Entityid in metadata must match entityid in cas properties. Use cas 6.3.4 or 6.4. i couldn't get it working with other versions
On Wed, Aug 25, 2021, 9:06 PM Pablo Vidaurri <[email protected]> wrote: > Any solution or work around for this? Gettign the same issue on CAS 6.3.2. > Only way to get it to work is if i set my entityId to be same as hostname > which will not work in a production env. > > On Monday, April 5, 2021 at 3:41:02 AM UTC-5 Marcin Roman wrote: > >> Hi, I have discovered yet another bug in SAML2 support in 6.3.4-SNAPSHOT >> and 6.4.0-SNAPSHOT. >> It looks like SamlIdPMetadataResolver is provided with cas url instead of >> entityId while resolving signing credentials. >> >> cas_1 | TRACE [org.apereo.cas.support.saml.SamlUtils] Attempting to >> create SAMLObject for type: [interface org.opensaml.saml.saml2.core.Status] >> and QName: [{urn:oasis:names:tc:SAML:2.0:protocol}Status] >> cas_1 | TRACE [org.apereo.cas.support.saml.SamlUtils] Attempting to >> create SAMLObject for type: [interface >> org.opensaml.saml.saml2.core.StatusCode] and QName: >> [{urn:oasis:names:tc:SAML:2.0:protocol}StatusCode] >> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] >> ******************************************************************************** >> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] Logging >> [org.opensaml.saml.saml2.core.impl.ResponseImpl] >> cas_1 | >> cas_1 | [<?xml version="1.0" encoding="UTF-8"?><saml2p:Response >> xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination=" >> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp" >> ID="_111942357346883584" >> InResponseTo="_f23e8fe1993a1a61287f3d30288ee5700f936c0631" >> IssueInstant="2021-04-05T07:55:18.827Z" Version="2.0"> >> cas_1 | <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" >> Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity"> >> https://login.umcs.pl/cas/idp/metadata</saml2:Issuer> >> cas_1 | <saml2p:Status> >> cas_1 | <saml2p:StatusCode >> Value="urn:oasis:names:tc:SAML:2.0:status:Success"/> >> cas_1 | </saml2p:Status> >> cas_1 | <saml2:Assertion >> xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" >> ID="_5878410931315849216" IssueInstant="2021-04-05T07:55:18.753Z" >> Version="2.0"> >> cas_1 | <saml2:Issuer>https://login.umcs.pl/cas/idp/metadata >> </saml2:Issuer> >> cas_1 | <saml2:Subject> >> // DELETED >> cas_1 | </saml2:Assertion> >> cas_1 | </saml2p:Response> >> cas_1 | ] >> cas_1 | >> cas_1 | >> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] >> ******************************************************************************** >> cas_1 | DEBUG >> [org.apereo.cas.support.saml.web.idp.profile.builders.response.SamlProfileSaml2ResponseBuilder] >> SAML entity id [ >> https://aai.pionier.net.pl/test/module.php/saml/sp/metadata.php/default-sp] >> indicates that SAML responses should be signed >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Attempting to encode [org.opensaml.saml.saml2.core.impl.ResponseImpl] for [ >> https://aai.pionier.net.pl/test/module.php/saml/sp/metadata.php/default-sp >> ] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Outbound saml object to use is >> [org.opensaml.saml.saml2.core.impl.ResponseImpl] >> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlIdPUtils] Fetched >> assertion consumer service url [ >> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp] >> with binding [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST] from >> authentication request >> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlIdPUtils] Configured peer >> entity endpoint to be [ >> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp] >> with binding [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Default signature signing blocked algorithms: [[ >> http://www.w3.org/2001/04/xmldsig-more#hmac-md5, >> http://www.w3.org/2001/04/xmldsig-more#md5, >> http://www.w3.org/2001/04/xmldsig-more#rsa-md5]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Default signature signing signature algorithms: [[ >> http://www.w3.org/2001/04/xmldsig-more#rsa-sha256, >> http://www.w3.org/2001/04/xmldsig-more#rsa-sha384, >> http://www.w3.org/2001/04/xmldsig-more#rsa-sha512, >> http://www.w3.org/2000/09/xmldsig#rsa-sha1, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1, >> http://www.w3.org/2000/09/xmldsig#dsa-sha1, >> http://www.w3.org/2001/04/xmldsig-more#hmac-sha256, >> http://www.w3.org/2001/04/xmldsig-more#hmac-sha384, >> http://www.w3.org/2001/04/xmldsig-more#hmac-sha512, >> http://www.w3.org/2000/09/xmldsig#hmac-sha1]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Default signature signing signature canonicalization algorithm: [ >> http://www.w3.org/2001/10/xml-exc-c14n#] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Default signature signing allowed algorithms: [[]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Default signature signing reference digest methods: [[ >> http://www.w3.org/2001/04/xmlenc#sha256, >> http://www.w3.org/2001/04/xmldsig-more#sha384, >> http://www.w3.org/2001/04/xmlenc#sha512, >> http://www.w3.org/2000/09/xmldsig#sha1]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Finalized