Return-Path: X-Original-To: archive-asf-public-internal@cust-asf2.ponee.io Delivered-To: archive-asf-public-internal@cust-asf2.ponee.io Received: from cust-asf.ponee.io (cust-asf.ponee.io [163.172.22.183]) by cust-asf2.ponee.io (Postfix) with ESMTP id 13EC4200CDF for ; Thu, 17 Aug 2017 15:15:53 +0200 (CEST) Received: by cust-asf.ponee.io (Postfix) id 121D516ADD9; Thu, 17 Aug 2017 13:15:53 +0000 (UTC) Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by cust-asf.ponee.io (Postfix) with SMTP id 7F71816ADD4 for ; Thu, 17 Aug 2017 15:15:52 +0200 (CEST) Received: (qmail 86825 invoked by uid 500); 17 Aug 2017 13:15:50 -0000 Mailing-List: contact dev-help@syncope.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@syncope.apache.org Delivered-To: mailing list dev@syncope.apache.org Received: (qmail 86814 invoked by uid 99); 17 Aug 2017 13:15:50 -0000 Received: from mail-relay.apache.org (HELO mail-relay.apache.org) (140.211.11.15) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 17 Aug 2017 13:15:50 +0000 Received: from [192.168.0.3] (93-56-25-79.ip287.fastwebnet.it [93.56.25.79]) by mail-relay.apache.org (ASF Mail Server at mail-relay.apache.org) with ESMTPSA id 2FA301A00A2 for ; Thu, 17 Aug 2017 13:15:48 +0000 (UTC) Subject: Re: IdP initiated SAML SSO To: dev@syncope.apache.org References: From: =?UTF-8?Q?Francesco_Chicchiricc=c3=b2?= Message-ID: <693836e4-7cde-e5ca-c7e3-77284c8a4765@apache.org> Date: Thu, 17 Aug 2017 15:15:45 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US archived-at: Thu, 17 Aug 2017 13:15:53 -0000 On 15/08/2017 18:38, Colm O hEigeartaigh wrote: > Currently, Syncope only supports RP-initiated SAML SSO. It would be nice to > support IdP initiated SAML SSO as well. > > I have got this working in an interop test with Okta, by commenting out the > RelayState processing, and removing passing > relayState.getJwtClaims().getSubject() through to the validation process. > > Any thoughts on how best to handle this scenario? Add a configuration > switch to allow the IdP initiated flow for a given IdP? Hi Colm, the relay state processing and validation could be optionally disabled according to some switch passed to the Agent by the IdP itself (as a request param, for example) and then added by the Agent into the REST call which ends up in SAML2SPLogic. Having a further setting for IdP conf to explicitly authorize IdP-initiated scenarios makes sense too, to me. Regards. -- Francesco Chicchiriccò Tirasa - Open Source Excellence http://www.tirasa.net/ Member at The Apache Software Foundation Syncope, Cocoon, Olingo, CXF, OpenJPA, PonyMail http://home.apache.org/~ilgrosso/