org.picketlink.identity.federation.web.servlets.IDPServlet Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of picketlink-federation
Show all versions of picketlink-federation
PicketLink Federation Core contains the core infrastructure code
/*
* JBoss, Home of Professional Open Source
*
* Copyright 2013 Red Hat, Inc. and/or its affiliates.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.picketlink.identity.federation.web.servlets;
import org.jboss.logging.Logger;
import org.picketlink.common.ErrorCodes;
import org.picketlink.common.constants.GeneralConstants;
import org.picketlink.common.constants.JBossSAMLURIConstants;
import org.picketlink.common.exceptions.ConfigurationException;
import org.picketlink.common.exceptions.ParsingException;
import org.picketlink.common.exceptions.TrustKeyConfigurationException;
import org.picketlink.common.exceptions.TrustKeyProcessingException;
import org.picketlink.common.exceptions.fed.IssueInstantMissingException;
import org.picketlink.common.exceptions.fed.IssuerNotTrustedException;
import org.picketlink.common.util.StringUtil;
import org.picketlink.config.federation.AuthPropertyType;
import org.picketlink.config.federation.IDPType;
import org.picketlink.config.federation.KeyProviderType;
import org.picketlink.config.federation.PicketLinkType;
import org.picketlink.config.federation.handler.Handlers;
import org.picketlink.identity.federation.core.impl.DelegatedAttributeManager;
import org.picketlink.identity.federation.core.interfaces.AttributeManager;
import org.picketlink.identity.federation.core.interfaces.ProtocolContext;
import org.picketlink.identity.federation.core.interfaces.RoleGenerator;
import org.picketlink.identity.federation.core.interfaces.TrustKeyManager;
import org.picketlink.identity.federation.core.saml.v2.common.SAMLDocumentHolder;
import org.picketlink.identity.federation.core.saml.v2.holders.IssuerInfoHolder;
import org.picketlink.identity.federation.core.saml.v2.impl.DefaultSAML2HandlerChain;
import org.picketlink.identity.federation.core.saml.v2.impl.DefaultSAML2HandlerChainConfig;
import org.picketlink.identity.federation.core.saml.v2.impl.DefaultSAML2HandlerRequest;
import org.picketlink.identity.federation.core.saml.v2.impl.DefaultSAML2HandlerResponse;
import org.picketlink.identity.federation.core.saml.v2.interfaces.SAML2Handler;
import org.picketlink.identity.federation.core.saml.v2.interfaces.SAML2Handler.HANDLER_TYPE;
import org.picketlink.identity.federation.core.saml.v2.interfaces.SAML2HandlerChain;
import org.picketlink.identity.federation.core.saml.v2.interfaces.SAML2HandlerChainConfig;
import org.picketlink.identity.federation.core.saml.v2.interfaces.SAML2HandlerRequest;
import org.picketlink.identity.federation.core.saml.v2.interfaces.SAML2HandlerResponse;
import org.picketlink.identity.federation.core.saml.v2.util.HandlerUtil;
import org.picketlink.identity.federation.core.sts.PicketLinkCoreSTS;
import org.picketlink.identity.federation.core.util.CoreConfigUtil;
import org.picketlink.identity.federation.core.util.XMLSignatureUtil;
import org.picketlink.identity.federation.saml.v2.SAML2Object;
import org.picketlink.identity.federation.saml.v2.protocol.RequestAbstractType;
import org.picketlink.identity.federation.saml.v2.protocol.StatusResponseType;
import org.picketlink.identity.federation.web.core.HTTPContext;
import org.picketlink.identity.federation.web.core.IdentityParticipantStack;
import org.picketlink.identity.federation.web.core.IdentityServer;
import org.picketlink.identity.federation.web.roles.DefaultRoleGenerator;
import org.picketlink.identity.federation.web.util.ConfigurationUtil;
import org.picketlink.identity.federation.web.util.IDPWebRequestUtil;
import org.picketlink.identity.federation.web.util.IDPWebRequestUtil.WebRequestUtilHolder;
import org.picketlink.identity.federation.web.util.RedirectBindingSignatureUtil;
