Return-Path: X-Original-To: apmail-cxf-commits-archive@www.apache.org Delivered-To: apmail-cxf-commits-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 6FB4395CE for ; Mon, 25 Jun 2012 12:05:33 +0000 (UTC) Received: (qmail 81909 invoked by uid 500); 25 Jun 2012 11:48:42 -0000 Delivered-To: apmail-cxf-commits-archive@cxf.apache.org Received: (qmail 81654 invoked by uid 500); 25 Jun 2012 11:48:31 -0000 Mailing-List: contact commits-help@cxf.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cxf.apache.org Delivered-To: mailing list commits@cxf.apache.org Received: (qmail 81385 invoked by uid 99); 25 Jun 2012 11:48:21 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 25 Jun 2012 11:48:21 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 25 Jun 2012 11:48:18 +0000 Received: from eris.apache.org (localhost [127.0.0.1]) by eris.apache.org (Postfix) with ESMTP id E3AD523889E0 for ; Mon, 25 Jun 2012 11:47:58 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r823098 - in /websites/production/cxf/content: cache/docs.pageCache docs/saml-web-sso.html Date: Mon, 25 Jun 2012 11:47:58 -0000 To: commits@cxf.apache.org From: buildbot@apache.org X-Mailer: svnmailer-1.0.8-patched Message-Id: <20120625114758.E3AD523889E0@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: buildbot Date: Mon Jun 25 11:47:58 2012 New Revision: 823098 Log: Production update by buildbot for cxf Modified: websites/production/cxf/content/cache/docs.pageCache websites/production/cxf/content/docs/saml-web-sso.html Modified: websites/production/cxf/content/cache/docs.pageCache ============================================================================== Binary files - no diff available. Modified: websites/production/cxf/content/docs/saml-web-sso.html ============================================================================== --- websites/production/cxf/content/docs/saml-web-sso.html (original) +++ websites/production/cxf/content/docs/saml-web-sso.html Mon Jun 25 11:47:58 2012 @@ -125,7 +125,7 @@ Apache CXF -- SAML Web SSO +

Introduction

@@ -137,7 +137,7 @@ Apache CXF -- SAML Web SSO

The following components are required to get SSO supported:

-
  • Identity Provider (IDP) supporting SAML SSO
  • Request Assertion Consumer Service (RACS)
  • Application Security Filter
  • SSO State Provider
+
  • Identity Provider (IDP) supporting SAML SSO
  • Request Assertion Consumer Service (RACS)
  • Service Provider Security Filter
  • SSO State Provider

The following sections will describe these components in more details

@@ -147,13 +147,13 @@ Apache CXF -- SAML Web SSO

Typically, the following flow represents the way SAML SSO is enforced:

1. User accesses a custom application for the first time
-2. Application Security Filter checks if the security context is available
+2. Service Provider Security Filter checks if the security context is available
and redirects the user to IDP with a SAML SSO request
3. IDP challenges the user with the authentication dialog and redirects the user to
Request Assertion Consumer Service (RACS) after the user has authenticated
4. RACS validates the response from IDP, establishes a security context and redirects the user
to the original application endpoint
-5. Application Security Filter enforces that a valid security context is available and lets the user
+5. Service Provider Security Filter enforces that a valid security context is available and lets the user
access the custom application.

Maven dependencies

@@ -169,8 +169,17 @@ Apache CXF -- SAML Web SSO

Identity Provider

-

Request Assertion Security Service

+ +

Identity Provider (IDP) is the service which accepts the redirect requests from application security filters, authenticates users and redirects them back to Request Assertion Security Service.

+ +

CXF does not offer its own IDP SAML Web SSO implementation but might provide it in the future as part of the Fediz project.

+ +

However, CXF has been tested against a number of popular IDP implementations which support SAML SSO and thus should be interoperable with whatever IDP is being used in the specific production environment. The interoperability tests have shown that some IDPs may process SAML request and produce SAML response data the way which may not be exactly specification-compliant and thus CXF Request Assertion Consumer Service (RACS) and Service Provider Security Filter implementations have a number of configuration properties for adjusting the way SAML requests to IDP are prepared and SAML responsed from IDP are processed.

+

Application Security Filter

+ +

Request Assertion Security Service

+

SSO State Provider