validate certificate of service provider

Martin Lunze martin.lunze at tu-dresden.de
Tue Jul 2 02:09:01 EDT 2019


Hi together,

i am monitoring the validity of the certificates of all our local 
service providers.

If one of these will expire, i tell the administrator to exchange this 
certifiacte, but not all of them will do so quickly enough.

Now i have recognized that the login is still possible for some sps with 
expired certificats.
Thats possible because they didn't sign or can't sign their 
authentication requests and the idp will accept the request also without 
a signature.

It seems that the idp also has no problem to encrypt the authentication 
response with a outdated certificate.

Now i am looking for a solution to prevent login for sps with invalid 
certificates inside their metadata.
But i am a bit carefully with turning on a restriction to force all 
requests have to be signed, because maybe not all sps can do so.

Another idea is to add a condition to the metadataprovider which will 
accept only metadata with valid certificates and remove all other.
Or how about to add a interceptor which stops login if encryption is not 
possible with a valid ceritficate.

But i did not find an idea in the documentation how to implement this.

Maybe you have any hint for me?
I am glade to hear from you.

Thanks.
Martin

-- 

Martin Lunze
IT-Systemadministrator

Technische Universität Dresden
Zentrum für Informationsdienste und Hochleistungsrechnen (ZIH)
Operative Prozesse und Systeme (OPS)
01062 Dresden

Tel.: +49 (351) 463-35881
E-Mail: martin.lunze at tu-dresden.de


-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5742 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://shibboleth.net/pipermail/users/attachments/20190702/5fa56a14/attachment.p7s>


More information about the users mailing list