import org.picketlink.identity.federation.web.util.SAMLConfigurationProvider;
import org.w3c.dom.Document;
import javax.servlet.ServletConfig;
import javax.servlet.ServletContext;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import javax.xml.crypto.dsig.CanonicalizationMethod;
import java.io.File;
import java.io.IOException;
import java.io.InputStream;
import java.security.GeneralSecurityException;
import java.security.Principal;
import java.security.PublicKey;
import java.util.ArrayList;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Set;
import static org.picketlink.common.util.StringUtil.isNotNull;
/**
* SAML Web Browser SSO - POST binding
*
* @author [email protected]
* @since Aug 13, 2009
*/
public class IDPServlet extends HttpServlet {
private static final long serialVersionUID = 1L;
private static Logger log = Logger.getLogger(IDPServlet.class);
private final boolean trace = log.isTraceEnabled();
protected transient IDPType idpConfiguration = null;
protected transient PicketLinkType picketLinkConfiguration = null;
protected transient RoleGenerator roleGenerator = new DefaultRoleGenerator();
protected transient DelegatedAttributeManager attribManager = new DelegatedAttributeManager();
protected List attributeKeys = new ArrayList();
protected String identityURL = null;
protected transient TrustKeyManager keyManager;
protected Boolean ignoreIncomingSignatures = false;
protected Boolean signOutgoingMessages = true;
protected String canonicalizationMethod = CanonicalizationMethod.EXCLUSIVE_WITH_COMMENTS;
protected transient ServletContext context = null;
protected transient SAML2HandlerChain chain = null;
// Cater to SAML Web Browser SSO Profile demand that we do not reply in Redirect Binding
private boolean strictPostBinding = false;
public boolean isStrictPostBinding() {
return strictPostBinding;
}
public void setStrictPostBinding(boolean strictPostBinding) {
this.strictPostBinding = strictPostBinding;
}
/**
* If the user wants to set a particular {@link IdentityParticipantStack}
*/
protected String identityParticipantStack = null;
public Boolean getIgnoreIncomingSignatures() {
return ignoreIncomingSignatures;
}
@Override
public void init(ServletConfig config) throws ServletException {
Handlers handlers = null;
super.init(config);
String configFile = GeneralConstants.CONFIG_FILE_LOCATION;
String configProviderStr = config.getInitParameter(GeneralConstants.CONFIG_PROVIDER);
if (StringUtil.isNotNull(configProviderStr)) {
Class> clazz = SecurityActions.loadClass(getClass(), configProviderStr);
if (clazz == null)
throw new RuntimeException(ErrorCodes.CLASS_NOT_LOADED + configProviderStr);
try {
idpConfiguration = ((SAMLConfigurationProvider) clazz.newInstance()).getIDPConfiguration();
} catch (Exception e) {
throw new RuntimeException(ErrorCodes.PROCESSING_EXCEPTION, e);
}
}
String strictPostBindingStr = config.getInitParameter(GeneralConstants.SAML_IDP_STRICT_POST_BINDING);
if (StringUtil.isNotNull(strictPostBindingStr)) {
strictPostBinding = Boolean.parseBoolean(strictPostBindingStr);
}
context = config.getServletContext();
if (idpConfiguration == null) {
InputStream is = context.getResourceAsStream(configFile);
if (is != null) {
try {
picketLinkConfiguration = ConfigurationUtil.getConfiguration(is);
idpConfiguration = (IDPType) picketLinkConfiguration.getIdpOrSP();
} catch (ParsingException e) {
throw new RuntimeException(ErrorCodes.PROCESSING_EXCEPTION, e);
}
} else {
is = context.getResourceAsStream(GeneralConstants.DEPRECATED_CONFIG_FILE_LOCATION);
if (is == null)
throw new RuntimeException(ErrorCodes.SERVICE_PROVIDER_CONF_FILE_MISSING + configFile + " missing");
try {
idpConfiguration = ConfigurationUtil.getIDPConfiguration(is);
} catch (ParsingException e) {
throw new RuntimeException(ErrorCodes.PROCESSING_EXCEPTION, e);
}
}
}
