Hi Andy,

Here are my cas.log about OIDC + delegation SAML2:

2019-02-08 09:36:20,832 DEBUG 
[org.apereo.cas.oidc.web.OidcCasClientRedirectActionBuilder] - <Final 
redirect action is [#RedirectAction# | type: REDIRECT | location: 
oidc.fr/login?service=https%3A%2F%2Fidp-oidc.fr%2Foauth2.0%2FcallbackAuthorize%3Fclient_id%3Dservice.clientId%26redirect_uri%3Dservice.redirect_uri%26acr_values%3Dtest%26response_type%3Dcode%26client_name%3DCasOAuthClient
 
| content: null |]>

2019-02-08 09:36:21,167 INFO 
[org.apereo.cas.web.flow.login.InitialFlowSetupAction] - <Setting path for 
cookies for warn cookie generator to: [/] >

2019-02-08 09:36:21,167 INFO 
[org.apereo.cas.web.flow.login.InitialFlowSetupAction] - <Setting path for 
cookies for warn cookie generator to: [/] >

2019-02-08 09:36:21,263 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: audit:unknown

WHAT: [result=Client Access 
Granted,client=IDP-SAML2,registeredService=service.clientId:^service.redirect_uri]

ACTION: DELEGATED_CLIENT_SUCCESS

APPLICATION: CAS

WHEN: Fri Feb 08 09:36:21 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

2019-02-08 09:36:21,263 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: audit:unknown

WHAT: [result=Client Access 
Granted,client=IDP-SAML2,registeredService=serviceName:^service.redirect_uri]

ACTION: DELEGATED_CLIENT_SUCCESS

APPLICATION: CAS

WHEN: Fri Feb 08 09:36:21 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

2019-02-08 09:36:21,292 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: audit:unknown

WHAT: [event=success,timestamp=Fri Feb 08 09:36:21 CET 
2019,source=RankedAuthenticationProviderWebflowEventResolver]

ACTION: AUTHENTICATION_EVENT_TRIGGERED

APPLICATION: CAS

WHEN: Fri Feb 08 09:36:21 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

2019-02-08 09:36:21,292 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: audit:unknown

WHAT: [event=success,timestamp=Fri Feb 08 09:36:21 CET 
2019,source=RankedAuthenticationProviderWebflowEventResolver]

ACTION: AUTHENTICATION_EVENT_TRIGGERED

APPLICATION: CAS

WHEN: Fri Feb 08 09:36:21 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

2019-02-08 09:46:13,526 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Storing delegated 
authentication request ticket [TST-********************] for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=redirect_uri, artifactId=null, principal=null, source=service, 
loggedOutAlready=false, format=XML, attributes={})] with properties 
[{theme=, locale=, method=, 
service=AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=redirect_uri, artifactId=null, principal=null, source=service, 
loggedOutAlready=false, format=XML, attributes={})}]>

2019-02-08 09:46:13,955 DEBUG 
[org.apereo.cas.web.DelegatedClientNavigationController] - <Redirecting 
client [IDP-SAML2] to [
https://idp-SAML2/cas/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fVJL****************&RelayState=TST-****************&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=JfBh************.....]
 
based on identifier [TST-*************************************]>

2019-02-08 09:46:13,966 DEBUG 
[org.apereo.cas.web.pac4j.SessionStoreCookieGenerator] - <Added cookie with 
name [PAC4JDELSESSION] and value [eyJ****Zw==.Elyf************]>

 

2019-02-08 09:53:06,842 DEBUG 
[org.apereo.cas.web.pac4j.SessionStoreCookieGenerator] - <Removed cookie 
with name [PAC4JDELSESSION]>

2019-02-08 09:53:06,842 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Client identifier 
could not found as part of the request parameters. Looking at relay-state 
for the SAML2 client>

 

I have an error at this moment because apereo set parameter to the 
samlRelayState and I think pac4J looked for RelayState so I modified the 
name but it is possible that is the opposite

2019-02-08 09:53:06,842 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Located delegated 
client identifier for this request as [null]>

 

2019-02-08 09:53:06,843 ERROR 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Delegated client 
identifier cannot be located in the authentication request 
[oidc.fr/login?client_name=IDP-SAML2]>

 

After I had an exception

2019-02-08 09:53:06,846 ERROR 
[org.apereo.cas.web.flow.DelegatedClientAuthenticationAction] - <>

org.apereo.cas.services.UnauthorizedServiceException:

        at 
org.apereo.cas.web.DelegatedClientWebflowManager.retrieveSessionTicketViaClientId(DelegatedClientWebflowManager.java:180)
 
~[classes/:5.3.7]

        at 
org.apereo.cas.web.DelegatedClientWebflowManager.retrieve(DelegatedClientWebflowManager.java:153)
 
~[classes/:5.3.7]

 

When I change RelayState to samlRelayState

 

2019-02-08 10:16:45,303 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Client identifier 
could not found as part of the request parameters. Looking at relay-state 
for the SAML2 client>

