Just saw this reply ...

That did not seem to work. I have my sp metata with x509 certs embedded. I 
have my service definition like the following:

{
  "@class" : "org.apereo.cas.support.saml.services.SamlRegisteredService",
  "description": "my super super service",
  "serviceId" : "^https://my.super.duper.svc.com";,   <-- entity id of my sp 
metadata file
  "name" : "super_duper",
  "id" : 20210115134141,
  "evaluationOrder" : 30,
  "metadataLocation" : "file:/apps//cas/metadata/super_duper_metadata.xml",
  "attributeReleasePolicy" : {
    "@class" : 
"org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy",
    "allowedAttributes" : [ "java.util.ArrayList", [ 
"firstName","lastName"] ]
  },
  "signAssertions": true,
  "signingCredentialType": X509
}

Still getting error:
Unable to locate any signing credentials for service [super_duper]

Do I need a separate crt somewhere instead of relying on the embbeded cert 
in the sp metadata?
 
On Thursday, August 26, 2021 at 2:11:50 AM UTC-5 Marcin Roman wrote:

> Entityid in metadata must match entityid in cas properties. 
> Use cas 6.3.4 or 6.4. i couldn't get it working with other versions
>
> On Wed, Aug 25, 2021, 9:06 PM Pablo Vidaurri <[email protected]> wrote:
>
>> Any solution or work around for this? Gettign the same issue on CAS 
>> 6.3.2. Only way to get it to work is if i set my entityId to be same as 
>> hostname which will not work in a production env.
>>
>> On Monday, April 5, 2021 at 3:41:02 AM UTC-5 Marcin Roman wrote:
>>
>>> Hi, I have discovered yet another bug in SAML2 support in 6.3.4-SNAPSHOT 
>>> and 6.4.0-SNAPSHOT.
>>> It looks like SamlIdPMetadataResolver is provided with cas url instead 
>>> of entityId while resolving signing credentials.
>>>
>>> cas_1 | TRACE [org.apereo.cas.support.saml.SamlUtils] Attempting to 
>>> create SAMLObject for type: [interface org.opensaml.saml.saml2.core.Status] 
>>> and QName: [{urn:oasis:names:tc:SAML:2.0:protocol}Status]
>>> cas_1 | TRACE [org.apereo.cas.support.saml.SamlUtils] Attempting to 
>>> create SAMLObject for type: [interface 
>>> org.opensaml.saml.saml2.core.StatusCode] and QName: 
>>> [{urn:oasis:names:tc:SAML:2.0:protocol}StatusCode]
>>> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] 
>>> ********************************************************************************
>>> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] Logging 
>>> [org.opensaml.saml.saml2.core.impl.ResponseImpl]
>>> cas_1 | 
>>> cas_1 | [<?xml version="1.0" encoding="UTF-8"?><saml2p:Response 
>>> xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="
>>> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp";
>>>  
>>> ID="_111942357346883584" 
>>> InResponseTo="_f23e8fe1993a1a61287f3d30288ee5700f936c0631" 
>>> IssueInstant="2021-04-05T07:55:18.827Z" Version="2.0">
>>> cas_1 | <saml2:Issuer 
>>> xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" 
>>> Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
>>> https://login.umcs.pl/cas/idp/metadata</saml2:Issuer>
>>> cas_1 | <saml2p:Status>
>>> cas_1 | <saml2p:StatusCode 
>>> Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
>>> cas_1 | </saml2p:Status>
>>> cas_1 | <saml2:Assertion 
>>> xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" 
>>> ID="_5878410931315849216" IssueInstant="2021-04-05T07:55:18.753Z" 
>>> Version="2.0">
>>> cas_1 | <saml2:Issuer>https://login.umcs.pl/cas/idp/metadata
>>> </saml2:Issuer>
>>> cas_1 | <saml2:Subject>
>>> // DELETED
>>> cas_1 | </saml2:Assertion>
>>> cas_1 | </saml2p:Response>
>>> cas_1 | ]
>>> cas_1 | 
>>> cas_1 | 
>>> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] 
>>> ********************************************************************************
>>> cas_1 | DEBUG 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.response.SamlProfileSaml2ResponseBuilder]
>>>  
>>> SAML entity id [
>>> https://aai.pionier.net.pl/test/module.php/saml/sp/metadata.php/default-sp] 
>>> indicates that SAML responses should be signed
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Attempting to encode [org.opensaml.saml.saml2.core.impl.ResponseImpl] for [
>>> https://aai.pionier.net.pl/test/module.php/saml/sp/metadata.php/default-sp
>>> ]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Outbound saml object to use is 
>>> [org.opensaml.saml.saml2.core.impl.ResponseImpl]
>>> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlIdPUtils] Fetched 
>>> assertion consumer service url [
>>> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp]
>>>  
>>> with binding [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST] from 
>>> authentication request
>>> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlIdPUtils] Configured peer 
>>> entity endpoint to be [
>>> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp]
>>>  
>>> with binding [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Default signature signing blocked algorithms: [[
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-md5, 
>>> http://www.w3.org/2001/04/xmldsig-more#md5, 
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-md5]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Default signature signing signature algorithms: [[
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-sha384, 
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-sha512, 
