diff --git a/samples/boot/saml2login/src/integration-test/java/org/springframework/security/saml2/provider/service/authentication/Saml2LoginIntegrationTests.java b/samples/boot/saml2login/src/integration-test/java/org/springframework/security/saml2/provider/service/authentication/Saml2LoginIntegrationTests.java index c2b8abde21..eead28c3c6 100644 --- a/samples/boot/saml2login/src/integration-test/java/org/springframework/security/saml2/provider/service/authentication/Saml2LoginIntegrationTests.java +++ b/samples/boot/saml2login/src/integration-test/java/org/springframework/security/saml2/provider/service/authentication/Saml2LoginIntegrationTests.java @@ -124,7 +124,7 @@ public class Saml2LoginIntegrationTests { public void authenticateRequestWhenUnauthenticatedThenRespondsWithRedirectAuthNRequestXML() throws Exception { mockMvc.perform(get("http://localhost:8080/saml2/authenticate/simplesamlphp")) .andExpect(status().is3xxRedirection()) - .andExpect(header().string("Location", startsWith("https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php?SAMLRequest="))); + .andExpect(header().string("Location", startsWith("https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/SSOService.php?SAMLRequest="))); } @Test @@ -136,7 +136,7 @@ public class Saml2LoginIntegrationTests { .param("OtherParam2", "OtherParamValue2") ) .andExpect(status().is3xxRedirection()) - .andExpect(header().string("Location", startsWith("https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php?SAMLRequest="))) + .andExpect(header().string("Location", startsWith("https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/SSOService.php?SAMLRequest="))) .andExpect(header().string("Location", containsString("RelayState=relay%20state%20value%20with%20spaces"))) //check order of parameters .andExpect(header().string("Location", matchesRegex(".*\\?SAMLRequest\\=.*\\&RelayState\\=.*\\&SigAlg\\=.*\\&Signature\\=.*"))); @@ -160,7 +160,7 @@ public class Saml2LoginIntegrationTests { String destination = authnRequest.getDestination(); assertEquals( "Destination must match", - "https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php", + "https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/SSOService.php", destination ); String acsURL = authnRequest.getAssertionConsumerServiceURL(); @@ -322,14 +322,14 @@ public class Saml2LoginIntegrationTests { Response response = OpenSamlActionTestingSupport.buildResponse(); response.setID("_" + UUID.randomUUID().toString()); response.setDestination("http://localhost:8080/login/saml2/sso/simplesamlphp"); - response.setIssuer(buildIssuer("https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php")); + response.setIssuer(buildIssuer("https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/metadata.php")); return response; } private Assertion buildAssertion(String username) { Assertion assertion = OpenSamlActionTestingSupport.buildAssertion(); assertion.setIssueInstant(DateTime.now()); - assertion.setIssuer(buildIssuer("https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php")); + assertion.setIssuer(buildIssuer("https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/metadata.php")); assertion.setSubject(buildSubject(username)); assertion.setConditions(buildConditions()); @@ -351,7 +351,7 @@ public class Saml2LoginIntegrationTests { final PrivateKey privateKey = KeySupport.decodePrivateKey(key.getBytes(UTF_8), new char[0]); BasicCredential cred = CredentialSupport.getSimpleCredential(publicKey, privateKey); cred.setUsageType(usageType); - cred.setEntityId("https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php"); + cred.setEntityId("https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/metadata.php"); return cred; } diff --git a/samples/boot/saml2login/src/main/resources/application.yml b/samples/boot/saml2login/src/main/resources/application.yml index afee02e6f7..6515ae4f77 100644 --- a/samples/boot/saml2login/src/main/resources/application.yml +++ b/samples/boot/saml2login/src/main/resources/application.yml @@ -8,7 +8,7 @@ spring: - private-key-location: "classpath:credentials/rp-private.key" certificate-location: "classpath:credentials/rp-certificate.crt" identityprovider: - entity-id: https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php + entity-id: https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/metadata.php verification.credentials: - certificate-location: "classpath:credentials/idp-certificate.crt" - sso-url: https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php + sso-url: https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/SSOService.php diff --git a/samples/javaconfig/saml2login/src/main/java/org/springframework/security/samples/config/SecurityConfig.java b/samples/javaconfig/saml2login/src/main/java/org/springframework/security/samples/config/SecurityConfig.java index 7d34707887..17d935d7b2 100644 --- a/samples/javaconfig/saml2login/src/main/java/org/springframework/security/samples/config/SecurityConfig.java +++ b/samples/javaconfig/saml2login/src/main/java/org/springframework/security/samples/config/SecurityConfig.java @@ -45,9 +45,9 @@ public class SecurityConfig extends WebSecurityConfigurerAdapter { @Bean RelyingPartyRegistrationRepository getSaml2AuthenticationConfiguration() throws Exception { //remote IDP entity ID - String idpEntityId = "https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php"; + String idpEntityId = "https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/metadata.php"; //remote WebSSO Endpoint - Where to Send AuthNRequests to - String webSsoEndpoint = "https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/SSOService.php"; + String webSsoEndpoint = "https://simplesaml-for-spring-saml.apps.pcfone.io/saml2/idp/SSOService.php"; //local registration ID String registrationId = "simplesamlphp"; //local entity ID - autogenerated based on URL