2019-02-08 10:16:45,303 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Located delegated 
client identifier for this request as [null]>

2019-02-08 10:16:45,305 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Located delegated 
client identifier as [TST-**************************]>

2019-02-08 10:16:45,305 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Restoring requested 
service [AbstractWebApplicationService(id=service.redirect_uri,

 originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})] back in 
the authentication flow

>

2019-02-08 10:16:45,305 DEBUG 
[org.apereo.cas.web.DelegatedClientWebflowManager] - <Removing delegated 
client identifier [TST-***************************} from registry>

 

2019-02-08 10:16:45,306 DEBUG 
[org.apereo.cas.web.flow.DelegatedClientAuthenticationAction] - <Delegated 
authentication client is [#SAML2Client# | name: IDP-ENT-test-dev3 | 
callbackUrl: https://idp-oidc

.fr/login | urlResolver: 
org.pac4j.core.http.url.DefaultUrlResolver@1a8335ef | callbackUrlResolver: 
org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@48630fdc | 
ajax

RequestResolver: 
org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@625a354d | 
redirectActionBuilder: 
org.pac4j.saml.redirect.SAML2RedirectActionBuilder@197fae8c | 
credentialsExtractor: org.pac4j.saml.cred

entials.extractor.SAML2CredentialsExtractor@1ad0dc01 | authenticator: 
org.pac4j.saml.credentials.authenticator.SAML2Authenticator@4a1d2d68 | 
profileCreator: org.pac4j.core.profile.creator.AuthenticatorProfi

leCreator@36aab35d | logoutActionBuilder: 
org.pac4j.saml.logout.SAML2LogoutActionBuilder@795e993b | 
authorizationGenerators: [] |] with service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})}

>

2019-02-08 10:16:45,307 DEBUG 
[org.apereo.cas.web.flow.DelegatedClientAuthenticationAction] - <Located 
registered service definition 
[OidcRegisteredService(super=OAuthRegisteredService(super=AbstractRegiste

redService(serviceId=^service.redirect_uri, name=service.clientId, 
theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
id=***, descript

ion=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, expirationDate=null), 
proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPo

licy@1, evaluationOrder=0, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=IDO),
 
logoutType=BACK_CHANNEL, requiredHandlers=[], 
attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[BaseOidcScopeAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(enabled=true, 
excludedAttributes=null, includeOnlyAttributes=null), 
authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null), allowedAttributes=[name, family_name, 
given_name, middle_name, nickname, preferred_username, profile, picture, 
website, gender, birthdate, zoneinfo, locale, updated_at], 
scopeName=profile)]), 
multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[mfa-duo],
 
failureMode=NONE, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false), logo=null, 
logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[]),
 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), publicKey=null, properties={}, contacts=[]), 
clientSecret=secret, clientId=androidGarClient, bypassApprovalPrompt=false, 
generateRefreshToken=true, jsonFormat=true, supportedGrantTypes=[], 
supportedResponseTypes=[]), jwks=null, signIdToken=true, 
encryptIdToken=false, idTokenEncryptionAlg=null, 
idTokenEncryptionEncoding=null, sectorIdentifierUri=null, 
subjectType=public, dynamicallyRegistered=false, implicit=false, 
dynamicRegistrationDateTime=null, scopes=[profile])] matching 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,307 DEBUG 
[org.apereo.cas.web.flow.DelegatedClientAuthenticationAction] - <Located 
registered service definition 
[OidcRegisteredService(super=OAuthRegisteredService(super=AbstractRegisteredService(serviceId=^service.redirect_uri,
 
name=service.clientId, theme=null, informationUrl=null, privacyUrl=null, 
responseType=null, id=*****, description=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, expirationDate=null), 
proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
evaluationOrder=0, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=*****),
 
logoutType=BACK_CHANNEL, requiredHandlers=[], 
attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[BaseOidcScopeAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(enabled=true, 
excludedAttributes=null, includeOnlyAttributes=null), 
authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null), allowedAttributes=[name, family_name, 
given_name, middle_name, nickname, preferred_username, profile, picture, 
website, gender, birthdate, zoneinfo, locale, updated_at], 
scopeName=profile)]), 
multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[mfa-duo],
 
failureMode=NONE, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false), logo=null, 
logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[]),
 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), publicKey=null, properties={}, contacts=[]), 
clientSecret=service.secret, clientId=service.clientId, 
bypassApprovalPrompt=false, generateRefreshToken=true, jsonFormat=true, 
supportedGrantTypes=[], supportedResponseTypes=[]), jwks=null, 
signIdToken=true, encryptIdToken=false, idTokenEncryptionAlg=null, 
idTokenEncryptionEncoding=null, sectorIdentifierUri=null, 
subjectType=public, dynamicallyRegistered=false, implicit=false, 
dynamicRegistrationDateTime=null, scopes=[profile])] matching 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,307 WARN 
[org.apereo.cas.services.DefaultRegisteredServiceDelegatedAuthenticationPolicy] 
- <Registered service [service.clientName] does not define any 
authorized/supported delegated authentication providers. It is STRONGLY 
recommended that you authorize and assign providers to the service 
definition. While just a warning for now, this behavior will be enforced by 
CAS in future versions.>

