configurer) {
return removeConfigurer(configurer);
}
@Override
protected void beforeInit() throws Exception {
//All configurers are initialized only once.
keyManager();
extendedMetadata();
metadataManager();
samlContextProvider();
samlProcessor();
authenticationProvider();
ssoProfileConsumer();
hokProfileConsumer();
ssoProfile();
ecpProfile();
hokProfile();
sloProfile();
logout();
sso();
tls();
metadataGenerator();
//make sure they're in the right order.
reorderConfigurers();
}
private void reorderConfigurers() {
//Order of configurers is established by the following stream.
Arrays.asList(
KeyManagerConfigurer.class,
ExtendedMetadataConfigurer.class,
MetadataManagerConfigurer.class,
AuthenticationProviderConfigurer.class,
SAMLContextProviderConfigurer.class,
SAMLProcessorConfigurer.class,
WebSSOProfileConsumerConfigurer.class,
WebSSOProfileHoKConsumerConfigurer.class,
WebSSOProfileConfigurer.class,
WebSSOProfileECPConfigurer.class,
WebSSOProfileHoKConfigurer.class,
SingleLogoutProfileConfigurer.class,
LogoutConfigurer.class,
SSOConfigurer.class,
TLSConfigurer.class,
MetadataGeneratorConfigurer.class)
.stream()
.map(this::removeConfigurerAdapter)
.forEach(this::getOrApply);
}
@Override
protected ServiceProviderSecurityConfigurerBeans performBuild() throws Exception {
//Some shared objects need to be registered as Spring Beans for proper Autowiring and initialization.
//Some shared objects need to be registered as Spring Bean with specific names, as they are autowired by other
//beans with name qualifiers.
KeyManager keyManager = getSharedObject(KeyManager.class);
registerBean(keyManager);
MetadataManager metadataManager = getSharedObject(MetadataManager.class);
registerBean(metadataManager);
SAMLContextProvider samlContextProvider = getSharedObject(SAMLContextProvider.class);
registerBean(samlContextProvider);
SAMLProcessor samlProcessor = getSharedObject(SAMLProcessor.class);
registerBean(samlProcessor);
WebSSOProfileConsumer webSSOprofileConsumer = getSharedObject(WebSSOProfileConsumer.class);
registerBean("webSSOprofileConsumer", webSSOprofileConsumer);
WebSSOProfileConsumerHoKImpl hokWebSSOprofileConsumer = getSharedObject(WebSSOProfileConsumerHoKImpl.class);
registerBean("hokWebSSOprofileConsumer", hokWebSSOprofileConsumer);
WebSSOProfile webSSOProfile = getSharedObject(WebSSOProfile.class);
registerBean("webSSOprofile", webSSOProfile);
WebSSOProfileECPImpl ecpProfile = getSharedObject(WebSSOProfileECPImpl.class);
registerBean("ecpProfile", ecpProfile);
WebSSOProfileHoKImpl hokWebSSOProfile = getSharedObject(WebSSOProfileHoKImpl.class);
registerBean("hokWebSSOProfile", hokWebSSOProfile);
SingleLogoutProfile sloProfile = getSharedObject(SingleLogoutProfile.class);
registerBean(sloProfile);
MetadataGenerator metadataGenerator = getSharedObject(MetadataGenerator.class);
registerBean(metadataGenerator);
SAMLSSOProperties config = getSharedObject(SAMLSSOProperties.class);
SAMLAuthenticationProvider authenticationProvider = getSharedObject(SAMLAuthenticationProvider.class);
registerBean(authenticationProvider);
SAMLLogoutFilter samlLogoutFilter = getSharedObject(SAMLLogoutFilter.class);
registerBean(samlLogoutFilter);