// Get the chain from config
chain = new DefaultSAML2HandlerChain();
try {
this.identityURL = idpConfiguration.getIdentityURL();
log.trace("Identity Provider URL=" + this.identityURL);
this.canonicalizationMethod = idpConfiguration.getCanonicalizationMethod();
log.info("IDPServlet:: Setting the CanonicalizationMethod on XMLSignatureUtil::" + canonicalizationMethod);
XMLSignatureUtil.setCanonicalizationMethodType(canonicalizationMethod);
// Get the attribute manager
String attributeManager = idpConfiguration.getAttributeManager();
if (attributeManager != null && !"".equals(attributeManager)) {
AttributeManager delegate = (AttributeManager) SecurityActions.loadClass(getClass(), attributeManager)
.newInstance();
this.attribManager.setDelegate(delegate);
}
// Get the handlers
String handlerConfigFileName = GeneralConstants.HANDLER_CONFIG_FILE_LOCATION;
if (picketLinkConfiguration != null) {
handlers = picketLinkConfiguration.getHandlers();
} else {
handlers = ConfigurationUtil.getHandlers(context.getResourceAsStream(handlerConfigFileName));
}
chain.addAll(HandlerUtil.getHandlers(handlers));
Map chainConfigOptions = new HashMap();
chainConfigOptions.put(GeneralConstants.ROLE_GENERATOR, roleGenerator);
chainConfigOptions.put(GeneralConstants.CONFIGURATION, idpConfiguration);
SAML2HandlerChainConfig handlerChainConfig = new DefaultSAML2HandlerChainConfig(chainConfigOptions);
Set samlHandlers = chain.handlers();
for (SAML2Handler handler : samlHandlers) {
handler.initChainConfig(handlerChainConfig);
}
} catch (Exception e) {
throw new RuntimeException(e);
}
// Handle the sign outgoing messages
String signOutgoingString = config.getInitParameter(GeneralConstants.SIGN_OUTGOING_MESSAGES);
if (signOutgoingString != null && !"".equals(signOutgoingString))
this.signOutgoingMessages = Boolean.parseBoolean(signOutgoingString);
if (this.signOutgoingMessages) {
KeyProviderType keyProvider = this.idpConfiguration.getKeyProvider();
if (keyProvider == null)
throw new RuntimeException(ErrorCodes.NULL_VALUE + "Key Provider is null for context="
+ context.getContextPath());
try {
String keyManagerClassName = keyProvider.getClassName();
if (keyManagerClassName == null)
throw new RuntimeException(ErrorCodes.NULL_VALUE + "KeyManager class name is null");
Class> clazz = SecurityActions.loadClass(getClass(), keyManagerClassName);
this.keyManager = (TrustKeyManager) clazz.newInstance();
List authProperties = CoreConfigUtil.getKeyProviderProperties(keyProvider);
keyManager.setAuthProperties(authProperties);
keyManager.setValidatingAlias(keyProvider.getValidatingAlias());
} catch (Exception e) {
log.error("Exception reading configuration:", e);
throw new RuntimeException(e.getLocalizedMessage());
}
if (trace)
log.trace("Key Provider=" + keyProvider.getClassName());
}
// handle the role generator
String rgString = config.getInitParameter(GeneralConstants.ROLE_GENERATOR);
if (rgString != null && !"".equals(rgString))
this.setRoleGenerator(rgString);
// Get a list of attributes we are interested in
String attribList = config.getInitParameter(GeneralConstants.ATTRIBUTE_KEYS);
if (StringUtil.isNotNull(attribList)) {
this.attributeKeys.addAll(StringUtil.tokenize(attribList));
}
// The Identity Server on the servlet context gets set
// in the implementation of IdentityServer
// Create an Identity Server and set it on the context
IdentityServer identityServer = (IdentityServer) context.getAttribute(GeneralConstants.IDENTITY_SERVER);
if (identityServer == null) {
identityServer = new IdentityServer();
context.setAttribute(GeneralConstants.IDENTITY_SERVER, identityServer);
String theStackParam = config.getInitParameter(GeneralConstants.IDENTITY_PARTICIPANT_STACK);
if (StringUtil.isNotNull(theStackParam)) {
try {
Class> stackClass = SecurityActions.loadClass(getClass(), theStackParam);
identityServer.setStack((IdentityParticipantStack) stackClass.newInstance());