 

2019-02-08 10:16:45,307 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: audit:unknown

WHAT: [result=Client Access 
Granted,client=IDPSAML2,registeredService=service.clientName:^service.redirect_uri]

ACTION: DELEGATED_CLIENT_SUCCESS

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

2019-02-08 10:16:45,307 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: audit:unknown

WHAT: [result=Client Access 
Granted,client=IDP-SAML2,registeredService=service.clientName:^service.redirect_uri]

ACTION: DELEGATED_CLIENT_SUCCESS

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

2019-02-08 10:16:45,308 DEBUG 
[org.apereo.cas.web.flow.DelegatedClientAuthenticationAction] - <Delegated 
authentication policy for 
[OidcRegisteredService(super=OAuthRegisteredService(super=AbstractRegisteredService(serviceId=^service.redirect_uri,
 
name=service.clientName, theme=null, informationUrl=null, privacyUrl=null, 
responseType=null, id=1003, description=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, expirationDate=null), 
proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
evaluationOrder=0, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=*******),
 
logoutType=BACK_CHANNEL, requiredHandlers=[], 
attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[BaseOidcScopeAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(enabled=true, 
excludedAttributes=null, includeOnlyAttributes=null), 
authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null), allowedAttributes=[name, family_name, 
given_name, middle_name, nickname, preferred_username, profile, picture, 
website, gender, birthdate, zoneinfo, locale, updated_at], 
scopeName=profile)]), 
multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[mfa-duo],
 
failureMode=NONE, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false), logo=null, 
logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[]),
 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), publicKey=null, properties={}, contacts=[]), 
clientSecret=service.secret, clientId=service.clientId, 
bypassApprovalPrompt=false, generateRefreshToken=true, jsonFormat=true, 
supportedGrantTypes=[], supportedResponseTypes=[]), jwks=null, 
signIdToken=true, encryptIdToken=false, idTokenEncryptionAlg=null, 
idTokenEncryptionEncoding=null, sectorIdentifierUri=null, 
subjectType=public, dynamicallyRegistered=false, implicit=false, 
dynamicRegistrationDateTime=null, scopes=[profile])] allows for using 
client [#SAML2Client# | name: IDP-SAML2 | callbackUrl: 
https://idp-oidc.fr/login | urlResolver: 
org.pac4j.core.http.url.DefaultUrlResolver@1a8335ef | callbackUrlResolver: 
org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@48630fdc | 
ajaxRequestResolver: 
org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@625a354d | 
redirectActionBuilder: 
org.pac4j.saml.redirect.SAML2RedirectActionBuilder@197fae8c | 
credentialsExtractor: 
org.pac4j.saml.credentials.extractor.SAML2CredentialsExtractor@1ad0dc01 | 
authenticator: 
org.pac4j.saml.credentials.authenticator.SAML2Authenticator@4a1d2d68 | 
profileCreator: 
org.pac4j.core.profile.creator.AuthenticatorProfileCreator@36aab35d | 
logoutActionBuilder: 
org.pac4j.saml.logout.SAML2LogoutActionBuilder@795e993b | 
authorizationGenerators: [] |]>

 

2019-02-08 10:16:45,488 DEBUG 
[org.apereo.cas.web.flow.DelegatedClientAuthenticationAction] - <Retrieved 
credentials from client as 
[SAML2Credentials{nameId=SAMLNameID{format='urn:oasis:names:tc:SAML:2.0:nameid-format:transient',
 
nameQualifier='null', spNameQualifier='null', spProviderId='null', 
value='userLogged(pseudo)'}, sessionIndex='null', 
attributes=[SAMLAttribute{friendlyName='samlAuthenticationStatementAuthMethod', 
name='samlAuthenticationStatementAuthMethod', nameFormat='null', 
attributeValues=[urn:oasis:names:tc:SAML:1.0:am:password]}, 
SAMLAttribute{friendlyName='isFromNewLogin', name='isFromNewLogin', 
nameFormat='null', attributeValues=[false]}, 
SAMLAttribute{friendlyName='authenticationDate', name='authenticationDate', 
nameFormat='null', 
attributeValues=[2019-02-08T10:16:44.509+01:00[Europe/Paris]]}, 
SAMLAttribute{friendlyName='authenticationMethod', 
name='authenticationMethod', nameFormat='null', 
attributeValues=[FileAuthenticationHandler]}, 
SAMLAttribute{friendlyName='successfulAuthenticationHandlers', 
name='successfulAuthenticationHandlers', nameFormat='null', 
attributeValues=[FileAuthenticationHandler]}, 
SAMLAttribute{friendlyName='longTermAuthenticationRequestTokenUsed', 
name='longTermAuthenticationRequestTokenUsed', nameFormat='null', 
attributeValues=[false]}], 
conditions=SAMLConditions{notBefore=2019-02-08T09:16:44.605Z, 
notOnOrAfter=2019-02-08T09:16:44.605Z}, issuerId='https://idp-SAML2', 
authnContexts=[urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified]}]>