signature signing blocked algorithms: [[ >> http://www.w3.org/2001/04/xmldsig-more#hmac-md5, >> http://www.w3.org/2001/04/xmldsig-more#md5, >> http://www.w3.org/2001/04/xmldsig-more#rsa-md5]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Finalized signature signing signature algorithms: [[ >> http://www.w3.org/2001/04/xmldsig-more#rsa-sha256, >> http://www.w3.org/2001/04/xmldsig-more#rsa-sha384, >> http://www.w3.org/2001/04/xmldsig-more#rsa-sha512, >> http://www.w3.org/2000/09/xmldsig#rsa-sha1, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512, >> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1, >> http://www.w3.org/2000/09/xmldsig#dsa-sha1, >> http://www.w3.org/2001/04/xmldsig-more#hmac-sha256, >> http://www.w3.org/2001/04/xmldsig-more#hmac-sha384, >> http://www.w3.org/2001/04/xmldsig-more#hmac-sha512, >> http://www.w3.org/2000/09/xmldsig#hmac-sha1]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Finalized signature signing signature canonicalization algorithm: [ >> http://www.w3.org/2001/10/xml-exc-c14n#] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Finalized signature signing allowed algorithms: [[]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Finalized signature signing reference digest methods: [[ >> http://www.w3.org/2001/04/xmlenc#sha256, >> http://www.w3.org/2001/04/xmldsig-more#sha384, >> http://www.w3.org/2001/04/xmlenc#sha512, >> http://www.w3.org/2000/09/xmldsig#sha1]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator] >> Metadata directory location for [aai_pionier_net_pl_test] is >> [/etc/cas/saml/aai_pionier_net_pl_test-1001] >> cas_1 | DEBUG >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Locating signature signing key for >> [SamlRegisteredService(super=AbstractRegisteredService(serviceId= >> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, >> theme=null, informationUrl=null, privacyUrl=null, responseType=null, >> id=1001, description=null, >> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false, >> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), >> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true, >> messageCode=null, text=null), >> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, >> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, >> ticketGrantingTicketExpirationPolicy=null, >> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, >> evaluationOrder=999, >> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c, >> logoutType=BACK_CHANNEL, environments=[], >> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null, >> principalAttributesRepository=DefaultPrincipalAttributesRepository(), >> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, >> excludedAttributes=null, includeOnlyAttributes=null, order=0), >> authorizedToReleaseCredentialPassword=false, >> authorizedToReleaseProxyGrantingTicket=false, >> excludeDefaultAttributes=false, >> authorizedToReleaseAuthenticationAttributes=true, >> principalIdAttribute=null, order=0), >> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, >> displayName, givenName, sn, eduPersonScopedAffiliation]), >> entityAttribute=null, entityAttributeFormat=null, >> entityAttributeValues=[]), >> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null, >> principalAttributesRepository=DefaultPrincipalAttributesRepository(), >> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, >> excludedAttributes=null, includeOnlyAttributes=null, order=0), >> authorizedToReleaseCredentialPassword=false, >> authorizedToReleaseProxyGrantingTicket=false, >> excludeDefaultAttributes=false, >> authorizedToReleaseAuthenticationAttributes=true, >> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, >> attribute=uidNumber)], mergingPolicy=replace, order=0), >> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[], >> failureMode=UNDEFINED, principalAttributeNameTrigger=null, >> principalAttributeValueToMatch=null, bypassEnabled=false, >> forceExecution=false, bypassTrustedDeviceEnabled=false, >> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, >> script=null), >> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern= >> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, >> redirectUrl=null, >> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, >> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, >> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[], >> permitUndefined=true, exclusive=false), requireAllAttributes=true, >> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), >> publicKey=null, >> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[], >> excludedAuthenticationHandlers=[], >> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)), >> properties={}, contacts=[]), >> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, >> metadataProxyLocation=null, metadataMaxValidity=0, >> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, >> metadataCriteriaPattern=null, >> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, >> metadataSignatureLocation=null, logoutResponseBinding=null, >> requireSignedRoot=true, serviceProviderNameIdQualifier=null, >> nameIdQualifier=null, metadataExpirationDuration=PT60M, >> signingCredentialFingerprint=null, issuerEntityId=null, >> signingKeyAlgorithm=null, signAssertions=false, >> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, >> skipGeneratingSubjectConfirmationInResponseTo=false, >> skipGeneratingSubjectConfirmationNotOnOrAfter=false, >> skipGeneratingSubjectConfirmationRecipient=false, >> skipGeneratingSubjectConfirmationNotBefore=true, >> skipGeneratingSubjectConfirmationNameId=true, >> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, >> signResponses=true, encryptAssertions=false, encryptAttributes=false, >> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, >> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, >> metadataCriteriaRemoveRolelessEntityDescriptors=true, >> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, >> whiteListBlackListPrecedence=null, attributeNameFormats={}, >> attributeFriendlyNames={}, attributeValueTypes={}, >> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], >> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], >> signingSignatureWhiteListedAlgorithms=[], >> signingSignatureCanonicalizationAlgorithm=null, >> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], >> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])] >> using algorithm [RSA] >> cas_1 | DEBUG >> [org.opensaml.saml.security.impl.MetadataCredentialResolver] Resolving >> credentials from metadata using entityID: >> https://login.umcs.pl/cas/idp/metadata, role: >> {urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor, protocol: null, >> usage: SIGNING >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator] >> Metadata directory location for [aai_pionier_net_pl_test] is >> [/etc/cas/saml/aai_pionier_net_pl_test-1001] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator] >> Metadata directory location for [aai_pionier_net_pl_test] is >> [/etc/cas/saml/aai_pionier_net_pl_test-1001] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Resolved metadata resource is [file [/etc/cas/saml/idp-metadata.xml]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Located metadata root element [EntityDescriptor] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Initializing metadata resolver [SamlIdPMetadataResolver] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Resolving metadata for criteria [[UsageCriterion [credUsage=SIGNING], >> EntityRoleCriterion >> [role={urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor], >> SamlIdPSamlRegisteredServiceCriterion(registeredService=SamlRegisteredService(super=AbstractRegisteredService(serviceId= >> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, >> theme=null, informationUrl=null, privacyUrl=null, responseType=null, >> id=1001, description=null, >> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false, >> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), >> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true, >> messageCode=null, text=null), >> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, >> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, >> ticketGrantingTicketExpirationPolicy=null, >> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, >> evaluationOrder=999, >> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c, >> logoutType=BACK_CHANNEL, environments=[], >> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null, >> principalAttributesRepository=DefaultPrincipalAttributesRepository(), >> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, >> excludedAttributes=null, includeOnlyAttributes=null, order=0), >> authorizedToReleaseCredentialPassword=false, >> authorizedToReleaseProxyGrantingTicket=false, >> excludeDefaultAttributes=false, >> authorizedToReleaseAuthenticationAttributes=true, >> principalIdAttribute=null, order=0), >> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, >> displayName, givenName, sn, eduPersonScopedAffiliation]), >> entityAttribute=null, entityAttributeFormat=null, >> entityAttributeValues=[]), >> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null, >> principalAttributesRepository=DefaultPrincipalAttributesRepository(), >> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, >> excludedAttributes=null, includeOnlyAttributes=null, order=0), >> authorizedToReleaseCredentialPassword=false, >> authorizedToReleaseProxyGrantingTicket=false, >> excludeDefaultAttributes=false, >> authorizedToReleaseAuthenticationAttributes=true, >> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, >> attribute=uidNumber)], mergingPolicy=replace, order=0), >> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[], >> failureMode=UNDEFINED, principalAttributeNameTrigger=null, >> principalAttributeValueToMatch=null, bypassEnabled=false, >> forceExecution=false, bypassTrustedDeviceEnabled=false, >> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, >> script=null), >> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern= >> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, >> redirectUrl=null, >> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, >> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, >> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[], >> permitUndefined=true, exclusive=false), requireAllAttributes=true, >> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), >> publicKey=null, >> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[], >> excludedAuthenticationHandlers=[], >> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)), >> properties={}, contacts=[]), >> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, >> metadataProxyLocation=null, metadataMaxValidity=0, >> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, >> metadataCriteriaPattern=null, >> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, >> metadataSignatureLocation=null, logoutResponseBinding=null, >> requireSignedRoot=true, serviceProviderNameIdQualifier=null, >> nameIdQualifier=null, metadataExpirationDuration=PT60M, >> signingCredentialFingerprint=null, issuerEntityId=null, >> signingKeyAlgorithm=null, signAssertions=false, >> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, >> skipGeneratingSubjectConfirmationInResponseTo=false, >> skipGeneratingSubjectConfirmationNotOnOrAfter=false, >> skipGeneratingSubjectConfirmationRecipient=false, >> skipGeneratingSubjectConfirmationNotBefore=true, >> skipGeneratingSubjectConfirmationNameId=true, >> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, >> signResponses=true, encryptAssertions=false, encryptAttributes=false, >> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, >> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, >> metadataCriteriaRemoveRolelessEntityDescriptors=true, >> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, >> whiteListBlackListPrecedence=null, attributeNameFormats={}, >> attributeFriendlyNames={}, attributeValueTypes={}, >> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], >> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], >> signingSignatureWhiteListedAlgorithms=[], >> signingSignatureCanonicalizationAlgorithm=null, >> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], >> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])), >> SignatureSigningConfigurationCriterion >> [configs=[org.opensaml.xmlsec.impl.BasicSignatureSigningConfiguration@3df6e0b2]], >> EntityIdCriterion [id=https://login.umcs.pl/cas/idp/metadata]]] >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] >> Metadata Resolver SamlIdPMetadataResolver >> https://login.umcs.pl/cas/idp/metadata: Metadata backing store does not >> contain any EntityDescriptors with the ID: >> https://login.umcs.pl/cas/idp/metadata >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.AbstractBatchMetadataResolver] >> Metadata Resolver SamlIdPMetadataResolver >> https://login.umcs.pl/cas/idp/metadata: Resolved 0 candidates via >> EntityIdCriterion: EntityIdCriterion [id= >> https://login.umcs.pl/cas/idp/metadata] >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] >> Metadata Resolver SamlIdPMetadataResolver >> https://login.umcs.pl/cas/idp/metadata: Candidates iteration was empty, >> nothing to filter via predicates >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Resolved metadata resource is [file [/etc/cas/saml/idp-metadata.xml]] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Located metadata root element [EntityDescriptor] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Initializing metadata resolver [SamlIdPMetadataResolver] >> cas_1 | TRACE >> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] >> Resolving metadata for criteria [[UsageCriterion [credUsage=SIGNING], >> EntityRoleCriterion >> [role={urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor], >> SamlIdPSamlRegisteredServiceCriterion(registeredService=SamlRegisteredService(super=AbstractRegisteredService(serviceId= >> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, >> theme=null, informationUrl=null, privacyUrl=null, responseType=null, >> id=1001, description=null, >> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false, >> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), >> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true, >> messageCode=null, text=null), >> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, >> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, >> ticketGrantingTicketExpirationPolicy=null, >> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, >> evaluationOrder=999, >> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c, >> logoutType=BACK_CHANNEL, environments=[], >> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null, >> principalAttributesRepository=DefaultPrincipalAttributesRepository(), >> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, >> excludedAttributes=null, includeOnlyAttributes=null, order=0), >> authorizedToReleaseCredentialPassword=false, >> authorizedToReleaseProxyGrantingTicket=false, >> excludeDefaultAttributes=false, >> authorizedToReleaseAuthenticationAttributes=true, >> principalIdAttribute=null, order=0), >> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