} catch (Exception e) {
log("Unable to set the Identity Participant Stack Class. Will just use the default", e);
}
}
}
// Ensure the configuration in the STS
PicketLinkCoreSTS sts = PicketLinkCoreSTS.instance();
// Let us look for a file
String configPath = context.getRealPath("/WEB-INF/picketlink-sts.xml");
File stsConfigFile = configPath != null ? new File(configPath) : null;
if (stsConfigFile == null || !stsConfigFile.exists())
sts.installDefaultConfiguration();
else
sts.installDefaultConfiguration(configPath);
}
@SuppressWarnings("unchecked")
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
// Some issue with filters and servlets
HttpSession session = request.getSession(false);
String samlRequestMessage = (String) session.getAttribute(GeneralConstants.SAML_REQUEST_KEY);
String samlResponseMessage = (String) session.getAttribute(GeneralConstants.SAML_RESPONSE_KEY);
String relayState = (String) session.getAttribute(GeneralConstants.RELAY_STATE);
String referer = request.getHeader("Referer");
// See if the user has already been authenticated
Principal userPrincipal = (Principal) session.getAttribute(GeneralConstants.PRINCIPAL_ID);
if (userPrincipal == null) {
// The sys admin has not set up the login servlet filters for the IDP
if (trace)
log.trace("Login Filters have not been configured");
response.sendError(HttpServletResponse.SC_INTERNAL_SERVER_ERROR);
}
IDPWebRequestUtil webRequestUtil = new IDPWebRequestUtil(request, idpConfiguration, keyManager);
webRequestUtil.setCanonicalizationMethod(canonicalizationMethod);
boolean willSendRequest = true;
if (userPrincipal != null) {
if (trace) {
log.trace("Retrieved saml message and relay state from session");
log.trace("saml Request message=" + samlRequestMessage + "::relay state=" + relayState);
log.trace("saml Response message=" + samlResponseMessage + "::relay state=" + relayState);
}
session.removeAttribute(GeneralConstants.SAML_REQUEST_KEY);
session.removeAttribute(GeneralConstants.SAML_RESPONSE_KEY);
if (isNotNull(relayState))
session.removeAttribute(GeneralConstants.RELAY_STATE);
SAMLDocumentHolder samlDocumentHolder = null;
SAML2Object samlObject = null;
String destination = null;
Document samlResponse = null;
if (samlResponseMessage != null) {
StatusResponseType statusResponseType = null;
try {
samlDocumentHolder = webRequestUtil.getSAMLDocumentHolder(samlResponseMessage);
samlObject = samlDocumentHolder.getSamlObject();
boolean isPost = webRequestUtil.hasSAMLRequestInPostProfile();
boolean isValid = validate(request.getRemoteAddr(), request.getQueryString(), new SessionHolder(
samlResponseMessage, null), isPost);
if (!isValid)
throw new GeneralSecurityException("Validation check failed");
String issuer = null;
IssuerInfoHolder idpIssuer = new IssuerInfoHolder(this.identityURL);
ProtocolContext protocolContext = new HTTPContext(request, response, context);
// Create the request/response
SAML2HandlerRequest saml2HandlerRequest = new DefaultSAML2HandlerRequest(protocolContext,
idpIssuer.getIssuer(), samlDocumentHolder, HANDLER_TYPE.IDP);
saml2HandlerRequest.setRelayState(relayState);
SAML2HandlerResponse saml2HandlerResponse = new DefaultSAML2HandlerResponse();
Set handlers = chain.handlers();
if (samlObject instanceof StatusResponseType) {
statusResponseType = (StatusResponseType) samlObject;
issuer = statusResponseType.getIssuer().getValue();
webRequestUtil.isTrusted(issuer);
if (handlers != null) {
for (SAML2Handler handler : handlers) {
handler.reset();
handler.handleStatusResponseType(saml2HandlerRequest, saml2HandlerResponse);
willSendRequest = saml2HandlerResponse.getSendRequest();
}
}
} else
throw new RuntimeException(ErrorCodes.UNSUPPORTED_TYPE + "Unknown type:"
+ samlObject.getClass().getName());
samlResponse = saml2HandlerResponse.getResultingDocument();
relayState = saml2HandlerResponse.getRelayState();
