SAML 2.0 和 ADFS 2.0 需要帮助!
在尝试学习 ADFS 2.0 环境时,我使用 Visual Studio 2010 创建了一个空的 ASP.NET 声明感知应用程序作为 RP。
使用 ADFS 2.0,我执行了以下操作:
- 使用“添加依赖方信任”创建了 SAML 2.0 依赖方。 ..' 向导
- 使用“添加声明提供者信任...”向导创建了 SAML 2.0 声明提供者
现在我执行了以下步骤:
- 将浏览器指向 http://localhost/adfs/IdpInitiatedSignOn.aspx
- 从组合框中选择步骤 1 中定义的 RP 作为要登录的站点。
- 在下一页中从组合框中选择步骤 2 中定义的 IDP框作为验证站点。
- 单击“继续登录”,
ADFS 2.0 现在将我重定向到为 IDP 配置的 URL,并且 SAMLRequest 附加到该请求。 (这很好)
但是,到达 IDP 的 SAML 请求不包含任何 ACS URL(更技术地说,没有“AssertionConsumerServiceURL”的 XML 节点),
ACS URL 不是 SAML 请求中的强制属性吗?
谢谢 ! 约阿什
While trying to learn the ADFS 2.0 environment, I created an empty ASP.NET Claims aware application to be the RP using Visual Studio 2010.
using ADFS 2.0 I did the following:
- Created a SAML 2.0 relying party using the 'Add Relying Party Trust...' wizard
- Created a SAML 2.0 Claim Provider using the 'Add Claims Provider Trust...' wizard
Now I did the following steps:
- Pointed browser to http://localhost/adfs/IdpInitiatedSignOn.aspx
- Selected the RP defined in step 1 from combo box as the site to sign in.
- Selected in the next page the IDP defined in step 2 from combo box as the authenticating site.
- Clicked 'Continue to Sign in'
The ADFS 2.0 now, redirects me to the URL configured for the IDP and a SAMLRequest is attached to the request. (which is great)
However, The SAML Request arrived to IDP does not contain any ACS URL (More techninally, there is no XML node of "AssertionConsumerServiceURL"),
Isn't ACS URL is mandatory attribute in SAML Request?
Thanks !
Yoash
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
不,ACS URL 不是 SAML 2.0 AuthnRequest 中的强制属性。当您在 IDP 和 SP 之间设置信任关系时,通常会在元数据中交换此信息。如果存在 ACS URL 或 ACS 索引(必须与元数据相同或 AuthnRequest 必须经过数字签名),这会简化 IDP 必须执行的安全检查。
如果您想了解更多信息,我们已经通过 STS 与 MS WIF/WCF 索赔感知应用程序以及 SAML 2.0 与 ADFSv2 进行了大量互操作工作。
No, the ACS URL is not a mandatory attribute in a SAML 2.0 AuthnRequest. This information is typically exchanged in the meta-data when you setup the trust relationship between the IDP and SP. This simplifies the security check the IDP must do if the ACS URL or ACS Index is present (must be the same as the meta-data or AuthnRequest MUST be digitally signed).
We've done quite a bit of interop work with MS WIF/WCF Claims aware applications via our STS as well as SAML 2.0 with ADFSv2 if you'd like some more information.