, >> displayName, givenName, sn, eduPersonScopedAffiliation]), >> entityAttribute=null, entityAttributeFormat=null, >> entityAttributeValues=[]), >> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null, >> principalAttributesRepository=DefaultPrincipalAttributesRepository(), >> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, >> excludedAttributes=null, includeOnlyAttributes=null, order=0), >> authorizedToReleaseCredentialPassword=false, >> authorizedToReleaseProxyGrantingTicket=false, >> excludeDefaultAttributes=false, >> authorizedToReleaseAuthenticationAttributes=true, >> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, >> attribute=uidNumber)], mergingPolicy=replace, order=0), >> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[], >> failureMode=UNDEFINED, principalAttributeNameTrigger=null, >> principalAttributeValueToMatch=null, bypassEnabled=false, >> forceExecution=false, bypassTrustedDeviceEnabled=false, >> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, >> script=null), >> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern= >> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, >> redirectUrl=null, >> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, >> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, >> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[], >> permitUndefined=true, exclusive=false), requireAllAttributes=true, >> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), >> publicKey=null, >> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[], >> excludedAuthenticationHandlers=[], >> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)), >> properties={}, contacts=[]), >> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, >> metadataProxyLocation=null, metadataMaxValidity=0, >> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, >> metadataCriteriaPattern=null, >> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, >> metadataSignatureLocation=null, logoutResponseBinding=null, >> requireSignedRoot=true, serviceProviderNameIdQualifier=null, >> nameIdQualifier=null, metadataExpirationDuration=PT60M, >> signingCredentialFingerprint=null, issuerEntityId=null, >> signingKeyAlgorithm=null, signAssertions=false, >> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, >> skipGeneratingSubjectConfirmationInResponseTo=false, >> skipGeneratingSubjectConfirmationNotOnOrAfter=false, >> skipGeneratingSubjectConfirmationRecipient=false, >> skipGeneratingSubjectConfirmationNotBefore=true, >> skipGeneratingSubjectConfirmationNameId=true, >> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, >> signResponses=true, encryptAssertions=false, encryptAttributes=false, >> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, >> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, >> metadataCriteriaRemoveRolelessEntityDescriptors=true, >> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, >> whiteListBlackListPrecedence=null, attributeNameFormats={}, >> attributeFriendlyNames={}, attributeValueTypes={}, >> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], >> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], >> signingSignatureWhiteListedAlgorithms=[], >> signingSignatureCanonicalizationAlgorithm=null, >> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], >> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])), >> SignatureSigningConfigurationCriterion >> [configs=[org.opensaml.xmlsec.impl.BasicSignatureSigningConfiguration@3df6e0b2]], >> EntityIdCriterion [id=https://login.umcs.pl/cas/idp/metadata]]] >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] >> Metadata Resolver SamlIdPMetadataResolver >> https://login.umcs.pl/cas/idp/metadata: Metadata backing store does not >> contain any EntityDescriptors with the ID: >> https://login.umcs.pl/cas/idp/metadata >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.AbstractBatchMetadataResolver] >> Metadata Resolver SamlIdPMetadataResolver >> https://login.umcs.pl/cas/idp/metadata: Resolved 0 candidates via >> EntityIdCriterion: EntityIdCriterion [id= >> https://login.umcs.pl/cas/idp/metadata] >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] >> Metadata Resolver SamlIdPMetadataResolver >> https://login.umcs.pl/cas/idp/metadata: Candidates iteration was empty, >> nothing to filter via predicates >> cas_1 | DEBUG >> [org.opensaml.saml.metadata.resolver.impl.PredicateRoleDescriptorResolver] >> Resolved no EntityDescriptors via underlying MetadataResolver, returning >> empty collection >> cas_1 | ERROR >> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner] >> Unable to locate any signing credentials for service >> [aai_pionier_net_pl_test] >> > -- - Website: https://apereo.github.io/cas - Gitter Chatroom: https://gitter.im/apereo/cas - List Guidelines: https://goo.gl/1VRrw7 - Contributions: https://goo.gl/mh7qDG --- You received this message because you are subscribed to the Google Groups "CAS Community" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/apereo.org/d/msgid/cas-user/CAKxjP2OaAAEQR_vYbrVKMMrZt%2BoVJApj-D%3D-j9ri_KDTjmLYKg%40mail.gmail.com.