destination = saml2HandlerResponse.getDestination();
} catch (Exception e) {
throw new RuntimeException(e);
}
} else
// Send valid saml response after processing the request
if (samlRequestMessage != null) {
// Get the SAML Request Message
RequestAbstractType requestAbstractType = null;
try {
samlDocumentHolder = webRequestUtil.getSAMLDocumentHolder(samlRequestMessage);
samlObject = samlDocumentHolder.getSamlObject();
boolean isPost = webRequestUtil.hasSAMLRequestInPostProfile();
boolean isValid = validate(request.getRemoteAddr(), request.getQueryString(), new SessionHolder(
samlRequestMessage, null), isPost);
if (!isValid)
throw new GeneralSecurityException(ErrorCodes.VALIDATION_CHECK_FAILED + "Validation check failed");
String issuer = null;
IssuerInfoHolder idpIssuer = new IssuerInfoHolder(this.identityURL);
ProtocolContext protocolContext = new HTTPContext(request, response, context);
// Create the request/response
SAML2HandlerRequest saml2HandlerRequest = new DefaultSAML2HandlerRequest(protocolContext,
idpIssuer.getIssuer(), samlDocumentHolder, HANDLER_TYPE.IDP);
saml2HandlerRequest.setRelayState(relayState);
// Set the options on the handler request
Map requestOptions = new HashMap();
requestOptions.put(GeneralConstants.ROLE_GENERATOR, roleGenerator);
requestOptions.put(GeneralConstants.CONFIGURATION, this.idpConfiguration);
Map attribs = this.attribManager.getAttributes(userPrincipal, attributeKeys);
requestOptions.put(GeneralConstants.ATTRIBUTES, attribs);
saml2HandlerRequest.setOptions(requestOptions);
List roles = (List) session.getAttribute(GeneralConstants.ROLES_ID);
if (roles == null) {
roles = roleGenerator.generateRoles(userPrincipal);
session.setAttribute(GeneralConstants.ROLES_ID, roles);
}
SAML2HandlerResponse saml2HandlerResponse = new DefaultSAML2HandlerResponse();
Set handlers = chain.handlers();
if (samlObject instanceof RequestAbstractType) {
requestAbstractType = (RequestAbstractType) samlObject;
issuer = requestAbstractType.getIssuer().getValue();
webRequestUtil.isTrusted(issuer);
if (handlers != null) {
for (SAML2Handler handler : handlers) {
handler.handleRequestType(saml2HandlerRequest, saml2HandlerResponse);
willSendRequest = saml2HandlerResponse.getSendRequest();
}
}
} else
throw new RuntimeException(ErrorCodes.UNSUPPORTED_TYPE + "Unknown type:"
+ samlObject.getClass().getName());
samlResponse = saml2HandlerResponse.getResultingDocument();
relayState = saml2HandlerResponse.getRelayState();
destination = saml2HandlerResponse.getDestination();
} catch (IssuerNotTrustedException e) {
if (trace)
log.trace("Exception:", e);
samlResponse = webRequestUtil.getErrorResponse(referer, JBossSAMLURIConstants.STATUS_REQUEST_DENIED.get(),
this.identityURL, this.signOutgoingMessages);
} catch (ParsingException e) {
if (trace)
log.trace("Exception:", e);
samlResponse = webRequestUtil.getErrorResponse(referer, JBossSAMLURIConstants.STATUS_AUTHNFAILED.get(),
this.identityURL, this.signOutgoingMessages);
} catch (ConfigurationException e) {
if (trace)
log.trace("Exception:", e);
samlResponse = webRequestUtil.getErrorResponse(referer, JBossSAMLURIConstants.STATUS_AUTHNFAILED.get(),
this.identityURL, this.signOutgoingMessages);
} catch (IssueInstantMissingException e) {
if (trace)
log.trace("Exception:", e);
samlResponse = webRequestUtil.getErrorResponse(referer, JBossSAMLURIConstants.STATUS_AUTHNFAILED.get(),
this.identityURL, this.signOutgoingMessages);
} catch (GeneralSecurityException e) {
if (trace)
log.trace("Security Exception:", e);
samlResponse = webRequestUtil.getErrorResponse(referer, JBossSAMLURIConstants.STATUS_AUTHNFAILED.get(),
this.identityURL, this.signOutgoingMessages);
} catch (Exception e) {
if (trace)
log.trace("Exception:", e);
samlResponse = webRequestUtil.getErrorResponse(referer, JBossSAMLURIConstants.STATUS_AUTHNFAILED.get(),