>>> http://www.w3.org/2000/09/xmldsig#rsa-sha1, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1, 
>>> http://www.w3.org/2000/09/xmldsig#dsa-sha1, 
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-sha384, 
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-sha512, 
>>> http://www.w3.org/2000/09/xmldsig#hmac-sha1]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Default signature signing signature canonicalization algorithm: [
>>> http://www.w3.org/2001/10/xml-exc-c14n#]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Default signature signing allowed algorithms: [[]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Default signature signing reference digest methods: [[
>>> http://www.w3.org/2001/04/xmlenc#sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#sha384, 
>>> http://www.w3.org/2001/04/xmlenc#sha512, 
>>> http://www.w3.org/2000/09/xmldsig#sha1]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Finalized signature signing blocked algorithms: [[
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-md5, 
>>> http://www.w3.org/2001/04/xmldsig-more#md5, 
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-md5]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Finalized signature signing signature algorithms: [[
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-sha384, 
>>> http://www.w3.org/2001/04/xmldsig-more#rsa-sha512, 
>>> http://www.w3.org/2000/09/xmldsig#rsa-sha1, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512, 
>>> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1, 
>>> http://www.w3.org/2000/09/xmldsig#dsa-sha1, 
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-sha384, 
>>> http://www.w3.org/2001/04/xmldsig-more#hmac-sha512, 
>>> http://www.w3.org/2000/09/xmldsig#hmac-sha1]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Finalized signature signing signature canonicalization algorithm: [
>>> http://www.w3.org/2001/10/xml-exc-c14n#]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Finalized signature signing allowed algorithms: [[]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Finalized signature signing reference digest methods: [[
>>> http://www.w3.org/2001/04/xmlenc#sha256, 
>>> http://www.w3.org/2001/04/xmldsig-more#sha384, 
>>> http://www.w3.org/2001/04/xmlenc#sha512, 
>>> http://www.w3.org/2000/09/xmldsig#sha1]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator]
>>>  
>>> Metadata directory location for [aai_pionier_net_pl_test] is 
>>> [/etc/cas/saml/aai_pionier_net_pl_test-1001]
>>> cas_1 | DEBUG 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Locating signature signing key for 
>>> [SamlRegisteredService(super=AbstractRegisteredService(serviceId=
>>> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, 
>>> theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
>>> id=1001, description=null, 
>>> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
>>>  
>>> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
>>> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true,
>>>  
>>> messageCode=null, text=null), 
>>> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
>>> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, 
>>> ticketGrantingTicketExpirationPolicy=null, 
>>> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, 
>>> evaluationOrder=999, 
>>> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c,
>>>  
>>> logoutType=BACK_CHANNEL, environments=[], 
>>> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>>>  
>>> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
>>> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
>>> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
>>> authorizedToReleaseCredentialPassword=false, 
>>> authorizedToReleaseProxyGrantingTicket=false, 
>>> excludeDefaultAttributes=false, 
>>> authorizedToReleaseAuthenticationAttributes=true, 
>>> principalIdAttribute=null, order=0), 
>>> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, 
>>> displayName, givenName, sn, eduPersonScopedAffiliation]), 
>>> entityAttribute=null, entityAttributeFormat=null, 
>>> entityAttributeValues=[]), 
>>> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>>>  
>>> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
>>> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
>>> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
>>> authorizedToReleaseCredentialPassword=false, 
>>> authorizedToReleaseProxyGrantingTicket=false, 
>>> excludeDefaultAttributes=false, 
>>> authorizedToReleaseAuthenticationAttributes=true, 
>>> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, 
>>> attribute=uidNumber)], mergingPolicy=replace, order=0), 
>>> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
>>>  
>>> failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
>>> principalAttributeValueToMatch=null, bypassEnabled=false, 
>>> forceExecution=false, bypassTrustedDeviceEnabled=false, 
>>> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
>>> script=null), 
>>> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=
>>> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, 
>>> redirectUrl=null, 
>>> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
>>> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
>>> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
>>>  
