2024-09-06
Shibboleth Developer's Meeting, 2024-09-06
Call Administrivia
09:00 Central US / 10:00 Eastern US / 15:00 UK / 17:00 FI
Calls are normally the 1st and 3rd Fridays of each month. Next call would be Friday 2024-09-20. Any reason to deviate from this?
60 to 90 minute call window.
Call Details
This week's call will use the Zoom system at GU, see ZoomGU for access info.
AGENDA
Converting our download links to https
Brief? discussion re: lint tooling via Maven
Some sanity checking on my SP session design thoughts
Attendees:
Brent
Daniel
Henri
JOIDC-223: IDP Session (cookies) not created after OIDC Login in IDP Version 5.1.3 Resolved
Now uses HttpServletResponse.sendRedirect(..) whenever Location-header has a value
The bug is also reported to Nimbus
Finalising OP 4.2
The two major features (PAR and dPoP) are reported to be working as expected
JOIDC-222: Support for OpenID FederationIn Progress
Working on fetching and validation of trust chains (RP → superior authorities → trust anchors)
DynamicMetadataCache seems to be a good building block
Ian
John
Generated several pages of thoughts about how a cpp-linbuild/ECR integration should work. Almost have a plan that seems sane and implementable.
Looks valid
Currently wrestling with Red Hat Developer Program renewal nonsense
Marvin
Phil
GEN-337: Analyse code base for boxed primitive comparisons using reference operatorsOpen
Think that is done (manually) across the ‘core’ code base.
JWEBAUTHN-21: IdP does not start with a non-existing fido metadata cache fileClosed
Not sure why this is working differently than other file resources in the IdP. Need to look at it
JWEBAUTHN-26: Allow metadata to be attached to registrations retroactivelyClosed
Need to store the AAGUI (authenticator GUID) if present to attach metadata retrospectively.
JWEBAUTHN-24: Make user.name configurableClosed and JWEBAUTHN-25: Have username/password login during registration pre-fill the username fieldOpen
Critical to a v1. I think I need to:
Integrate c14n into the username collection steps. Otherwise the credential is registered against a principal name and the user can enter a different username into the view which will not match to a credential (and it will fail).
De-couple the internal username/principalName used for registration v what is sent to the authenticator (although less sure about this atm)
Rod
Busy on other projects
Scripting plugin release for latest version Rhino
JDBC plugin release for a couple of bugs.
Considering a jetty-12.13 msi build
Scott
Turning around a very small TOTP plugin update
Identified a bug in the attribute library targeted at IdP 5.2
Work ongoing on SAML assertion consumer service flow based on back-half of proxy flow
Per Slack, all but the very final bits have been reused or very lightly adapted/adjusted code from the IdP, I’m up to the “what do I do with the data and what do I send back to the agent” step, which is all new design work.
Working assumption is a series of configured subflows that get a shot at handling a request and first one to activate wins and either succeeds or the response fails
Each supported binding is its own subflow, and the master flow provides a single response endpoint for all protocols
Split off the SAML flows in progress into a new plugin project so base plugin is now protocol-less
Creates some hassle in the new agents config file for controlling protocols to enable since we can’t default in any, but the alternative would be to assume SAML or OpenID in the base plugin
Tom
Disabled IdP V4 Jenkins jobs
Test IdP V5 only with Jetty 12 (not Jetty 11)
Added RP plugin test
Anything we should test besides proxy authentication ?
Other