this.identityURL, this.signOutgoingMessages);
}
} else {
log.error("No SAML Request Message");
if (trace)
log.trace("Referer=" + referer);
try {
sendErrorResponseToSP(referer, response, relayState, webRequestUtil);
return;
} catch (ConfigurationException e) {
if (trace)
log.trace(e);
}
}
try {
if (samlResponse == null)
throw new ServletException(ErrorCodes.NULL_VALUE + "SAML Response has not been generated");
WebRequestUtilHolder holder = webRequestUtil.getHolder();
holder.setResponseDoc(samlResponse).setDestination(destination).setRelayState(relayState)
.setAreWeSendingRequest(willSendRequest).setPrivateKey(null).setSupportSignature(false)
.setServletResponse(response);
holder.setPostBindingRequested(true);
if (this.signOutgoingMessages) {
holder.setPrivateKey(keyManager.getSigningKey()).setSupportSignature(true);
}
if (strictPostBinding)
holder.setStrictPostBinding(strictPostBinding);
webRequestUtil.send(holder);
} catch (ParsingException e) {
if (trace)
log.trace(e);
} catch (GeneralSecurityException e) {
if (trace)
log.trace(e);
}
return;
}
}
protected void sendErrorResponseToSP(String referrer, HttpServletResponse response, String relayState,
IDPWebRequestUtil webRequestUtil) throws ServletException, IOException, ConfigurationException {
if (trace)
log.trace("About to send error response to SP:" + referrer);
Document samlResponse = webRequestUtil.getErrorResponse(referrer, JBossSAMLURIConstants.STATUS_RESPONDER.get(),
this.identityURL, this.signOutgoingMessages);
try {
WebRequestUtilHolder holder = webRequestUtil.getHolder();
holder.setResponseDoc(samlResponse).setDestination(referrer).setRelayState(relayState)
.setAreWeSendingRequest(false).setPrivateKey(null).setSupportSignature(false).setServletResponse(response);
holder.setPostBindingRequested(true);
if (this.signOutgoingMessages) {
holder.setPrivateKey(keyManager.getSigningKey()).setSupportSignature(true);
}
if (strictPostBinding)
holder.setStrictPostBinding(true);
webRequestUtil.send(holder);
} catch (ParsingException e1) {
throw new ServletException(e1);
} catch (GeneralSecurityException e) {
throw new ServletException(e);
}
}
@Override
protected void doGet(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException {
resp.sendError(HttpServletResponse.SC_METHOD_NOT_ALLOWED);
}
protected static class SessionHolder {
String samlRequest;
String signature;
public SessionHolder(String req, String sig) {
this.samlRequest = req;
this.signature = sig;
}
}
protected boolean validate(String remoteAddress, String queryString, SessionHolder holder, boolean isPost)
throws IOException, GeneralSecurityException {
if (holder.samlRequest == null || holder.samlRequest.length() == 0) {
return false;
}
if (!this.ignoreIncomingSignatures && !isPost) {
String sig = holder.signature;
if (sig == null || sig.length() == 0) {
log.error("Signature received from SP is null:" + remoteAddress);
return false;
}
// Check if there is a signature
byte[] sigValue = RedirectBindingSignatureUtil.getSignatureValueFromSignedURL(queryString);
if (sigValue == null)
return false;
PublicKey validatingKey;
try {
validatingKey = keyManager.getValidatingKey(remoteAddress);
} catch (TrustKeyConfigurationException e) {
throw new GeneralSecurityException(e.getCause());
} catch (TrustKeyProcessingException e) {
throw new GeneralSecurityException(e.getCause());
}
return RedirectBindingSignatureUtil.validateSignature(queryString, validatingKey, sigValue);
} else {
// Post binding no signature verification. The SAML message signature is verified
return true;
}
}
public void testPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {
this.doPost(request, response);
}
private void setRoleGenerator(String rgName) {
try {
Class> clazz = SecurityActions.loadClass(getClass(), rgName);
roleGenerator = (RoleGenerator) clazz.newInstance();
} catch (Exception e) {
throw new RuntimeException(e);
}
}
}