450 Commits

Author SHA1 Message Date
Sander van Schouwenburg
14d0663ae2 Preserve order of RelyingPartRegistration credentials
Issue gh-10799
2022-03-02 16:37:58 -07:00
Josh Cummings
346038d66c Polish Formatting
Issue gh-10799
2022-03-02 16:36:23 -07:00
Sander van Schouwenburg
c734b4b39e Preserve order of RelyingPartRegistration credentials
Issue gh-10799
2022-03-02 16:36:23 -07:00
Josh Cummings
5b9a45de01 Replace Apache Commons Base64 Decoding
Issue gh-10923
2022-03-02 16:30:21 -07:00
Josh Cummings
0b59e7797d Use RFC2045 Encoding for SAML 2.0 Logout
Closes gh-10923
2022-03-02 16:30:21 -07:00
Josh Cummings
7a02bd14c1 Replace Apache Commons Base64 Decoding
Issue gh-10923
2022-03-02 16:19:03 -07:00
Josh Cummings
238616da80 Use RFC2045 Encoding for SAML 2.0 Logout
Closes gh-10923
2022-03-02 16:18:34 -07:00
Josh Cummings
4ede1feae5 Polish Saml2 Jackson Support
Issue gh-10905
2022-03-01 14:17:17 -07:00
Ulrich Grave
2334610fa9 Add Jackson Support for Saml2 Module
Closes gh-10905
2022-03-01 14:17:17 -07:00
Josh Cummings
6c3d183a94 Polish Saml2 Jackson Support
Issue gh-10905
2022-03-01 13:56:02 -07:00
Ulrich Grave
df84826c95 Add Jackson Support for Saml2 Module
Closes gh-10905
2022-03-01 12:07:55 -07:00
Filip Hanik
47871562ca Change HashSet to LinkedHashSet
For various RelyingPartyRegistration.credentials to preserve order of insertion.

Issue gh-10799
2022-02-28 15:02:03 -07:00
Filip Hanik
6e5bb71466 Change HashSet to LinkedHashSet
For various RelyingPartyRegistration.credentials to preserve order of insertion.

Issue gh-10799
2022-02-28 15:01:58 -07:00
Filip Hanik
70b52a001b Change HashSet to LinkedHashSet
For various RelyingPartyRegistration.credentials to preserve order of insertion.

Issue gh-10799
2022-02-28 14:57:04 -07:00
Josh Cummings
6dbd88a5a4 Remove WantAssertionsSigned
WantAssertionsSigned requires that asserting parties sign the
assertions. This does not reflect how Spring Security actually
behaves, creating behavior mismatches.

Closes gh-10844
2022-02-22 08:14:05 -07:00
Josh Cummings
3d878549f4 Remove WantAssertionsSigned
WantAssertionsSigned requires that asserting parties sign the
assertions. This does not reflect how Spring Security actually
behaves, creating behavior mismatches.

Closes gh-10844
2022-02-18 11:43:25 -07:00
Josh Cummings
b451ede189 Add Skipping Decryption Error Message
Closes gh-10220
2022-02-16 16:43:31 -07:00
Josh Cummings
c6e5781679 Correct Test
Issue gh-10220
2022-02-16 16:43:31 -07:00
Josh Cummings
5cda362c47 Collect All Validation Errors
- OpenSaml4AuthenticationProvider now collects all validation errors
instead of treating some as their own exception

Issue gh-10220
2022-02-16 16:43:31 -07:00
Josh Cummings
97c18478e5 Add Skipping Decryption Error Message
Closes gh-10220
2022-02-16 16:10:36 -07:00
Josh Cummings
399562b2a8 Correct Test
Issue gh-10220
2022-02-16 16:10:36 -07:00
Josh Cummings
836335dc89 Collect All Validation Errors
- OpenSaml4AuthenticationProvider now collects all validation errors
instead of treating some as their own exception

Issue gh-10220
2022-02-16 16:10:19 -07:00
Josh Cummings
b4dbcd6b2d Add OpenSamlAssertingPartyDetails
Closes gh-10781
2022-02-07 14:43:06 -07:00
Josh Cummings
541a1e48b3 Add OpenSamlAssertingPartyDetails
Closes gh-10781
2022-02-07 14:42:17 -07:00
Josh Cummings
28747ca89c Fix Checkstyle Error
Issue gh-9696
2022-02-04 20:07:41 -07:00
Josh Cummings
5c4178beb7 Fix Checkstyle Error
Issue gh-9696
2022-02-04 20:07:17 -07:00
Josh Cummings
e8be907edf Polish Testing for Custom Attributes Values
- Moved construction and management of custom objects
into TestCustomOpenSamlObjects

Issue gh-9696
2022-02-04 20:04:03 -07:00
pelesic
f626d11c6e Add OpenSaml custom types to Saml2AuthenticatedPrincipal
OpenSaml custom types are added to Saml2AutehnticatedPrincipal as
attributes.

