verifying security used by a new SP

Brent Putman putmanb at georgetown.edu
Thu Apr 18 14:34:10 EDT 2019


On 4/18/19 1:37 PM, Steven Carmody wrote:
>
>
> I take that to mean that the authN Request was signed, and that the
> IDP is not relying on the SP creating the TLS tunnel using the SPs
> private key -- am I right about that ?


Yes, there is a Redirect binding signature, and the logs indicated it
validated successfully. 

This is a front-channel binding request, so there of course isn't any
direct TLS channel between the SP and the IdP, b/c the browser is
sitting in the middle of the exchange.  So this can't be SP doing
clientTLS to the IdP, etc.


>
> Here's the actual request sent by the SP:


The SigAlg and Signature query params there indicate it is signed via
the Redirect binding, with RSA-SHA256.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20190418/c294731d/attachment.html>


More information about the users mailing list