El 22/07/13 08:34, Oliver Wulff escribió:>
> No, the certificate you see as part of the SSL handshake is different.
>
> You see the IDP certificate here:
> https://186.33.232.65/FederationMetadata/2007-06/FederationMetadata.xml
>
> RoleDescriptor->KeyDescriptor->KeyInfo->X509Data
>
>

Apparently the SSL certificate used for HTTPS is the same self-signed certificate in the Federation metadata XML (the exported certificate from the browser has the same text as the FederationMetadata.xml XML portion).

I have imported it in my stsstore.jks creating a text file with the XML portion.

Keytool shows this as well as other keys.
----
keytool -list -keystore stsstore.jks -storepass stsspass

myidpkey, 23/07/2013, trustedCertEntry,
Huella Digital de Certificado (SHA1): 0A:A0:F2:34:99:92:92:CF:6C:3F:09:99:5F:33:CD:FD:2A:DC:ED:53
----

(SHA1 matches the one shown by the browser.)

I'm getting HTTP 401 - Authentication Failed: Security token issuer not trusted

So I looked at fediz_config.xml

<trustedIssuers>
<issuer subject=".*CN=www.sts.com.*"
        certificateValidation="ChainTrust"
        name="DoubleItSTSIssuer" />
</trustedIssuers>

Do I have to change that? And how can I find out the info from the certificate? The IDP is using a self-signed certificate. So the issuer common name (CN) is "WIN-6LS98RP43K9", the certificate is issued to the same CN "WIN-6LS98RP43K9".

The documentation seems to be clear

There are two ways to configure a trusted issuer (IDP). Either you configure the subject name and the CA(s) who signed the certificate of the IDP (certificateValidation=ChainTrust) or you configure the certificate of the IDP and the CA(s) who signed it (certificateValidation=PeerTrust)

I just don't know enough about certificates.

I tried

<issuer subject="WIN-6LS98RP43K9"
certificateValidation="ChainTrust"
name="WIN-6LS98RP43K9" />

and

<issuer subject=".*CN=186.33.232.65.*"
certificateValidation="ChainTrust"
name="WIN-6LS98RP43K9" />

but I'm not sure what I'm doing.

Thanks for any help.

Reply via email to