Closes gh-9696
2022-02-04 20:04:03 -07:00
Josh Cummings
70bb588a25 Polish Testing for Custom Attributes Values
- Moved construction and management of custom objects
into TestCustomOpenSamlObjects

Issue gh-9696
2022-02-04 19:57:54 -07:00
pelesic
3cc7f384e6 Add OpenSaml custom types to Saml2AuthenticatedPrincipal
OpenSaml custom types are added to Saml2AutehnticatedPrincipal as
attributes.

Closes gh-9696
2022-02-04 13:41:41 -07:00
Josh Cummings
965e689461 Add EntitiesDescriptor Support
Closes gh-10782
2022-01-31 13:32:12 -07:00
Josh Cummings
4095d89bb3 Add EntitiesDescriptor Support
Closes gh-10782
2022-01-31 13:13:21 -07:00
Josh Cummings
60eead9ceb Add Session Index Support
Closes gh-10613
2022-01-28 12:21:44 -07:00
Josh Cummings
b1a905befe Add Session Index Support
Closes gh-10613
2022-01-28 12:14:06 -07:00
Josh Cummings
df3593f2dd Deprecate Saml2 AuthnRequest Classes
Issue gh-10355
2022-01-24 16:18:33 -07:00
Josh Cummings
5a2556879a Add Saml2AuthenticationRequestResolver
Closes gh-10355
2022-01-24 16:18:33 -07:00
Josh Cummings
620081ea9a Deprecate Saml2 AuthnRequest Classes
Issue gh-10355
2022-01-24 15:16:15 -07:00
Josh Cummings
d538423f98 Add Saml2AuthenticationRequestResolver
Closes gh-10355
2022-01-24 15:09:45 -07:00
Marcus Da Coregio
861368bda5 Make Saml2AuthenticationRequests serializable
Closes gh-10550
2022-01-24 09:24:33 -03:00
Marcus Da Coregio
cca35bdd93 Make Saml2AuthenticationRequests serializable
Closes gh-10550
2022-01-24 08:55:26 -03:00
Rob Winch
c67ee6f2a8 javax.servlet:javax.servlet-api -> jakarta.servlet:jakarta.servlet-api
Issue gh-10501
2022-01-19 15:32:12 -06:00
Rob Winch
8f64bb6c8c javax.servlet:javax.servlet-api -> jakarta.servlet:jakarta.servlet-api
Issue gh-10501
2022-01-19 14:33:53 -06:00
Josh Cummings
20c252982e Remove SAML 2.0 Logout Default
Closes gh-10607
2022-01-14 15:29:50 -07:00
Josh Cummings
d493598e17 Polish LogoutRequest#EncryptedID Support
Issue gh-10663
2022-01-14 14:47:45 -07:00
Robert Stoiber
c1bea329ba Enabled SAML LogoutRequests with EncryptedID
The OpenSamlLogoutRequestValidator validates the subject to be logged out.
Formerly this was done only using the NameID from the OpenSamlLogoutRequest.
Now the EncryptedID is also supported, Since the SAML2 Standard also allows
the EncryptedID as subject identifiers,

- added EncryptedID as valid subject in OpenSamlLogoutRequestValidator
- added test

Closes gh-10663
2022-01-14 14:47:36 -07:00
Josh Cummings
3c45d46bd7 Polish LogoutRequest#EncryptedID Support
Issue gh-10663
2022-01-14 14:44:24 -07:00
Robert Stoiber
700cae8d3b Enabled SAML LogoutRequests with EncryptedID
The OpenSamlLogoutRequestValidator validates the subject to be logged out.
Formerly this was done only using the NameID from the OpenSamlLogoutRequest.
Now the EncryptedID is also supported, Since the SAML2 Standard also allows
the EncryptedID as subject identifiers,

- added EncryptedID as valid subject in OpenSamlLogoutRequestValidator
- added test

Closes gh-10663
2022-01-14 14:44:11 -07:00
Josh Cummings
c664fbc1a3 Support No SingleLogoutServiceLocation
Closes gh-10674
2022-01-03 13:38:47 -07:00
Josh Cummings
45b7fed884 Remove SAML 2.0 Logout Default
Closes gh-10607
2022-01-03 13:14:12 -07:00
Josh Cummings
cb008fa062 Support No SingleLogoutServiceLocation
Closes gh-10674
2022-01-03 13:14:06 -07:00