import edu.internet2.middleware.shibboleth.common.profile.ProfileException;
import edu.internet2.middleware.shibboleth.common.profile.ProfileResponse;
import edu.internet2.middleware.shibboleth.common.relyingparty.RelyingPartyConfiguration;
-import edu.internet2.middleware.shibboleth.common.relyingparty.saml2.AbstractSAML2ProfileConfiguration;
-import edu.internet2.middleware.shibboleth.common.relyingparty.saml2.SSOConfiguration;
+import edu.internet2.middleware.shibboleth.common.relyingparty.provider.saml2.AbstractSAML2ProfileConfiguration;
+import edu.internet2.middleware.shibboleth.common.relyingparty.provider.saml2.SSOConfiguration;
import edu.internet2.middleware.shibboleth.idp.authn.AuthenticationManager;
import edu.internet2.middleware.shibboleth.idp.authn.LoginContext;
import edu.internet2.middleware.shibboleth.idp.authn.Saml2LoginContext;
* On Error.
*/
protected Response evaluateRequest(final AuthnRequest authnRequest,
- final Issuer issuer, final HttpSession session,
+ String issuer, final HttpSession session,
final RelyingPartyConfiguration relyingParty,
final SSOConfiguration ssoConfig, final SPSSODescriptor spDescriptor)
throws ProfileException {
* The SPSSODescriptor for the ssoConfig.
*/
protected void storeRequestData(final HttpSession session,
- final AuthnRequest authnRequest, final Issuer issuer,
+ final AuthnRequest authnRequest, String issuer,
final RelyingPartyConfiguration relyingParty,
final SSOConfiguration ssoConfig, final SPSSODescriptor spDescriptor) {
* Will be populated with the SPSSODescriptor for the ssoConfig.
*/
protected void retrieveRequestData(final HttpSession session,
- AuthnRequest authnRequest, Issuer issuer,
+ AuthnRequest authnRequest, String issuer,
RelyingPartyConfiguration relyingParty, SSOConfiguration ssoConfig,
SPSSODescriptor spDescriptor) {
authnRequest = (AuthnRequest) session
.getAttribute(AUTHNREQUEST_SESSION_KEY);
- issuer = (Issuer) session.getAttribute(ISSUER_SESSION_KEY);
+ issuer = (String) session.getAttribute(ISSUER_SESSION_KEY);
relyingParty = (RelyingPartyConfiguration) session
.getAttribute(RPCONFIG_SESSION_KEY);
ssoConfig = (SSOConfiguration) session
* on error.
*/
protected void verifyAuthnRequest(final AuthnRequest authnRequest,
- Issuer issuer, final RelyingPartyConfiguration relyingParty,
+ String issuer, final RelyingPartyConfiguration relyingParty,
final HttpSession session) throws AuthenticationRequestException {
Status failureStatus;
// Check if we are in scope to handle this AuthnRequest
- checkScope(authnRequest, issuer.getSPProvidedID());
+ checkScope(authnRequest, issuer);
// XXX: run signature checks on authnRequest
import edu.internet2.middleware.shibboleth.common.profile.ProfileRequest;
import edu.internet2.middleware.shibboleth.common.profile.ProfileResponse;
import edu.internet2.middleware.shibboleth.common.relyingparty.RelyingPartyConfiguration;
-import edu.internet2.middleware.shibboleth.common.relyingparty.saml2.SSOConfiguration;
+import edu.internet2.middleware.shibboleth.common.relyingparty.provider.saml2.SSOConfiguration;
import org.apache.log4j.Logger;
import org.opensaml.common.SAMLObject;
HttpSession httpSession = httpRequest.getSession();
AuthnRequest authnRequest = null;
- Issuer issuer = null;
+ String issuer = null;
MetadataProvider metadataProvider = null;
- String providerId = null;
RelyingPartyConfiguration relyingParty = null;
SSOConfiguration ssoConfig = null;
SPSSODescriptor spDescriptor = null;
throw new ProfileException("SAML 2 AuthnRequest: No MessageDecoder registered for " + BINDING_URI);
}
- decoder.setMetadataProvider(getRelyingPartyConfigurationManager().getMetadataProvider());
+ decoder.setMetadataProvider(getMetadataProvider());
populateMessageDecoder(decoder);
decoder.decode();
}
authnRequest = (AuthnRequest) samlObject;
- issuer = (Issuer) decoder.getSecurityPolicy().getIssuer();
+ issuer = decoder.getSecurityPolicy().getIssuer();
// check that we have metadata for the RP
metadataProvider = getRelyingPartyConfigurationManager().getMetadataProvider();
- providerId = issuer.getSPProvidedID();
- relyingParty = getRelyingPartyConfigurationManager().getRelyingPartyConfiguration(providerId);
+ relyingParty = getRelyingPartyConfigurationManager().getRelyingPartyConfiguration(issuer);
ssoConfig = (SSOConfiguration) relyingParty.getProfileConfigurations().get(SSOConfiguration.PROFILE_ID);
try {
} catch (MetadataProviderException ex) {
log.error(
"SAML 2 Authentication Request: Unable to locate metadata for SP "
- + providerId + " for protocol "
- + SAML20_PROTOCOL_URI, ex);
+ + issuer + " for protocol " + SAML20_PROTOCOL_URI, ex);
throw new ProfileException("SAML 2 Authentication Request: Unable to locate metadata for SP "
- + providerId + " for protocol "
- + SAML20_PROTOCOL_URI, ex);
+ + issuer + " for protocol " + SAML20_PROTOCOL_URI, ex);
}
if (spDescriptor == null) {
log.error("SAML 2 Authentication Request: Unable to locate metadata for SP "
- + providerId
- + " for protocol "
- + SAML20_PROTOCOL_URI);
+ + issuer + " for protocol " + SAML20_PROTOCOL_URI);
throw new ProfileException("SAML 2 Authentication Request: Unable to locate metadata for SP "
- + providerId
- + " for protocol "
- + SAML20_PROTOCOL_URI);
+ + issuer + " for protocol " + SAML20_PROTOCOL_URI);
}
verifyAuthnRequest(authnRequest, issuer, relyingParty, httpSession);