 

2019-02-08 10:16:45,490 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[ServiceTicketRequestWebflowEventResolver]>

 

2019-02-08 10:16:45,491 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.ServiceTicketRequestWebflowEventResolver]
 
- <Located ticket-granting ticket [null] from the request context>

 

2019-02-08 10:16:45,491 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.ServiceTicketRequestWebflowEventResolver]
 
- <Located service [AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})] from 
the request context>

 

2019-02-08 10:16:45,491 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.ServiceTicketRequestWebflowEventResolver]
 
- <Provided value for [renew] request parameter is [null]>

 

2019-02-08 10:16:45,491 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.ServiceTicketRequestWebflowEventResolver]
 
- <Request is not eligible to be issued service tickets just yet>

 

2019-02-08 10:16:45,492 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[InitialAuthenticationAttemptWebflowEventResolver]>

 

2019-02-08 10:16:45,524 DEBUG 
[org.apereo.cas.support.pac4j.authentication.handler.support.ClientAuthenticationHandler]
 
- <Located client credentials as [ClientCredential(typedIdUsed=false, 
userProfile=#SAML2Profile# | id: userPseudo | attributes: 
{samlAuthenticationStatementAuthMethod=[urn:oasis:names:tc:SAML:1.0:am:password],
 
isFromNewLogin=[false], 
authenticationDate=[2019-02-08T10:16:44.509+01:00[Europe/Paris]], 
authenticationMethod=[FileAuthenticationHandler], 
successfulAuthenticationHandlers=[FileAuthenticationHandler], 
notOnOrAfter=2019-02-08T09:16:44.605Z, 
longTermAuthenticationRequestTokenUsed=[false], 
notBefore=2019-02-08T09:16:44.605Z} | roles: [] | permissions: [] | 
isRemembered: false | clientName: IDP-SAML2 | linkedId: null |, 
credentials=SAML2Credentials{nameId=SAMLNameID{format='urn:oasis:names:tc:SAML:2.0:nameid-format:transient',
 
nameQualifier='null', spNameQualifier='null', spProviderId='null', 
value='userPseudo'}, sessionIndex='null', 
attributes=[SAMLAttribute{friendlyName='samlAuthenticationStatementAuthMethod', 
name='samlAuthenticationStatementAuthMethod', nameFormat='null', 
attributeValues=[urn:oasis:names:tc:SAML:1.0:am:password]}, 
SAMLAttribute{friendlyName='isFromNewLogin', name='isFromNewLogin', 
nameFormat='null', attributeValues=[false]}, 
SAMLAttribute{friendlyName='authenticationDate', name='authenticationDate', 
nameFormat='null', 
attributeValues=[2019-02-08T10:16:44.509+01:00[Europe/Paris]]}, 
SAMLAttribute{friendlyName='authenticationMethod', 
name='authenticationMethod', nameFormat='null', 
attributeValues=[FileAuthenticationHandler]}, 
SAMLAttribute{friendlyName='successfulAuthenticationHandlers', 
name='successfulAuthenticationHandlers', nameFormat='null', 
attributeValues=[FileAuthenticationHandler]}, 
SAMLAttribute{friendlyName='longTermAuthenticationRequestTokenUsed', 
name='longTermAuthenticationRequestTokenUsed', nameFormat='null', 
attributeValues=[false]}], 
conditions=SAMLConditions{notBefore=2019-02-08T09:16:44.605Z, 
notOnOrAfter=2019-02-08T09:16:44.605Z}, 
issuerId='https://IDP-SAML2/cas/idp', 
authnContexts=[urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified]}, 
clientName=IDP-SAML2.clientName)]>

 

2019-02-08 10:16:45,524 DEBUG 
[org.apereo.cas.support.pac4j.authentication.handler.support.ClientAuthenticationHandler]
 
- <Client name: [IDP-SAML2.clientName]>

 

2019-02-08 10:16:45,525 DEBUG 
[org.apereo.cas.support.pac4j.authentication.handler.support.ClientAuthenticationHandler]
 
- <Delegated client is: [#SAML2Client# | name: IDP-SAML2.clientName | 
callbackUrl: https://idp-oidc.fr/login | urlResolver: 
org.pac4j.core.http.url.DefaultUrlResolver@1a8335ef | callbackUrlResolver: 
org.pac4j.core.http.callback.QueryParameterCallbackUrlResolver@48630fdc | 
ajaxRequestResolver: 
org.pac4j.core.http.ajax.DefaultAjaxRequestResolver@625a354d | 
redirectActionBuilder: 
org.pac4j.saml.redirect.SAML2RedirectActionBuilder@197fae8c | 
credentialsExtractor: 
org.pac4j.saml.credentials.extractor.SAML2CredentialsExtractor@1ad0dc01 | 
authenticator: 
org.pac4j.saml.credentials.authenticator.SAML2Authenticator@4a1d2d68 | 
profileCreator: 
org.pac4j.core.profile.creator.AuthenticatorProfileCreator@36aab35d | 
logoutActionBuilder: 
org.pac4j.saml.logout.SAML2LogoutActionBuilder@795e993b | 
authorizationGenerators: [] |]>