SAMLLogoutProcessingFilter samlLogoutProcessingFilter = getSharedObject(SAMLLogoutProcessingFilter.class);
registerBean(samlLogoutProcessingFilter);
MetadataDisplayFilter metadataDisplayFilter = getSharedObject(MetadataDisplayFilter.class);
registerBean(metadataDisplayFilter);
MetadataGeneratorFilter metadataGeneratorFilter = getSharedObject(MetadataGeneratorFilter.class);
registerBean(metadataGeneratorFilter);
SAMLProcessingFilter sAMLProcessingFilter = getSharedObject(SAMLProcessingFilter.class);
registerBean(sAMLProcessingFilter);
SAMLWebSSOHoKProcessingFilter sAMLWebSSOHoKProcessingFilter = getSharedObject(SAMLWebSSOHoKProcessingFilter.class);
registerBean(sAMLWebSSOHoKProcessingFilter);
SAMLDiscovery sAMLDiscovery = getSharedObject(SAMLDiscovery.class);
registerBean(sAMLDiscovery);
SAMLEntryPoint sAMLEntryPoint = getSharedObject(SAMLEntryPoint.class);
registerBean(sAMLEntryPoint);
TLSProtocolConfigurer tlsProtocolConfigurer = getSharedObject(TLSProtocolConfigurer.class);
tlsProtocolConfigurer.setKeyManager(keyManager);
registerBean(tlsProtocolConfigurer);
ServiceProviderEndpoints endpoints = getSharedObject(ServiceProviderEndpoints.class);
postProcess(webSSOprofileConsumer);
postProcess(samlContextProvider);
postProcess(webSSOProfile);
postProcess(ecpProfile);
postProcess(hokWebSSOProfile);
postProcess(sloProfile);
postProcess(webSSOprofileConsumer);
postProcess(hokWebSSOprofileConsumer);
metadataGenerator.setSamlEntryPoint(sAMLEntryPoint);
metadataGenerator.setSamlLogoutProcessingFilter(samlLogoutProcessingFilter);
metadataGenerator.setSamlWebSSOFilter(sAMLProcessingFilter);
metadataGenerator.setSamlWebSSOHoKFilter(sAMLWebSSOHoKProcessingFilter);
postProcess(metadataGenerator);
metadataManager.setRefreshRequired(true);
postProcess(metadataManager);
postProcess(authenticationProvider);
postProcess(samlProcessor);
postProcess(samlLogoutFilter);
postProcess(samlLogoutProcessingFilter);
postProcess(metadataDisplayFilter);
postProcess(metadataGeneratorFilter);
postProcess(sAMLProcessingFilter);
if (sAMLWebSSOHoKProcessingFilter != null) {
postProcess(sAMLWebSSOHoKProcessingFilter);
}
postProcess(sAMLDiscovery);
postProcess(sAMLEntryPoint);
postProcess(keyManager);
postProcess(tlsProtocolConfigurer);
ServiceProviderSecurityConfigurerBeans securityConfigurerBeans = new ServiceProviderSecurityConfigurerBeans(config, metadataManager, authenticationProvider, samlProcessor,
samlLogoutFilter, samlLogoutProcessingFilter, metadataDisplayFilter, metadataGeneratorFilter,
sAMLProcessingFilter, sAMLWebSSOHoKProcessingFilter, sAMLDiscovery, sAMLEntryPoint, keyManager,
tlsProtocolConfigurer, endpoints);
return securityConfigurerBeans;
}
/**
* Returns a {@link SAMLContextProviderConfigurer} for customization of the {@link SAMLContextProvider} default
* implementation {@link SAMLContextProviderImpl}. Either use this method or {@link
* #samlContextProvider(SAMLContextProvider)}.
* Alternatively define a {@link SAMLContextProvider} bean.
*
* The Context Provider is responsible for parsing HttpRequest/Response and determining which local entity (IDP/SP)
* is responsible for its handling.
*
*
* @return the {@link SAMLContextProvider} configurer.
* @throws Exception Any exception during configuration.
