SamlFederationHandler
A handler to play the role of SAML 2.0 Service Provider (SP).
Note
Consider the following requirements for this handler:
This handler does not support filtering; do not use it as the handler for a chain, which can include filters.
Do not use this handler when its use depends on something in the response. The response can be handled independently of IG, and can be
null
when control returns to IG. For example, do not use this handler in aSequenceHandler
where thepostcondition
depends on the response.Requests to the SamlFederationHandler must not be rebased, because the request URI must match the endpoint in the SAML metadata.
Usage
{ "name": string, "type": "SamlFederationHandler", "config": { "assertionMapping": object, "redirectURI": string, "assertionConsumerEndpoint": string, "authnContext": string, "authnContextDelimiter": string, "logoutURI": string, "sessionIndexMapping": string, "singleLogoutEndpoint": string, "singleLogoutEndpointSoap": string, "SPinitiatedSLOEndpoint": string, "SPinitiatedSSOEndpoint": string, "subjectMapping": string } }
Properties
"assertionMapping"
: object, requiredThe assertionMapping defines how to transform attributes from the incoming assertion to attribute value pairs in IG.
Each entry in the
assertionMapping
object has the formlocalName: incomingName
, where:localName is the name of the attribute set in the session
incomingName is the name of the attribute set in the incoming assertion
The following example is an assertionMapping object:
{ "username": "mail", "password": "mailPassword" }
If the incoming assertion contains the statement:
mail = george@example.com
mailPassword = C0stanza
Then the following values are set in the session:
username = george@example.com
password = C0stanza
For this to work, edit the <Attribute name="attributeMap"> element in the SP extended metadata file,
$HOME/.openig/SAML/sp-extended.xml
, so that it matches the assertion mapping configured in the SAML 2.0 Identity Provider (IDP) metadata.Because the dot character (
.
) serves as a query separator in expressions, do not use dot characters in the localName.To prevent different handlers from overwriting each others' data, use unique localName settings when protecting multiple service providers.
"redirectURI"
: string, requiredSet this to the page that the filter used to HTTP POST a login form recognizes as the login page for the protected application.
This is how IG and the Federation component work together to provide SSO. When IG detects the login page of the protected application, it redirects to the Federation component. Once the Federation handler validates the SAML exchanges with the IDP, and sets the required session attributes, it redirects back to the login page of the protected application. This allows the filter used to HTTP POST a login form to finish the job by creating a login form to post to the application based on the credentials retrieved from the session attributes.
"assertionConsumerEndpoint"
: string, optionalDefault:
fedletapplication
(same as the Fedlet)If you modify this attribute you must change the metadata to match.
"authnContext"
: string, optionalName of the session field to hold the value of the authentication context. Because the dot character (
.
) serves as a query separator in expressions, do not use dot characters in the field name.Use this setting when protecting multiple service providers, as the different configurations must not map their data into the same fields of
session
. Otherwise different handlers can overwrite each others' data.As an example, if you set
"authnContext": "myAuthnContext"
, then IG setssession.myAuthnContext
to the authentication context specified in the assertion. When the authentication context is password over protected transport, then this results in the session containing"myAuthnContext": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport"
.Default: map to
session.authnContext
"authnContextDelimiter"
: string, optionalThe authentication context delimiter used when there are multiple authentication contexts in the assertion.
Default:
|
"logoutURI"
: string, optionalSet this to the URI to visit after the user is logged out of the protected application.
You only need to set this if the application uses the single logout feature of the Identity Provider.
"sessionIndexMapping"
: string, optionalName of the session field to hold the value of the session index. Because the dot character (
.
) serves as a query separator in expressions, do not use dot characters in the field name.Use this setting when protecting multiple service providers, as the different configurations must not map their data into the same fields of
session
. Otherwise different handlers can overwrite each others' data.As an example, if you set
"sessionIndexMapping": "mySessionIndex"
, then IG setssession.mySessionIndex
to the session index specified in the assertion. This results in the session containing something like"mySessionIndex": "s24ccbbffe2bfd761c32d42e1b7a9f60ea618f9801"
.Default: map to
session.sessionIndex
"singleLogoutEndpoint"
: string, optionalDefault:
fedletSLORedirect
(same as the Fedlet)If you modify this attribute you must change the metadata to match.
"singleLogoutEndpointSoap"
: string, optionalDefault:
fedletSloSoap
(same as the Fedlet)If you modify this attribute you must change the metadata to match.
"SPinitiatedSLOEndpoint"
: string, optionalDefault:
SPInitiatedSLO
If you modify this attribute you must change the metadata to match.
"SPinitiatedSSOEndpoint"
: string, optionalDefault:
SPInitiatedSSO
If you modify this attribute you must change the metadata to match.
"subjectMapping"
: string, optionalName of the session field to hold the value of the subject name. Because the dot character (
.
) serves as a query separator in expressions, do not use dot characters in the field name.Use this setting when protecting multiple service providers, as the different configurations must not map their data into the same fields of
session
. Otherwise different handlers can overwrite each others' data.As an example, if you set
"subjectMapping": "mySubjectName"
, then IG setssession.mySubjectName
to the subject name specified in the assertion. If the subject name is an opaque identifier, then this results in the session containing something like"mySubjectName": "vtOk+APj1s9Rr4yCka6V9pGUuzuL"
.Default: map to
session.subjectName
Example
The following sample configuration is corresponds to a scenario where IG receives a SAML 2.0 assertion from the IDP, and then logs the user in to the protected application using the username and password from the assertion:
{ "name": "SamlFederationHandler", "type": "SamlFederationHandler", "config": { "assertionMapping": { "username": "mail", "password": "mailPassword" }, "redirectURI": "/login", "logoutURI": "/logout" } }