> Mobile: +943 882 897 >> >> [image: http://wso2.com/signature] <http://wso2.com/signature> >> > > > -- > > Tharindu Edirisinghe > Associate Technical Lead | WSO2 Inc > Platform Security Team > Blog : http://tharindue.blogspot.com > mobile : +94 775181586 >
_______________________________________________ Dev mailing list [email protected] http://wso2.org/cgi-bin/mailman/listinfo/dev