*/
public SAMLContextProviderConfigurer samlContextProvider() throws Exception {
return getOrApply(new SAMLContextProviderConfigurer());
}
/**
* Provide a specific {@link SAMLContextProvider}. Either use this method or {@link #samlContextProvider()}.
* Alternatively define a {@link SAMLContextProvider} bean.
*
* The Context Provider is responsible for parsing HttpRequest/Response and determining which local entity (IDP/SP)
* is responsible for its handling.
*
*
* @param samlContextProvider the context provider to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder samlContextProvider(SAMLContextProvider samlContextProvider) throws Exception {
getOrApply(new SAMLContextProviderConfigurer(samlContextProvider));
return this;
}
/**
* Returns a {@link MetadataManagerConfigurer} for customization of the {@link MetadataManager} default
* implementation {@link CachingMetadataManager}. Either use this method or {@link
* #metadataManager(MetadataManager)}.
* Alternatively use properties exposed at: {@link SAMLSSOProperties#getMetadataManager()} and {@link
* SAMLSSOProperties#getExtendedDelegate()}.
* Alternatively define a {@link MetadataManager} bean.
*
* Metadata Manager keeps track of all available identity and service providers configured inside the chained
* metadata providers. Exactly one service provider can be determined as hosted.
*
*
* @return the {@link MetadataManager} configurer.
* @throws Exception Any exception during configuration.
*/
public MetadataManagerConfigurer metadataManager() throws Exception {
return getOrApply(new MetadataManagerConfigurer());
}
/**
* Provide a specific {@link MetadataManager}. Either use this method or {@link #metadataManager()}.
* Alternatively define a {@link MetadataManager} bean.
*
* Metadata Manager keeps track of all available identity and service providers configured inside the chained
* metadata providers. Exactly one service provider can be determined as hosted.
*
*
* @param metadataManager the metadata Manager to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder metadataManager(MetadataManager metadataManager) throws Exception {
getOrApply(new MetadataManagerConfigurer(metadataManager));
return this;
}
/**
* Returns a {@link KeyManagerConfigurer} for customization of the {@link KeyManager} default
* implementation {@link JKSKeyManager}. Either use this method or {@link #keyManager(KeyManager)}.
* Alternatively use properties exposed at: {@link SAMLSSOProperties#getKeyManager()}.
* Alternatively define a {@link KeyManager} bean.
*
* KeyManager provides access to private and trusted keys for SAML Extension configuration. Keys are stored in the
* underlying KeyStore object.
*
*
* @return the {@link KeyManager} configurer.
* @throws Exception Any exception during configuration.
*/
public KeyManagerConfigurer keyManager() throws Exception {
return getOrApply(new KeyManagerConfigurer());
}
/**
* Provide a specific {@link KeyManager}. Either use this method or {@link #keyManager()}.
* Alternatively define a {@link KeyManager} bean.
*
* KeyManager provides access to private and trusted keys for SAML Extension configuration. Keys are stored in the
* underlying KeyStore object.
*
*
* @param keyManager the key Manager to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder keyManager(KeyManager keyManager) throws Exception {
getOrApply(new KeyManagerConfigurer(keyManager));
return this;
}
/**
* Returns a {@link SAMLProcessorConfigurer} for customization of the {@link SAMLProcessor} default
* implementation {@link SAMLProcessorImpl}. Either use this method or {@link #samlProcessor(SAMLProcessor)}.
* Alternatively use properties exposed at: {@link SAMLSSOProperties#getSamlProcessor()}.
* Alternatively define a {@link SAMLProcessor} bean.
*
* SAML Processor is capable of parsing SAML message from HttpServletRequest and populate the SAMLMessageContext
* for further validations.
*
*
* @return the {@link SAMLProcessor} configurer.
* @throws Exception Any exception during configuration.
*/
public SAMLProcessorConfigurer samlProcessor() throws Exception {
return getOrApply(new SAMLProcessorConfigurer());
}
/**
* Provide a specific {@link SAMLProcessor}. Either use this method or {@link #samlProcessor()}.
