beta oidc extension

Jim Fox fox at washington.edu
Fri Nov 16 14:43:25 EST 2018


This is a first look at the beta oidc extension.

The instructions were easy to follow.

One thing regarding the issuer setting in idp-oidc.properties:  Instructions say it has to be https scheme, host, .. 
However, my dev idp has an entity id of "urn:mace:incommon:washington.edu:dev".  This seemd to work ok.

Using an apache client with mod_auth_openidc, when I asked for an "id_token" response everything went OK.  However, when I asked for "code" the userinfo request caused an Exception:  "Storage object was not present in session"


ERROR [net.shibboleth.idp.session.impl.StorageBackedSessionManager:809] - Exception while querying for session ID 08c2ad259333354bf747f82d0598a901017af9363375a2f574d8e8ade8ab14b8
java.io.IOException: net.shibboleth.utilities.java.support.logic.ConstraintViolationException: Storage object was not present in session
         at org.opensaml.storage.AbstractMapBackedStorageService.readImpl(AbstractMapBackedStorageService.java:307)
         at org.opensaml.storage.AbstractMapBackedStorageService.read(AbstractMapBackedStorageService.java:113)
         at net.shibboleth.idp.session.impl.StorageBackedSessionManager.lookupBySessionId(StorageBackedSessionManager.java:801)
         at net.shibboleth.idp.session.impl.StorageBackedSessionManager.resolve(StorageBackedSessionManager.java:592)
         at net.shibboleth.idp.session.impl.StorageBackedSessionManager.resolveSingle(StorageBackedSessionManager.java:617)
         at net.shibboleth.idp.session.impl.StorageBackedSessionManager.resolveSingle(StorageBackedSessionManager.java:110)
         at org.geant.idpextension.oidc.profile.impl.ValidateUserPresence.doExecute(ValidateUserPresence.java:101)
         at org.opensaml.profile.action.AbstractProfileAction.execute(AbstractProfileAction.java:117)
         ...


lines immediately above that in the log show:

DEBUG [org.geant.idpextension.oidc.profile.impl.ValidateAccessToken:103] - Profile Action ValidateAccessToken: access token unwrapped {"sub":"fox","cnsntd_claims":["email","givenName","subject","surname"],"cnsntbl_claims":["email","givenName","subject","surname"],"iss":"urn:mace:incommon:washington.edu:dev","clid":"urizen","prncpl":"fox","type":"at","nonce":"menUSMG3Kymnywq77dWAy0a7nfwnZMc_8b5212w26zY","sid":"08c2ad259333354bf747f82d0598a901017af9363375a2f574d8e8ade8ab14b8","auth_time":1542388994,"scope":"openid profile email eduperson_scoped_affiliation edumember_is_member_of","redirect_uri":"https:\/\/urizen.s.uw.edu\/oidctest\/redirect_uri","exp":1542396460,"iat":1542395860,"jti":"_aba0de8366481951d4e2d06fff728605"}
DEBUG [org.geant.idpextension.oidc.profile.impl.ValidateAccessToken:120] - Profile Action ValidateAccessToken: access token _aba0de8366481951d4e2d06fff728605 validated

Lines previous to that (for the initial login) also indicated that same session ID.

I didn't do any storage configuration as part of the oidc installation.  And I don't see this error with any other shib (SAML) operations.

Jim



More information about the users mailing list