>>> permitUndefined=true, exclusive=false), requireAllAttributes=true, 
>>> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), 
>>> publicKey=null, 
>>> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
>>>  
>>> excludedAuthenticationHandlers=[], 
>>> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
>>>  
>>> properties={}, contacts=[]), 
>>> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, 
>>> metadataProxyLocation=null, metadataMaxValidity=0, 
>>> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, 
>>> metadataCriteriaPattern=null, 
>>> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
>>> metadataSignatureLocation=null, logoutResponseBinding=null, 
>>> requireSignedRoot=true, serviceProviderNameIdQualifier=null, 
>>> nameIdQualifier=null, metadataExpirationDuration=PT60M, 
>>> signingCredentialFingerprint=null, issuerEntityId=null, 
>>> signingKeyAlgorithm=null, signAssertions=false, 
>>> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, 
>>> skipGeneratingSubjectConfirmationInResponseTo=false, 
>>> skipGeneratingSubjectConfirmationNotOnOrAfter=false, 
>>> skipGeneratingSubjectConfirmationRecipient=false, 
>>> skipGeneratingSubjectConfirmationNotBefore=true, 
>>> skipGeneratingSubjectConfirmationNameId=true, 
>>> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, 
>>> signResponses=true, encryptAssertions=false, encryptAttributes=false, 
>>> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, 
>>> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, 
>>> metadataCriteriaRemoveRolelessEntityDescriptors=true, 
>>> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, 
>>> whiteListBlackListPrecedence=null, attributeNameFormats={}, 
>>> attributeFriendlyNames={}, attributeValueTypes={}, 
>>> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], 
>>> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], 
>>> signingSignatureWhiteListedAlgorithms=[], 
>>> signingSignatureCanonicalizationAlgorithm=null, 
>>> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], 
>>> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])] 
>>> using algorithm [RSA]
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.security.impl.MetadataCredentialResolver] Resolving 
>>> credentials from metadata using entityID: 
>>> https://login.umcs.pl/cas/idp/metadata, role: 
>>> {urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor, protocol: null, 
>>> usage: SIGNING
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator]
>>>  
>>> Metadata directory location for [aai_pionier_net_pl_test] is 
>>> [/etc/cas/saml/aai_pionier_net_pl_test-1001]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator]
>>>  
>>> Metadata directory location for [aai_pionier_net_pl_test] is 
>>> [/etc/cas/saml/aai_pionier_net_pl_test-1001]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Resolved metadata resource is [file [/etc/cas/saml/idp-metadata.xml]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Located metadata root element [EntityDescriptor]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Initializing metadata resolver [SamlIdPMetadataResolver]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Resolving metadata for criteria [[UsageCriterion [credUsage=SIGNING], 
>>> EntityRoleCriterion 
>>> [role={urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor], 
>>> SamlIdPSamlRegisteredServiceCriterion(registeredService=SamlRegisteredService(super=AbstractRegisteredService(serviceId=
>>> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, 
>>> theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
>>> id=1001, description=null, 
>>> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
>>>  
>>> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
>>> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true,
>>>  
>>> messageCode=null, text=null), 
>>> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
>>> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, 
>>> ticketGrantingTicketExpirationPolicy=null, 
>>> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, 
>>> evaluationOrder=999, 
>>> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c,
>>>  
>>> logoutType=BACK_CHANNEL, environments=[], 
>>> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>>>  
>>> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
>>> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
>>> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
>>> authorizedToReleaseCredentialPassword=false, 
>>> authorizedToReleaseProxyGrantingTicket=false, 
>>> excludeDefaultAttributes=false, 
>>> authorizedToReleaseAuthenticationAttributes=true, 
>>> principalIdAttribute=null, order=0), 
>>> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, 
>>> displayName, givenName, sn, eduPersonScopedAffiliation]), 
>>> entityAttribute=null, entityAttributeFormat=null, 
>>> entityAttributeValues=[]), 
>>> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>>>  
>>> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
>>> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
>>> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
>>> authorizedToReleaseCredentialPassword=false, 
>>> authorizedToReleaseProxyGrantingTicket=false, 
>>> excludeDefaultAttributes=false, 
>>> authorizedToReleaseAuthenticationAttributes=true, 
>>> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, 