* Alternatively define a {@link SAMLProcessor} bean.
*
* SAML Processor is capable of parsing SAML message from HttpServletRequest and populate the SAMLMessageContext
* for further validations.
*
*
* @param samlProcessor the saml Processor to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder samlProcessor(SAMLProcessor samlProcessor) throws Exception {
getOrApply(new SAMLProcessorConfigurer(samlProcessor));
return this;
}
/**
* Returns a {@link WebSSOProfileConsumerConfigurer} for customization of the {@link WebSSOProfileConsumer} default
* implementation {@link WebSSOProfileConsumerImpl}. Either use this method or {@link
* #ssoProfileConsumer(WebSSOProfileConsumer)}.
* Alternatively define a {@link WebSSOProfileConsumer} bean with name webSSOprofileConsumer.
*
* Web SSO Profile Consumer is able to process Response objects returned from the IDP after SP initialized SSO or
* unsolicited response from IDP. In case the response is correctly validated and no errors are found the
* SAMLCredential is created.
*
*
* @return the {@link WebSSOProfileConsumer} configurer.
* @throws Exception Any exception during configuration.
*/
public WebSSOProfileConsumerConfigurer ssoProfileConsumer() throws Exception {
return getOrApply(new WebSSOProfileConsumerConfigurer());
}
/**
* Provide a specific {@link WebSSOProfileConsumer}. Either use this method or {@link #ssoProfileConsumer()}.
* Alternatively define a {@link WebSSOProfileConsumer} bean with name webSSOprofileConsumer.
*
* Web SSO Profile Consumer is able to process Response objects returned from the IDP after SP initialized SSO or
* unsolicited response from IDP. In case the response is correctly validated and no errors are found the
* SAMLCredential is created.
*
*
* @param ssoProfileConsumer the sso Profile Consumer to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder ssoProfileConsumer(WebSSOProfileConsumer ssoProfileConsumer) throws Exception {
getOrApply(new WebSSOProfileConsumerConfigurer(ssoProfileConsumer));
return this;
}
/**
* Returns a {@link WebSSOProfileHoKConsumerConfigurer} for customization of the {@link
* WebSSOProfileConsumerHoKImpl} default
* implementation {@link WebSSOProfileConsumerHoKImpl}. Either use this method or {@link
* #hokProfileConsumer(WebSSOProfileConsumerHoKImpl)}.
* Alternatively define a {@link WebSSOProfileConsumerHoKImpl} bean with name hokWebSSOprofileConsumer.
*
* Web SSO Profile Consumer HOK implements processing of the SAML Holder-of-Key Browser SSO profile as per
* http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-holder-of-key-browser-sso-cs-02.pdf.
*
*
* @return the {@link WebSSOProfileConsumerHoKImpl} configurer.
* @throws Exception Any exception during configuration.
*/
public WebSSOProfileHoKConsumerConfigurer hokProfileConsumer() throws Exception {
return getOrApply(new WebSSOProfileHoKConsumerConfigurer());
}
/**
* Provide a specific {@link WebSSOProfileConsumerHoKImpl}. Either use this method or {@link
* #hokProfileConsumer()}.
* Alternatively define a {@link WebSSOProfileConsumerHoKImpl} bean with name hokWebSSOprofileConsumer.
*
* Web SSO Profile Consumer HOK implements processing of the SAML Holder-of-Key Browser SSO profile as per
* http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-holder-of-key-browser-sso-cs-02.pdf.
*
*
* @param hokProfileConsumer the hok Profile Consumer to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder hokProfileConsumer(WebSSOProfileConsumerHoKImpl hokProfileConsumer) throws Exception {
getOrApply(new WebSSOProfileHoKConsumerConfigurer(hokProfileConsumer));
return this;
}
/**
* Returns a {@link WebSSOProfileConfigurer} for customization of the {@link WebSSOProfile} default
* implementation {@link WebSSOProfileImpl}. Either use this method or {@link #ssoProfile(WebSSOProfile)}.
