[security-dev] SAML SSO with signatures error

Eric Wittmann eric.wittmann at redhat.com
Tue Jun 24 14:52:25 EDT 2014


Hi guys.

I'm using the EAP IDP Valve with the SPFilter servlet filter running on 
EAP 6.3.0 to implement web SSO.  It works fine without signatures, but 
now I'm trying to enable signatures on the IDP (meaning I want the IDP 
to sign the saml response and I want the SPFilter to verify the sig). 
I'm using picketlink 2.5.3.SP1 packaged into the SP WAR.  I'm using 
whatever picketlink version comes with EAP 6.3 (2.5.3.SP5 I think).

I currently have two problems.  The first is that the SPFilter does this 
in the verifySignature() method:

         URL issuerURL;
         try {
             issuerURL = new URL(issuerID);
         } catch (MalformedURLException e1) {
             throw new IssuerNotTrustedException(e1);
         }

This code fails for me because the issuerID in the saml response is 
"/overlord-idp/".  I haven't dug into this yet, but I imagine I need to 
tweak something on the IDP to get it to put in a full issuer into the 
saml response.

I can get past that with the debugger (by modifying the issuerID value) 
but when I do I hit the following stack trace:

https://gist.github.com/EricWittmann/f05b65689367ba321fc8

The Signature in the saml response seems ok when I eyeball it.  That 
stack trace is pretty opaque to me - does anyone have any insight into it?

-Eric


More information about the security-dev mailing list