 

2019-02-08 10:16:45,525 DEBUG 
[org.apereo.cas.support.pac4j.authentication.handler.support.ClientAuthenticationHandler]
 
- <Final user profile is: [#SAML2Profile# | id: userPseudo | attributes: 
{samlAuthenticationStatementAuthMethod=[urn:oasis:names:tc:SAML:1.0:am:password],
 
isFromNewLogin=[false], 
authenticationDate=[2019-02-08T10:16:44.509+01:00[Europe/Paris]], 
authenticationMethod=[FileAuthenticationHandler], 
successfulAuthenticationHandlers=[FileAuthenticationHandler], 
notOnOrAfter=2019-02-08T09:16:44.605Z, 
longTermAuthenticationRequestTokenUsed=[false], 
notBefore=2019-02-08T09:16:44.605Z} | roles: [] | permissions: [] | 
isRemembered: false | clientName: IDP-SAML2.clientName | linkedId: null |]>

 

2019-02-08 10:16:45,546 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: userPseudo

WHAT: Supplied credentials: [ClientCredential(typedIdUsed=false, 
userProfile=#SAML2Profile# | id: userPseudo | attributes: 
{samlAuthenticationStatementAuthMethod=[urn:oasis:names:tc:SAML:1.0:am:password],
 
isFromNewLogin=[false], 
authenticationDate=[2019-02-08T10:16:44.509+01:00[Europe/Paris]], 
authenticationMethod=[FileAuthenticationHandler], 
successfulAuthenticationHandlers=[FileAuthenticationHandler], 
notOnOrAfter=2019-02-08T09:16:44.605Z, 
longTermAuthenticationRequestTokenUsed=[false], 
notBefore=2019-02-08T09:16:44.605Z} | roles: [] | permissions: [] | 
isRemembered: false | clientName: service.clientName | linkedId: null |, 
credentials=SAML2Credentials{nameId=SAMLNameID{format='urn:oasis:names:tc:SAML:2.0:nameid-format:transient',
 
nameQualifier='null', spNameQualifier='null', spProviderId='null', 
value='userPseudo'}, sessionIndex='null', 
attributes=[SAMLAttribute{friendlyName='samlAuthenticationStatementAuthMethod', 
name='samlAuthenticationStatementAuthMethod', nameFormat='null', 
attributeValues=[urn:oasis:names:tc:SAML:1.0:am:password]}, 
SAMLAttribute{friendlyName='isFromNewLogin', name='isFromNewLogin', 
nameFormat='null', attributeValues=[false]}, 
SAMLAttribute{friendlyName='authenticationDate', name='authenticationDate', 
nameFormat='null', 
attributeValues=[2019-02-08T10:16:44.509+01:00[Europe/Paris]]}, 
SAMLAttribute{friendlyName='authenticationMethod', 
name='authenticationMethod', nameFormat='null', 
attributeValues=[FileAuthenticationHandler]}, 
SAMLAttribute{friendlyName='successfulAuthenticationHandlers', 
name='successfulAuthenticationHandlers', nameFormat='null', 
attributeValues=[FileAuthenticationHandler]}, 
SAMLAttribute{friendlyName='longTermAuthenticationRequestTokenUsed', 
name='longTermAuthenticationRequestTokenUsed', nameFormat='null', 
attributeValues=[false]}], 
conditions=SAMLConditions{notBefore=2019-02-08T09:16:44.605Z, 
notOnOrAfter=2019-02-08T09:16:44.605Z}, 
issuerId='https://IDP-SAML2/cas/idp', 
authnContexts=[urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified]}, 
clientName=IDP-SAML2.clientName)]

ACTION: AUTHENTICATION_SUCCESS

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

 

2019-02-08 10:16:45,550 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Locating service [AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})] in 
service registry to determine authentication policy>

2019-02-08 10:16:45,550 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Locating authentication event in the request context...>

 

2019-02-08 10:16:45,550 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Enforcing access strategy policies for registered service 
[OidcRegisteredService(super=OAuthRegisteredService(super=AbstractRegisteredService(serviceId=^service.redirect_uri,
 
name=service.clientName, theme=null, informationUrl=null, privacyUrl=null, 
responseType=null, id=1003, description=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, expirationDate=null), 
proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
evaluationOrder=0, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=*****),
 
logoutType=BACK_CHANNEL, requiredHandlers=[], 
attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[BaseOidcScopeAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(enabled=true, 
excludedAttributes=null, includeOnlyAttributes=null), 
authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null), allowedAttributes=[name, family_name, 
given_name, middle_name, nickname, preferred_username, profile, picture, 
website, gender, birthdate, zoneinfo, locale, updated_at], 
scopeName=profile)]), 
multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[mfa-duo],
 