* Alternatively define a {@link WebSSOProfile} bean with name webSSOprofile.
*
* Web SSO Profile implements WebSSO profile and offers capabilities for SP initialized SSO and process Response
* coming from IDP or IDP initialized SSO. HTTP-POST and HTTP-Redirect bindings are supported.
*
*
* @return the {@link WebSSOProfile} configurer.
* @throws Exception Any exception during configuration.
*/
public WebSSOProfileConfigurer ssoProfile() throws Exception {
return getOrApply(new WebSSOProfileConfigurer());
}
/**
* Provide a specific {@link WebSSOProfile}. Either use this method or {@link #ssoProfile()}.
* Alternatively define a {@link WebSSOProfile} bean with name webSSOprofile.
*
* Web SSO Profile implements WebSSO profile and offers capabilities for SP initialized SSO and process Response
* coming from IDP or IDP initialized SSO. HTTP-POST and HTTP-Redirect bindings are supported.
*
*
* @param ssoProfile the sso Profile to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder ssoProfile(WebSSOProfile ssoProfile) throws Exception {
getOrApply(new WebSSOProfileConfigurer(ssoProfile));
return this;
}
/**
* Returns a {@link WebSSOProfileECPConfigurer} for customization of the {@link WebSSOProfileECPImpl} default
* implementation {@link WebSSOProfileECPImpl}. Either use this method or {@link
* #ecpProfile(WebSSOProfileECPImpl)}.
* Alternatively define a {@link WebSSOProfileECPImpl} bean with name ecpProfile.
*
* Profile that implements the SAML ECP Profile and offers capabilities for SP initialized SSO and process Response
* coming from IDP or IDP initialized SSO. PAOS Binding is supported.
*
*
* @return the {@link WebSSOProfileECPImpl} configurer.
* @throws Exception Any exception during configuration.
*/
public WebSSOProfileECPConfigurer ecpProfile() throws Exception {
return getOrApply(new WebSSOProfileECPConfigurer());
}
/**
* Provide a specific {@link WebSSOProfileECPImpl}. Either use this method or {@link #ecpProfile()}.
* Alternatively define a {@link WebSSOProfileECPImpl} bean with name ecpProfile.
*
* Profile that implements the SAML ECP Profile and offers capabilities for SP initialized SSO and process Response
* coming from IDP or IDP initialized SSO. PAOS Binding is supported.
*
*
* @param ecpProfile the ecp Profile to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder ecpProfile(WebSSOProfileECPImpl ecpProfile) throws Exception {
getOrApply(new WebSSOProfileECPConfigurer(ecpProfile));
return this;
}
/**
* Returns a {@link WebSSOProfileHoKConfigurer} for customization of the {@link WebSSOProfileHoKImpl} default
* implementation {@link WebSSOProfileHoKImpl}. Either use this method or {@link
* #hokProfile(WebSSOProfileHoKImpl)}.
* Alternatively define a {@link WebSSOProfileHoKImpl} bean with name hokWebSSOProfile.
*
* Profile that implements WebSSO profile and offers capabilities for SP initialized SSO and process Response
* coming from IDP or IDP initialized SSO. HTTP-POST and HTTP-Redirect bindings are supported.
*
*
* @return the {@link WebSSOProfileHoKImpl} configurer.
* @throws Exception Any exception during configuration.
*/
public WebSSOProfileHoKConfigurer hokProfile() throws Exception {
return getOrApply(new WebSSOProfileHoKConfigurer());
}
/**
* Provide a specific {@link WebSSOProfileHoKImpl}. Either use this method or {@link #hokProfile()}.
* Alternatively define a {@link WebSSOProfileHoKImpl} bean with name hokWebSSOProfile.
*
* Profile that implements WebSSO profile and offers capabilities for SP initialized SSO and process Response
* coming from IDP or IDP initialized SSO. HTTP-POST and HTTP-Redirect bindings are supported.