>>> attribute=uidNumber)], mergingPolicy=replace, order=0), 
>>> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
>>>  
>>> failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
>>> principalAttributeValueToMatch=null, bypassEnabled=false, 
>>> forceExecution=false, bypassTrustedDeviceEnabled=false, 
>>> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
>>> script=null), 
>>> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=
>>> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, 
>>> redirectUrl=null, 
>>> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
>>> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
>>> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
>>>  
>>> permitUndefined=true, exclusive=false), requireAllAttributes=true, 
>>> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), 
>>> publicKey=null, 
>>> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
>>>  
>>> excludedAuthenticationHandlers=[], 
>>> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
>>>  
>>> properties={}, contacts=[]), 
>>> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, 
>>> metadataProxyLocation=null, metadataMaxValidity=0, 
>>> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, 
>>> metadataCriteriaPattern=null, 
>>> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
>>> metadataSignatureLocation=null, logoutResponseBinding=null, 
>>> requireSignedRoot=true, serviceProviderNameIdQualifier=null, 
>>> nameIdQualifier=null, metadataExpirationDuration=PT60M, 
>>> signingCredentialFingerprint=null, issuerEntityId=null, 
>>> signingKeyAlgorithm=null, signAssertions=false, 
>>> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, 
>>> skipGeneratingSubjectConfirmationInResponseTo=false, 
>>> skipGeneratingSubjectConfirmationNotOnOrAfter=false, 
>>> skipGeneratingSubjectConfirmationRecipient=false, 
>>> skipGeneratingSubjectConfirmationNotBefore=true, 
>>> skipGeneratingSubjectConfirmationNameId=true, 
>>> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, 
>>> signResponses=true, encryptAssertions=false, encryptAttributes=false, 
>>> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, 
>>> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, 
>>> metadataCriteriaRemoveRolelessEntityDescriptors=true, 
>>> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, 
>>> whiteListBlackListPrecedence=null, attributeNameFormats={}, 
>>> attributeFriendlyNames={}, attributeValueTypes={}, 
>>> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], 
>>> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], 
>>> signingSignatureWhiteListedAlgorithms=[], 
>>> signingSignatureCanonicalizationAlgorithm=null, 
>>> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], 
>>> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])), 
>>> SignatureSigningConfigurationCriterion 
>>> [configs=[org.opensaml.xmlsec.impl.BasicSignatureSigningConfiguration@3df6e0b2]],
>>>  
>>> EntityIdCriterion [id=https://login.umcs.pl/cas/idp/metadata]]]
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
>>> Metadata Resolver SamlIdPMetadataResolver 
>>> https://login.umcs.pl/cas/idp/metadata: Metadata backing store does not 
>>> contain any EntityDescriptors with the ID: 
>>> https://login.umcs.pl/cas/idp/metadata
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.AbstractBatchMetadataResolver] 
>>> Metadata Resolver SamlIdPMetadataResolver 
>>> https://login.umcs.pl/cas/idp/metadata: Resolved 0 candidates via 
>>> EntityIdCriterion: EntityIdCriterion [id=
>>> https://login.umcs.pl/cas/idp/metadata]
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
>>> Metadata Resolver SamlIdPMetadataResolver 
>>> https://login.umcs.pl/cas/idp/metadata: Candidates iteration was empty, 
>>> nothing to filter via predicates
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Resolved metadata resource is [file [/etc/cas/saml/idp-metadata.xml]]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Located metadata root element [EntityDescriptor]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Initializing metadata resolver [SamlIdPMetadataResolver]
>>> cas_1 | TRACE 
>>> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
>>> Resolving metadata for criteria [[UsageCriterion [credUsage=SIGNING], 
>>> EntityRoleCriterion 
>>> [role={urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor], 
>>> SamlIdPSamlRegisteredServiceCriterion(registeredService=SamlRegisteredService(super=AbstractRegisteredService(serviceId=
>>> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, 
>>> theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
>>> id=1001, description=null, 
>>> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
>>>  
>>> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
>>> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true,
>>>  
>>> messageCode=null, text=null), 
>>> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
>>> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, 
>>> ticketGrantingTicketExpirationPolicy=null, 
>>> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, 
>>> evaluationOrder=999, 
>>> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c,
>>>  
>>> logoutType=BACK_CHANNEL, environments=[], 
>>> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>>>  
>>> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