failureMode=NONE, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false), logo=null, 
logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[]),
 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), publicKey=null, properties={}, contacts=[]), 
clientSecret=service.secret, clientId=service.clientId, 
bypassApprovalPrompt=false, generateRefreshToken=true, jsonFormat=true, 
supportedGrantTypes=[], supportedResponseTypes=[]), jwks=null, 
signIdToken=true, encryptIdToken=false, idTokenEncryptionAlg=null, 
idTokenEncryptionEncoding=null, sectorIdentifierUri=null, 
subjectType=public, dynamicallyRegistered=false, implicit=false, 
dynamicRegistrationDateTime=null, scopes=[profile])] and principal 
[SimplePrincipal(id=userPseudo, 
attributes={samlAuthenticationStatementAuthMethod=[urn:oasis:names:tc:SAML:1.0:am:password],
 
isFromNewLogin=[false], 
authenticationDate=[2019-02-08T10:16:44.509+01:00[Europe/Paris]], 
authenticationMethod=[FileAuthenticationHandler], 
successfulAuthenticationHandlers=[FileAuthenticationHandler], 
notOnOrAfter=2019-02-08T09:16:44.605Z, 
longTermAuthenticationRequestTokenUsed=[false], 
notBefore=2019-02-08T09:16:44.605Z})]>

 

2019-02-08 10:16:45,557 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: userPseudo

WHAT: [result=Service Access 
Granted,service=service.redirect_uri,principal=SimplePrincipal(id=userPseudo, 
attributes={samlAuthenticationStatementAuthMethod=[urn:oasis:names:tc:SAML:1.0:am:password],
 
isFromNewLogin=[false], 
authenticationDate=[2019-02-08T10:16:44.509+01:00[Europe/Paris]], 
authenticationMethod=[FileAuthenticationHandler], 
successfulAuthenticationHandlers=[FileAuthenticationHandler], 
notOnOrAfter=2019-02-08T09:16:44.605Z, 
longTermAuthenticationRequestTokenUsed=[false], 
notBefore=2019-02-08T09:16:44.605Z}),requiredAttributes={}]

ACTION: SERVICE_ACCESS_ENFORCEMENT_TRIGGERED

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

 

2019-02-08 10:16:45,558 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Attempting to resolve candidate authentication events for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,566 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Resolving candidate authentication event for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})] using 
[AdaptiveMultifactorAuthenticationPolicyEventResolver]>

 

2019-02-08 10:16:45,568 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[AdaptiveMultifactorAuthenticationPolicyEventResolver]>

 

2019-02-08 10:16:45,568 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.mfa.adaptive.AdaptiveMultifactorAuthenticationPolicyEventResolver]
 
- <Adaptive authentication is not configured to require multifactor 
authentication>

 

2019-02-08 10:16:45,592 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Resolving candidate authentication event for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})] using 
[RequestParameterMultifactorAuthenticationPolicyEventResolver]>

 

2019-02-08 10:16:45,594 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[RequestParameterMultifactorAuthenticationPolicyEventResolver]>

 

2019-02-08 10:16:45,595 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.mfa.request.RequestParameterMultifactorAuthenticationPolicyEventResolver]
 
- <No value could be found for request parameter [authn_method]>

 

2019-02-08 10:16:45,601 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <Resolving candidate authentication event for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})] using 
[RequestHeaderMultifactorAuthenticationPolicyEventResolver]>

2019-02-08 10:16:45,602 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[RequestHeaderMultifactorAuthenticationPolicyEventResolver]>

 

2019-02-08 10:16:45,685 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[OidcAuthenticationContextWebflowEventResolver]>

2019-02-08 10:16:45,685 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Attempting to resolve authentication event using resolver 
[OidcAuthenticationContextWebflowEventResolver]>

2019-02-08 10:16:45,686 DEBUG 
[org.apereo.cas.oidc.web.flow.OidcAuthenticationContextWebflowEventResolver] 
- <No ACR provided in the authentication request>

2019-02-08 10:16:45,686 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <No candidate authentication events were resolved for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

2019-02-08 10:16:45,686 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
- <No candidate authentication events were resolved for service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

2019-02-08 10:16:45,686 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Resolved single event [success] via 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
for this context>

2019-02-08 10:16:45,686 DEBUG 
[org.apereo.cas.web.flow.resolver.impl.AbstractCasWebflowEventResolver] - 
<Resolved single event [success] via 
[org.apereo.cas.web.flow.resolver.impl.InitialAuthenticationAttemptWebflowEventResolver]
 
for this context>

2019-02-08 10:16:45,687 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Finalizing authentication transactions and issuing ticket-granting ticket>

2019-02-08 10:16:45,687 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Finalizing authentication transactions and issuing ticket-granting ticket>

2019-02-08 10:16:45,695 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Finalizing authentication event...>

2019-02-08 10:16:45,695 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Finalizing authentication event...>

2019-02-08 10:16:45,696 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Creating ticket-granting ticket, potentially based on [null]>