*
*
* @param hokProfile the hok Profile to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder hokProfile(WebSSOProfileHoKImpl hokProfile) throws Exception {
getOrApply(new WebSSOProfileHoKConfigurer(hokProfile));
return this;
}
/**
* Returns a {@link SingleLogoutProfileConfigurer} for customization of the {@link SingleLogoutProfile} default
* implementation {@link SingleLogoutProfileImpl}. Either use this method or {@link
* #sloProfile(SingleLogoutProfile)}.
* Alternatively define a {@link SingleLogoutProfile} bean.
*
* SLO Profile provides SAML Single Logout functionality according to SAML 2.0 Profiles specification.
*
*
* @return the {@link SingleLogoutProfileImpl} configurer.
* @throws Exception Any exception during configuration.
*/
public SingleLogoutProfileConfigurer sloProfile() throws Exception {
return getOrApply(new SingleLogoutProfileConfigurer());
}
/**
* Provide a specific {@link SingleLogoutProfile}. Either use this method or {@link #sloProfile()}.
* Alternatively define a {@link SingleLogoutProfile} bean.
*
* SLO Profile provides SAML Single Logout functionality according to SAML 2.0 Profiles specification.
*
*
* @param sloProfile the slo Profile to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder sloProfile(SingleLogoutProfile sloProfile) throws Exception {
getOrApply(new SingleLogoutProfileConfigurer(sloProfile));
return this;
}
/**
* Returns a {@link ExtendedMetadataConfigurer} for customization of the {@link ExtendedMetadata} default
* implementation {@link ExtendedMetadata}. Either use this method or {@link #extendedMetadata(ExtendedMetadata)}.
* Alternatively define a {@link ExtendedMetadata} bean.
*
* Extended Metadata contains additional information describing a SAML entity. Metadata can be used both for local
* entities (= the ones accessible as part of the deployed application using the SAML Extension) and remote
* entities
* (= the ones user can interact with like IDPs).
*
*
* @return the {@link ExtendedMetadata} configurer.
* @throws Exception Any exception during configuration.
*/
public ExtendedMetadataConfigurer extendedMetadata() throws Exception {
return getOrApply(new ExtendedMetadataConfigurer());
}
/**
* Provide a specific {@link ExtendedMetadata}. Either use this method or {@link #extendedMetadata()}.
* Alternatively define a {@link ExtendedMetadata} bean.
*
* Extended Metadata contains additional information describing a SAML entity. Metadata can be used both for local
* entities (= the ones accessible as part of the deployed application using the SAML Extension) and remote
* entities
* (= the ones user can interact with like IDPs).
*
*
* @param extendedMetadata the extended Metadata to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder extendedMetadata(ExtendedMetadata extendedMetadata) throws Exception {
getOrApply(new ExtendedMetadataConfigurer(extendedMetadata));
return this;
}
/**
* Returns a {@link AuthenticationProviderConfigurer} for customization of the {@link SAMLAuthenticationProvider}
* default
* implementation {@link SAMLAuthenticationProvider}. Either use this method or {@link
* #authenticationProvider(SAMLAuthenticationProvider)}.
* Alternatively use properties exposed at {@link SAMLSSOProperties#getAuthenticationProvider()}.
* Alternatively define a {@link SAMLAuthenticationProvider} bean.
*
* SAML Authentication provider is capable of verifying validity of a SAMLAuthenticationToken and in case the token
* is valid to create an authenticated UsernamePasswordAuthenticationToken.
*
*
* @return the {@link SAMLAuthenticationProvider} configurer.
* @throws Exception Any exception during configuration.
*/
public AuthenticationProviderConfigurer authenticationProvider() throws Exception {
return getOrApply(new AuthenticationProviderConfigurer());
}
/**
* Provide a specific {@link SAMLAuthenticationProvider}. Either use this method or {@link
* #authenticationProvider()}.
* Alternatively define a {@link SAMLAuthenticationProvider} bean.
