validate certificate of service provider

John Dennis jdennis at redhat.com
Tue Jul 2 08:54:49 EDT 2019


On 7/2/19 2:09 AM, Martin Lunze wrote:
> Hi together,
> 
> i am monitoring the validity of the certificates of all our local 
> service providers.
> 
> If one of these will expire, i tell the administrator to exchange this 
> certifiacte, but not all of them will do so quickly enough.
> 
> Now i have recognized that the login is still possible for some sps with 
> expired certificats.
> Thats possible because they didn't sign or can't sign their 
> authentication requests and the idp will accept the request also without 
> a signature.
> 
> It seems that the idp also has no problem to encrypt the authentication 
> response with a outdated certificate.
> 
> Now i am looking for a solution to prevent login for sps with invalid 
> certificates inside their metadata.
> But i am a bit carefully with turning on a restriction to force all 
> requests have to be signed, because maybe not all sps can do so.
> 
> Another idea is to add a condition to the metadataprovider which will 
> accept only metadata with valid certificates and remove all other.
> Or how about to add a interceptor which stops login if encryption is not 
> possible with a valid ceritficate.
> 
> But i did not find an idea in the documentation how to implement this.
> 
> Maybe you have any hint for me?
> I am glade to hear from you.

There is no such thing as certificate validation for the signing and 
encryption keys contained in metdadata. Only the key material contained 
in the X509 certificates is relevant not the rest of the PKI ancillary 
information. The X509 format was selected only as a convenience 
container for the key material. You either trust the metadata containing 
those keys or you don't. Validating the signature on the metadata is 
another story altogether.


-- 
John Dennis


More information about the users mailing list