-
Notifications
You must be signed in to change notification settings - Fork 144
Updates _sp_authn_requests_signed_alg to work with multiple bindings #142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…REDIRECT and BINDING_HTTP_POST bindings.
32f2050
to
85298be
Compare
I think that would be better enable this feature in pySAML2, made a related PR here: |
Hi @mobleyc, have you seen the pySAML2 PR I referenced, would you like to spend some words on? |
Hi @mobleyc As far I tested the signed authentication requests in pySAML2 works in HTTP_POST binding and there we have this check. Is there some tests that you would like to share here? |
0dcbdc6
to
02515a2
Compare
Hi the issue I encountered is not signing, it's the ability to configure the signing algorithm. Currently this line. ADFS uses sha256 by default and there is not way to override this using the BINDING_HTTP_POST binding. I can add a comment to the pySAML ticket in support of the PR if that helps. And thank you for your help with this! |
Thank you @mobleyc, I have fixed this features, because I use SHA256 in djangosaml2 in a federation that want it, with that PR you find in pySAML2. Regarding the general refactor you've done I think that's quite good. So if you are ready for that I would ask you to have a test with the current master branch of djangosaml2, because with the current implementation if a signing is required it alway rely on HTTP_POST, see: Do a test then we decide what to do, I would accept your PR with pleasure, |
I think that also this should be considered |
Hi, please can you fix the conflicting files? |
4c6e98f
to
31e9254
Compare
Due to missing reply but thank you for your idea |
_sp_authn_requests_signed_alg
allows overriding the algorithm used with SignatureMethod but currently only works with theBINDING_HTTP_REDIRECT
. This change enables its use for bothBINDING_HTTP_REDIRECT
andBINDING_HTTP_POST
, during login and its use during logout.The motivation for this change is ADFS defaults to requiring SHA256.
This change was tested with Apache Shibboleth and ADFS on Windows Server 2012.