*
* SAML Authentication provider is capable of verifying validity of a SAMLAuthenticationToken and in case the token
* is valid to create an authenticated UsernamePasswordAuthenticationToken.
*
*
* @param provider the authentication Provider to use.
* @return this builder for further customization.
* @throws Exception Any exception during configuration.
*/
public ServiceProviderSecurityBuilder authenticationProvider(SAMLAuthenticationProvider provider) throws Exception {
getOrApply(new AuthenticationProviderConfigurer(provider));
return this;
}
/**
* Returns a {@link LogoutConfigurer} for customization of the {@link SAMLLogoutFilter} and
* {@link SAMLProcessingFilter}.
* Alternatively use properties exposed at {@link SAMLSSOProperties#getLogout()}.
*
* @return the {@link LogoutConfigurer}
* @throws Exception Any exception during configuration.
*/
public LogoutConfigurer logout() throws Exception {
return getOrApply(new LogoutConfigurer());
}
/**
* Returns a {@link MetadataGeneratorConfigurer} for customization of the {@link MetadataGenerator}, {@link
* MetadataGeneratorFilter} and
* {@link MetadataDisplayFilter}.
* Alternatively use properties exposed at {@link SAMLSSOProperties#getMetadataGenerator()}.
*
* Metadata Generator is for generation of service provider metadata describing the application in the current
* deployment environment. All the URLs in the metadata will be derived from information in the
* ServletContext.
* Metadata Generator Filter and Metadata Display Filter expect calls on configured URL and presents user with
* SAML2 metadata representing this application deployment. In case the application is configured to automatically
* generate metadata, the generation occurs upon first invocation of this filter (first request made to the server).
*
*
* @return the {@link MetadataGeneratorConfigurer}
* @throws Exception Any exception during configuration.
*/
public MetadataGeneratorConfigurer metadataGenerator() throws Exception {
return getOrApply(new MetadataGeneratorConfigurer());
}
/**
* Returns a {@link MetadataGeneratorConfigurer} for customization of the {@link SAMLEntryPoint}, {@link
* SAMLProcessingFilter},
* {@link SAMLWebSSOHoKProcessingFilter} and {@link SAMLDiscovery}.
* Alternatively use properties exposed at {@link SAMLSSOProperties}.
*
* SAML Entry Point initializes SAML WebSSO Profile, IDP Discovery or ECP Profile from the SP side. Configuration
* of
* the local service provider and incoming request determines which profile will get invoked.
* There are two ways the entry point can get invoked. Either user accesses a URL configured to require some degree
* of authentication and throws AuthenticationException which is handled and invokes the entry point. The other way
* is direct invocation of the entry point by accessing the /saml/login URL.
* SAML Processor Filter processes arriving SAML messages by delegating to the WebSSOProfile. After the
* SAMLAuthenticationToken is obtained, authentication providers are asked to authenticate it.
* SAML HOK Processing Filter processes messages sent from IDP as part of the WebSSO Holder-of-Key profile.
* SAML Discovery implements Identity Provider Discovery Service and Profile as defined in
* http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-idp-discovery.pdf.
*
*
* @return the {@link MetadataGeneratorConfigurer}
* @throws Exception Any exception during configuration.
*/
public SSOConfigurer sso() throws Exception {
return getOrApply(new SSOConfigurer());
}
/**
* Returns a {@link TLSConfigurer} for customization of the {@link TLSProtocolConfigurer}.
* Alternatively use properties exposed at {@link SAMLSSOProperties#getTls()}.
*
* TLS Protocol Configurer initializes instance of TLSProtocolSocketFactory and registers is at one of the protocol
* inside HTTP Client. It also automatically makes the MetadataManager dependant on this bean.
*
*
* @return the {@link TLSConfigurer}
* @throws Exception Any exception during configuration.
*/
public TLSConfigurer tls() throws Exception {
return getOrApply(new TLSConfigurer());
}
}