2019-02-08 10:16:45,696 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Creating ticket-granting ticket, potentially based on [null]>

2019-02-08 10:16:45,696 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Attempting to issue a new ticket-granting ticket...>

2019-02-08 10:16:45,696 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Attempting to issue a new ticket-granting ticket...>

2019-02-08 10:16:45,705 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

 

=============================================================

WHO: userPseudo

WHAT: [result=Service Access 
Granted,service=service.redirect_uri,principal=SimplePrincipal(id=userPseudo, 
attributes={samlAuthenticationStatementAuthMethod=[urn:

oasis:names:tc:SAML:1.0:am:password], isFromNewLogin=[false], 
authenticationDate=[2019-02-08T10:16:44.509+01:00[Europe/Paris]], 
authenticationMethod=[FileAuthenticationHandler], 
successfulAuthenticationHandle

rs=[FileAuthenticationHandler], notOnOrAfter=[2019-02-08T09:16:44.605Z], 
longTermAuthenticationRequestTokenUsed=[false], 
notBefore=[2019-02-08T09:16:44.605Z]}),requiredAttributes={}]

ACTION: SERVICE_ACCESS_ENFORCEMENT_TRIGGERED

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

2019-02-08 10:16:45,731 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: userPseudo

WHAT: 
TGT-1-*******************************************************************************************st-oidc.fr

ACTION: TICKET_GRANTING_TICKET_CREATED

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

>

2019-02-08 10:16:45,731 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: userPseudo

WHAT: 
TGT-1-*******************************************************************************************st-oidc.fr

ACTION: TICKET_GRANTING_TICKET_CREATED

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: ip

SERVER IP ADDRESS: ip

=============================================================

 

2019-02-08 10:16:45,732 DEBUG 
[org.apereo.cas.web.flow.login.CreateTicketGrantingTicketAction] - 
<Calculating authentication warning messages...>

 

2019-02-08 10:16:45,733 DEBUG 
[org.apereo.cas.web.flow.DefaultSingleSignOnParticipationStrategy] - 
<Located [^service.redirect_uri] in registry. Service access to participate 
in SSO is set to [true]>

 

2019-02-08 10:16:45,734 DEBUG 
[org.apereo.cas.web.flow.login.SendTicketGrantingTicketAction] - <Setting 
ticket-granting cookie for current session linked to 
[TGT-1-*******************************************************************************************st-oidc.fr].>

 

2019-02-08 10:16:45,737 DEBUG 
[org.apereo.cas.web.flow.GenerateServiceTicketAction] - <Service asking for 
service ticket is [AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,737 DEBUG 
[org.apereo.cas.web.flow.GenerateServiceTicketAction] - <Ticket-granting 
ticket found in the context is 
[TGT-1-*******************************************************************************************st-oidc.fr]>

 

2019-02-08 10:16:45,745 DEBUG 
[org.apereo.cas.web.flow.GenerateServiceTicketAction] - <Registered service 
asking for service ticket is 
[OidcRegisteredService(super=OAuthRegisteredService(super=AbstractRegisteredService(serviceId=^service.redirect_uri,
 
name=service.clientName, theme=null, informationUrl=null, privacyUrl=null, 
responseType=null, id=****, description=null, 
expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
 
notifyWhenDeleted=false, expirationDate=null), 
proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
evaluationOrder=0, 
usernameAttributeProvider=PrincipalAttributeRegisteredServiceUsernameProvider(usernameAttribute=****),
 
logoutType=BACK_CHANNEL, requiredHandlers=[], 
attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[BaseOidcScopeAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
 
principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
consentPolicy=DefaultRegisteredServiceConsentPolicy(enabled=true, 
excludedAttributes=null, includeOnlyAttributes=null), 
authorizedToReleaseCredentialPassword=false, 
authorizedToReleaseProxyGrantingTicket=false, 
excludeDefaultAttributes=false, 
authorizedToReleaseAuthenticationAttributes=true, 
principalIdAttribute=null), allowedAttributes=[name, family_name, 
given_name, middle_name, nickname, preferred_username, profile, picture, 
website, gender, birthdate, zoneinfo, locale, updated_at], 
scopeName=profile)]), 
multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[mfa-duo],
 
failureMode=NONE, principalAttributeNameTrigger=null, 
principalAttributeValueToMatch=null, bypassEnabled=false), logo=null, 
logoutUrl=null, 
accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[]),
 
requireAllAttributes=true, requiredAttributes={}, rejectedAttributes={}, 
caseInsensitive=false), publicKey=null, properties={}, contacts=[]), 
clientSecret=service.clientSecret, clientId=service.clientId, 
bypassApprovalPrompt=false, generateRefreshToken=true, jsonFormat=true, 
supportedGrantTypes=[], supportedResponseTypes=[]), jwks=null, 
signIdToken=true, encryptIdToken=false, idTokenEncryptionAlg=null, 
idTokenEncryptionEncoding=null, sectorIdentifierUri=null, 
subjectType=public, dynamicallyRegistered=false, implicit=false, 
dynamicRegistrationDateTime=null, scopes=[profile])]>

