Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

File(s): conf/relying-party.xml

Format: Native Spring

Table of Contents
maxLevel2

Overview

The SAML2.ECP profile configuration bean enables support for the SAML 2.0 Enhanced Client/Proxy profile (the mobile / non-browser SSO interface).

...

The most typical options used are described in more detail below, but not every obscure option is discussed. See the javadoc for all of the possible configuration options for this profile (note that many of them are inherited from parent classes).

Virtually all the configuration options below can be set via two different properties: a static property that explicitly sets the value to use and a lookup strategy or predicate property that takes a Function or Predicate and returns the value to use. The dynamic property is generally named "propertyNamePredicate" or "propertyNameLookupStrategy" for Boolean- and non-Boolean-valued properties respectively.

Localtabgroupexpand
Localtab live
titleCommon
Include Page
ProfileConfiguration-Common
ProfileConfiguration-Common
localtab-live
Authentication
Expand
title
SAML
Include Page
ProfileConfiguration-
Authentication
SAML
ProfileConfiguration-
Authentication
SAML
localtab-live
Expand
titleSAML 2.0
Include Page
ProfileConfiguration-
SAML
SAML2
ProfileConfiguration-
SAML
SAML2
localtab-live
2.0
Expand
titleSAML
Assertion
Include Page
ProfileConfiguration-
SAML2
SAMLAssertion
ProfileConfiguration-
SAML2
SAMLAssertion
localtab-live
Artifact
Expand
titleSAML
2.0 SSO
Include Page
ProfileConfiguration-
Artifact
SAML2SSO
ProfileConfiguration-
Artifact
SAML2SSO
localtab-live
ProfileConfiguration-SAML2SSO

ECP-specific settings:

Expand
titleProfile-Specific
Include Page
ProfileConfiguration-SAML2SSO

Name

Type

Description

localEvents

Collection<String>

Identifies webflow events that should be handled without use of a SOAP fault

Notes

The default value of signResponses for this profile is "true", in keeping with modern best practice. As long as one of the response or assertion are signed, use of the profile is "safe" in terms of authentication integrity, but there are vulnerabilities in XML Encryption that make signing responses advisable when the most common encryption algorithms are used. Some of the backstory around the signing defaults is discussed in this thread.

...

If you encounter a relying party that accepts an unsigned response and assertion that is transmitted via POST (and not artifact)the ECP profile, you have identified an insecure implementation and should report the issue immediately while following your local security incident response process.

...