Access Denied

Tabitha O. Locklear tabithao.locklear at uncp.edu
Wed Aug 8 13:47:39 EDT 2018


Robert, I have tried your suggestions and I'm still getting the same response.
Access is denied.
Here is what I find in the logs.

2018-08-08 17:29:18,060 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:118] - Profile Action AddAttributeStatementToAssertion: Adding constructed AttributeStatement to Assertion _0919c27085387f5491745334edfb3b07 
2018-08-08 17:29:18,100 - DEBUG [net.shibboleth.idp.saml.profile.logic.DefaultNameIdentifierFormatStrategy:100] - Configuration specifies the following formats: []
2018-08-08 17:29:18,101 - DEBUG [net.shibboleth.idp.saml.profile.logic.DefaultNameIdentifierFormatStrategy:113] - Configuration did not specify any formats, relying on metadata alone
2018-08-08 17:29:18,201 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.DecorateDelegatedAssertion:585] - Found Assertion with AuthnStatement to decorate in outbound Response
2018-08-08 17:29:18,201 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.DecorateDelegatedAssertion:288] - Issuance of delegated was not indicated, skipping assertion decoration


-----Original Message-----
From: users <users-bounces at shibboleth.net> On Behalf Of Robert Bradley
Sent: Wednesday, August 08, 2018 8:13 AM
To: users at shibboleth.net
Subject: Re: Access Denied

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 07/08/18 19:49, Tabitha O. Locklear wrote:
> Back when we first created a login for our SP we used this 
> documentation.
> 
> 1.  have a deny policy to not release transient ID
> 
> 2.  new definition for username in resolver the username not as 
> string, but nameid
> 
> 3.  release this username to SP
> 
> 4. nameid's cannot be encrypted
> 
> 
> 
> 
> 
> In our Attribute-Filter.xml we have
> 
> STEP 1:
> 
> <afp:AttributeFilterPolicy id="releaseTransientId">
> 
> <afp:PolicyRequirementRule xsi:type="basic:NOT">
> 
> <basic:Rule xsi:type="basic:AttributeRequesterString"
> value="https://xxxx-stg.saasit.com/" />
> 
> </afp:PolicyRequirementRule>
> 
> <afp:AttributeRule attributeID="transientId">
> 
> <afp:PermitValueRule xsi:type="basic:ANY"/>
> 
> </afp:AttributeRule>
> 
> </afp:AttributeFilterPolicy>
> 
> 
> 
> STEP 2:
> 
> <resolver:AttributeDefinition id="Login" xsi:type="Simple"
> xmlns="urn:mace:shibboleth:2.0:resolver:ad"
> 
> sourceAttributeID="sAMAccountName">
> 
> <resolver:Dependency ref="myAD" />
> 
> <resolver:AttributeEncoder xsi:type="SAML1StringNameIdentifier"
> xmlns="urn:mace:shibboleth:2.0:attribute:encoder"
> 
> nameFormat="urn:oasis:names:tc:SAML:1.1:nameid-format:transient"
> />
> 
> <resolver:AttributeEncoder xsi:type="SAML2StringNameID"
> xmlns="urn:mace:shibboleth:2.0:attribute:encoder"
> 
> nameFormat="urn:oasis:names:tc:SAML:2.0:nameid-format:transient"
> />
> 
> </resolver:AttributeDefinition>
> 
> 
> 
> STEP 3:
> 
> <AttributeFilterPolicy id="releaseLoginToSAASIT">
> 
> <PolicyRequirementRule xsi:type="Requester"
> value="https://uncp-stg.saasit.com/" />
> 
> 
> 
> <AttributeRule attributeID="Login">
> 
> <PermitValueRule xsi:type="ANY" />
> 
> </AttributeRule>
> 
> </AttributeFilterPolicy>
> 
If that saasit.com entityID is what I think it is, you probably don't need any of the custom NameID stuff for this...

Instead, you should be able to release the Login attribute as a normal attribute (called sAMAccountName in this example) and configure HEAT to use that attribute as the login ID (https://help.ivanti.com/ht/help/en_US/ISM/2017/Content/Configure/Securi
ty/ADFS%20SAML.htm
has details on the cloud-side of this).  The attribute-resolver.xml then would look something like (in v3 syntax):

    <resolver:AttributeDefinition id="sAMAccountName"
xsi:type="ad:Simple" sourceAttributeID=id="sAMAccountName">
        <resolver:Dependency ref="myAD" />
        <resolver:AttributeEncoder xsi:type="enc:SAML2String"
name="urn:oid:1.2.840.113556.1.4.221" friendlyName="sAMAccountName"
encodeType="false" />
    </resolver:AttributeDefinition>

In the "provisioning attributes" configuration, LoginID would be mapped to "urn:oid:1.2.840.113556.1.4.221" (MS's OID for sAMAccountName) .

The attribute-filter.xml fragment would look like:

    <afp:AttributeFilterPolicy id="attributeFilterPolicyForUucpStgSaasit
">
        <afp:PolicyRequirementRule
xsi:type="basic:AttributeRequesterString"
value="https://uncp-stg.saasit.com/" />

        <afp:AttributeRule attributeID="sAMAccountName">
            <afp:PermitValueRule xsi:type="basic:ANY" />
        </afp:AttributeRule>
    </afp:AttributeFilterPolicy>

Lastly, the default signing algorithm used by HEAT is SHA-1.  You will either need to configure it to use SHA-256 in their Web interface or use relying-party.xml to override it:

    <bean id="SHA1SecurityConfig"
parent="shibboleth.DefaultSecurityConfiguration"

p:signatureSigningConfiguration-ref="shibboleth.SigningConfiguration.SHA
1"
/>
...
    <util:list id="shibboleth.RelyingPartyOverrides">
        <bean parent="RelyingPartyByName"
c:relyingPartyIds="#{{'https://uncp-stg.saasit.com/',
'https://uncp.saasit.com/'}}">
            <property name="profileConfigurations">
                <list>
                    <bean parent="SAML2.SSO"
p:securityConfiguration-ref="SHA1SecurityConfig"
p:signAssertions="true" />
                </list>
            </property>
        </bean>
...
    </util:list>

Hope this helps...

- --
Dr Robert Bradley
Identity and Access Management Team, IT Services, University of Oxford -----BEGIN PGP SIGNATURE-----
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=PSKD
-----END PGP SIGNATURE-----
--
For Consortium Member technical support, see https://wiki.shibboleth.net/confluence/x/coFAAg
To unsubscribe from this list send an email to users-unsubscribe at shibboleth.net


More information about the users mailing list