>>> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
>>> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
>>> authorizedToReleaseCredentialPassword=false, 
>>> authorizedToReleaseProxyGrantingTicket=false, 
>>> excludeDefaultAttributes=false, 
>>> authorizedToReleaseAuthenticationAttributes=true, 
>>> principalIdAttribute=null, order=0), 
>>> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, 
>>> displayName, givenName, sn, eduPersonScopedAffiliation]), 
>>> entityAttribute=null, entityAttributeFormat=null, 
>>> entityAttributeValues=[]), 
>>> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>>>  
>>> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
>>> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
>>> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
>>> authorizedToReleaseCredentialPassword=false, 
>>> authorizedToReleaseProxyGrantingTicket=false, 
>>> excludeDefaultAttributes=false, 
>>> authorizedToReleaseAuthenticationAttributes=true, 
>>> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, 
>>> attribute=uidNumber)], mergingPolicy=replace, order=0), 
>>> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
>>>  
>>> failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
>>> principalAttributeValueToMatch=null, bypassEnabled=false, 
>>> forceExecution=false, bypassTrustedDeviceEnabled=false, 
>>> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
>>> script=null), 
>>> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=
>>> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, 
>>> redirectUrl=null, 
>>> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
>>> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
>>> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
>>>  
>>> permitUndefined=true, exclusive=false), requireAllAttributes=true, 
>>> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), 
>>> publicKey=null, 
>>> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
>>>  
>>> excludedAuthenticationHandlers=[], 
>>> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
>>>  
>>> properties={}, contacts=[]), 
>>> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, 
>>> metadataProxyLocation=null, metadataMaxValidity=0, 
>>> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, 
>>> metadataCriteriaPattern=null, 
>>> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
>>> metadataSignatureLocation=null, logoutResponseBinding=null, 
>>> requireSignedRoot=true, serviceProviderNameIdQualifier=null, 
>>> nameIdQualifier=null, metadataExpirationDuration=PT60M, 
>>> signingCredentialFingerprint=null, issuerEntityId=null, 
>>> signingKeyAlgorithm=null, signAssertions=false, 
>>> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, 
>>> skipGeneratingSubjectConfirmationInResponseTo=false, 
>>> skipGeneratingSubjectConfirmationNotOnOrAfter=false, 
>>> skipGeneratingSubjectConfirmationRecipient=false, 
>>> skipGeneratingSubjectConfirmationNotBefore=true, 
>>> skipGeneratingSubjectConfirmationNameId=true, 
>>> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, 
>>> signResponses=true, encryptAssertions=false, encryptAttributes=false, 
>>> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, 
>>> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, 
>>> metadataCriteriaRemoveRolelessEntityDescriptors=true, 
>>> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, 
>>> whiteListBlackListPrecedence=null, attributeNameFormats={}, 
>>> attributeFriendlyNames={}, attributeValueTypes={}, 
>>> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], 
>>> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], 
>>> signingSignatureWhiteListedAlgorithms=[], 
>>> signingSignatureCanonicalizationAlgorithm=null, 
>>> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], 
>>> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])), 
>>> SignatureSigningConfigurationCriterion 
>>> [configs=[org.opensaml.xmlsec.impl.BasicSignatureSigningConfiguration@3df6e0b2]],
>>>  
>>> EntityIdCriterion [id=https://login.umcs.pl/cas/idp/metadata]]]
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
>>> Metadata Resolver SamlIdPMetadataResolver 
>>> https://login.umcs.pl/cas/idp/metadata: Metadata backing store does not 
>>> contain any EntityDescriptors with the ID: 
>>> https://login.umcs.pl/cas/idp/metadata
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.AbstractBatchMetadataResolver] 
>>> Metadata Resolver SamlIdPMetadataResolver 
>>> https://login.umcs.pl/cas/idp/metadata: Resolved 0 candidates via 
>>> EntityIdCriterion: EntityIdCriterion [id=
>>> https://login.umcs.pl/cas/idp/metadata]
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
>>> Metadata Resolver SamlIdPMetadataResolver 
>>> https://login.umcs.pl/cas/idp/metadata: Candidates iteration was empty, 
>>> nothing to filter via predicates
>>> cas_1 | DEBUG 
>>> [org.opensaml.saml.metadata.resolver.impl.PredicateRoleDescriptorResolver] 
>>> Resolved no EntityDescriptors via underlying MetadataResolver, returning 
>>> empty collection
>>> cas_1 | ERROR 
>>> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>>>  
>>> Unable to locate any signing credentials for service 
>>> [aai_pionier_net_pl_test]
>>>
>>

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/436606b0-6d77-4164-b807-c32e39182a96n%40apereo.org.

Reply via email to