Problem configuring and IdP to support anonymous relying parties
Jon Warbrick
jw35 at cam.ac.uk
Wed Sep 14 16:38:49 BST 2011
On Thu, 1 Sep 2011, Cantor, Scott wrote:
> Possible guess...define a custom security policy and link that to the
> profile handler in the Anonymous block?
Ok, this isn't turning out to be as easy as I'd hoped ('this', for anyone
who doesn't know, is configuring Shib 2.3.3 to emulate the effect of
setting 'allowAnonymousProviders="true"' in the <IdPConfig> element of a
Shib 1.3 config).
So far I've added <rp:ProfileConfiguration> blocks for xsi:types
saml:ShibbolethSSOProfile, saml:SAML1AttributeQueryProfile and
saml:SAML1ArtifactResolutionProfile to the <rp:AnonymousRelyingParty>
block in relying-party.xml and then used the securityPolicyRef attribute
to link these to <security:SecurityPolicy> blocks with most of the
<security:Rule>s removed. Copy of relying-party.xml attached.
Authentication works, but subsequent attribute queries still
fail, still reporting "Authentication via client certificate failed".
However if I also remove most of the rules from the (default) security
policy used by the AttributeQueryProfile in the <rp:DefaultRelyingParty>
block then everything seems to work and attributes are returned. Careful
examination of the log records of these two cases (copies below) suggests
to me that the request message is always being validated against
DefaultRelyingParty rules before the software decides that it's actually
from an AnonymousRelyingParty.
Does that make any sense? Is it 'safe' to run with the rules removed for
DefaultRelyingParty (will attribute release keyed on entityID be safe, for
example)?
WithDefaultRelyingParty rules enabled:
16:10:16.540 - DEBUG
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:127]
- Looking up relying party configuration for
https://mnementh.csi.cam.ac.uk/shibboleth-xx
16:10:16.540 - DEBUG
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:133]
- No custom relying party configuration found for
https://mnementh.csi.cam.ac.uk/shibboleth-xx, looking up configuration
based on metadata groups.
16:10:16.541 - DEBUG
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:156]
- No custom or group-based relying party configuration found for
https://mnementh.csi.cam.ac.uk/shibboleth-xx. Using default relying party
configuration.
16:10:16.547 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:189]
- Forcing on-demand metadata provider refresh if necessary
16:10:16.548 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:601]
- Attempting to retrieve trusted names from cache using index:
[https://mnementh.csi.cam.ac.uk/shibboleth-xx,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:1.1:protocol,SIGNING]
16:10:16.548 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:604]
- Read lock over cache acquired
16:10:16.548 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:615]
- Read lock over cache released
16:10:16.549 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:618]
- Unable to retrieve trusted names from cache using index:
[https://mnementh.csi.cam.ac.uk/shibboleth-xx,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:1.1:protocol,SIGNING]
16:10:16.549 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:438]
- Attempting to retrieve trusted names for PKIX validation from metadata
for entity: https://mnementh.csi.cam.ac.uk/shibboleth-xx
16:10:16.549 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:672]
- Write lock over cache acquired
16:10:16.550 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:675]
- Added new PKIX info to entity cache with key:
[https://mnementh.csi.cam.ac.uk/shibboleth-xx,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:1.1:protocol,SIGNING]
16:10:16.550 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:678]
- Write lock over cache released
16:10:16.550 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:152]
- Forcing on-demand metadata provider refresh if necessary
16:10:16.550 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:531]
- Attempting to retrieve PKIX validation info from cache using index:
[https://mnementh.csi.cam.ac.uk/shibboleth-xx,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:1.1:protocol,SIGNING]
16:10:16.550 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:534]
- Read lock over cache acquired
16:10:16.551 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:545]
- Read lock over cache released
16:10:16.551 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:548]
- Unable to retrieve PKIX validation info from cache using index:
[https://mnementh.csi.cam.ac.uk/shibboleth-xx,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:1.1:protocol,SIGNING]
16:10:16.551 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:259]
- Attempting to retrieve PKIX validation info from metadata for entity:
https://mnementh.csi.cam.ac.uk/shibboleth-xx
16:10:16.551 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:631]
- Write lock over cache acquired
16:10:16.552 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:634]
- Added new PKIX info to entity cache with key:
[https://mnementh.csi.cam.ac.uk/shibboleth-xx,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:1.1:protocol,SIGNING]
16:10:16.552 - DEBUG
[edu.internet2.middleware.shibboleth.common.security.MetadataPKIXValidationInformationResolver:637]
- Write lock over cache released
16:10:16.552 - ERROR
[org.opensaml.ws.security.provider.ClientCertAuthRule:156] -
Authentication via client certificate failed for context presenter entity
ID https://mnementh.csi.cam.ac.uk/shibboleth-xx
16:10:16.557 - WARN
[edu.internet2.middleware.shibboleth.idp.profile.saml1.AttributeQueryProfileHandler:180]
- Message did not meet security requirements
org.opensaml.ws.security.SecurityPolicyException: Client certificate
authentication failed for context presenter entity ID at
org.opensaml.ws.security.provider.ClientCertAuthRule.doEvaluate(ClientCertAuthRule.java:158)
~[openws-1.4.2.jar:na]
[...traceback trimmed...]
16:10:16.559 - WARN
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:287]
- No metadata for relying party
https://mnementh.csi.cam.ac.uk/shibboleth-xx, treating party as anonymous
With DefaultRelyingPArty rules disabled:
16:13:54.245 - DEBUG
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:127]
- Looking up relying party configuration for
https://mnementh.csi.cam.ac.uk/shibboleth-xx
16:13:54.245 - DEBUG
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:133]
- No custom relying party configuration found for
https://mnementh.csi.cam.ac.uk/shibboleth-xx, looking up configuration
based on metadata groups.
16:13:54.246 - DEBUG
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:156]
- No custom or group-based relying party configuration found for
https://mnementh.csi.cam.ac.uk/shibboleth-xx. Using default relying party
configuration.
16:13:54.249 - DEBUG
[edu.internet2.middleware.shibboleth.idp.profile.saml1.AttributeQueryProfileHandler:166]
- Decoded request
16:13:54.250 - WARN
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:287]
- No metadata for relying party
https://mnementh.csi.cam.ac.uk/shibboleth-xx, treating party as anonymous
Jon.
--
Jon Warbrick
Information Systems Development, Computing Service, University of Cambridge
-------------- next part --------------
A non-text attachment was scrubbed...
Name: relying-party.xml
Type: application/xml
Size: 18609 bytes
Desc:
Url : http://shibboleth.net/pipermail/users/attachments/20110914/d3e433c8/attachment-0001.rdf
More information about the users
mailing list