 

2019-02-08 10:16:45,746 DEBUG 
[org.apereo.cas.web.flow.GenerateServiceTicketAction] - <Built the final 
authentication result [DefaultAuthenticationResult(credentialProvided=true, 
authentication=org.apereo.cas.authentication.DefaultAuthentication@8e4e9ee1, 
service=AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={}))] to 
grant service ticket to 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=null, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,750 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: userPseudo

WHAT: [result=Service Access 
Granted,service=service.redirect_uri,requiredAttributes={}]

ACTION: SERVICE_ACCESS_ENFORCEMENT_TRIGGERED

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: idp

SERVER IP ADDRESS: idp

=============================================================

 

>

2019-02-08 10:16:45,775 INFO 
[org.apereo.inspektr.audit.support.Slf4jLoggingAuditTrailManager] - <Audit 
trail record BEGIN

=============================================================

WHO: userPseudo

WHAT: ST-1-****idp-oidc.fr for service.redirect_uri

ACTION: SERVICE_TICKET_CREATED

APPLICATION: CAS

WHEN: Fri Feb 08 10:16:45 CET 2019

CLIENT IP ADDRESS: idp

SERVER IP ADDRESS: idp

=============================================================

 

>

 

2019-02-08 10:16:45,780 DEBUG 
[org.apereo.cas.web.flow.GenerateServiceTicketAction] - <Granted service 
ticket [ST-1-****idp-oidc.fr] and added it to the request scope>

 

2019-02-08 10:16:45,781 DEBUG 
[org.apereo.cas.web.flow.actions.RedirectToServiceAction] - <Located 
service [AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=userPseudo, 
source=service, loggedOutAlready=false, format=XML, attributes={})] from 
the context>

 

2019-02-08 10:16:45,781 DEBUG 
[org.apereo.cas.web.flow.actions.RedirectToServiceAction] - <Located 
authentication 
[org.apereo.cas.authentication.DefaultAuthentication@5ecac821] from the 
context>

 

2019-02-08 10:16:45,782 DEBUG 
[org.apereo.cas.web.flow.actions.RedirectToServiceAction] - <Located 
service response builder 
[org.apereo.cas.authentication.principal.WebApplicationServiceResponseBuilder@f5c1f973]
 
for [AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=userPseudo, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,787 DEBUG 
[org.apereo.cas.web.flow.actions.RedirectToServiceAction] - <Built response 
[org.apereo.cas.authentication.principal.DefaultResponse@19db421] for 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=userPseudo, 
source=service, loggedOutAlready=false, format=XML, attributes={})]>

 

2019-02-08 10:16:45,787 DEBUG 
[org.apereo.cas.web.flow.actions.RedirectToServiceAction] - <Signaling flow 
to redirect to service 
[AbstractWebApplicationService(id=service.redirect_uri, 
originalUrl=service.redirect_uri, artifactId=null, principal=userPseudo, 
source=service, loggedOutAlready=false, format=XML, attributes={})] via 
event [redirect]>


I don't know when the error occured. I will publish the logs about OIDC 
authentication later


Thanks for your help,

Kyra

Le mercredi 6 février 2019 08:56:47 UTC+1, kyra1510 a écrit :
>
> Hy all,
>
> I apologize for my French English.
>
> I have a problem when I upgrade my CAS 5.2.x to CAS 5.3.7 with the SAML 
> delegation.
> My Cas 5.3.7 is configure to use the OpenIdConnect authentication but it 
> is possible to delegate the authentication to an IDP SAML2.
> I have no problem with the delegation in CAS 5.2.x 
>
> When I use the OIDC authentication without delegation, the workflow is 
> correct.
> Workflow:
> 1 The user enter its password and login in the authentication page
> 2 The user is redirect to a consent page
> 3 When click on the button "allow", an authorization code is returned
>
> But when I use the SAML2 delegation, I am not redirect to the consent page:
> 1 The user click on the button which redirect to the correct IDP
> 2 The user logged on the IDP SAML  
> 3 After the user is returned to my CAS 5.3.7 and arrived on the page 
> service?ticket=ST-x 
> <https://idp-auth.poc-mobilite.test-gar.education.fr/com.worldline.bcmc.gar.openidcpoc.oidcnongar:/oauthredirect?ticket=ST-4-3XKBx3tGziyH-T3nCMxlmedrnycidp-auth.poc-mobilite.test-gar.education.fr>xxxxxxxxxxxxxxxxxxxxxxxxxxx
>  
> and I have a code 302
>
>
> I found this issue in the github which seems to correspond to my problem 
> https://github.com/apereo/cas/pull/3664.
> It describe the same issue in CAS 5.3.x in the SAML2 protocol before the 
> bug was fixed. It didn't concern the delegation.
> Could it be this problem is related to my issue?
>
> Thanks for any help.
>
> Kyra
>
>

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/d40d599d-c2c7-40c6-8ade-69d1e0d9c60e%40apereo.org.

Reply via email to