Thanks for replying Ray,

Yes, I have that config and I see crt, keys, and idp-metadata created in it 
that was auto-generated.

Error seems misleading .... it sounds like it is looking for sp metadata 
signing credentials.

-psv

On Thursday, January 6, 2022 at 1:02:30 PM UTC-6 Ray Bon wrote:

> Pablo,
>
> The signing credentials are yours, not the service. They are not read out 
> of metadata since it requires the key. You set the location with (your cert 
> and key are stored in same location as metadata):
> cas.authn.saml-idp.metadata.file-system.location=
>
> Cas will generate the metadata and certs on start up, make sure cas can 
> write to the directory.
>
>
> https://apereo.github.io/cas/6.4.x/installation/Configuring-SAML2-DynamicMetadata.html#file-system
>
> Ray
>
> On Wed, 2022-01-05 at 18:38 -0800, Pablo Vidaurri wrote:
>
> Notice: This message was sent from outside the University of Victoria 
> email system. Please be cautious with links and sensitive information. 
>
>
> Just saw this reply ... 
>
> That did not seem to work. I have my sp metata with x509 certs embedded. I 
> have my service definition like the following:
>
> {
>   "@class" : "org.apereo.cas.support.saml.services.SamlRegisteredService",
>   "description": "my super super service",
>   "serviceId" : "^https://my.super.duper.svc.com";,   <-- entity id of my 
> sp metadata file
>   "name" : "super_duper",
>   "id" : 20210115134141,
>   "evaluationOrder" : 30,
>   "metadataLocation" : "file:/apps//cas/metadata/super_duper_metadata.xml",
>   "attributeReleasePolicy" : {
>     "@class" : 
> "org.apereo.cas.services.ReturnAllowedAttributeReleasePolicy",
>     "allowedAttributes" : [ "java.util.ArrayList", [ 
> "firstName","lastName"] ]
>   },
>   "signAssertions": true,
>   "signingCredentialType": X509
> }
>
> Still getting error:
> Unable to locate any signing credentials for service [super_duper]
>
> Do I need a separate crt somewhere instead of relying on the embbeded cert 
> in the sp metadata?
>  
> On Thursday, August 26, 2021 at 2:11:50 AM UTC-5 Marcin Roman wrote:
>
> Entityid in metadata must match entityid in cas properties.  
> Use cas 6.3.4 or 6.4. i couldn't get it working with other versions
>
> On Wed, Aug 25, 2021, 9:06 PM Pablo Vidaurri <[email protected]> wrote:
>
> Any solution or work around for this? Gettign the same issue on CAS 6.3.2. 
> Only way to get it to work is if i set my entityId to be same as hostname 
> which will not work in a production env.
>
> On Monday, April 5, 2021 at 3:41:02 AM UTC-5 Marcin Roman wrote:
>
> Hi, I have discovered yet another bug in SAML2 support in 6.3.4-SNAPSHOT 
> and 6.4.0-SNAPSHOT.
> It looks like SamlIdPMetadataResolver is provided with cas url instead of 
> entityId while resolving signing credentials.
>
> cas_1 | TRACE [org.apereo.cas.support.saml.SamlUtils] Attempting to create 
> SAMLObject for type: [interface org.opensaml.saml.saml2.core.Status] and 
> QName: [{urn:oasis:names:tc:SAML:2.0:protocol}Status]
> cas_1 | TRACE [org.apereo.cas.support.saml.SamlUtils] Attempting to create 
> SAMLObject for type: [interface org.opensaml.saml.saml2.core.StatusCode] 
> and QName: [{urn:oasis:names:tc:SAML:2.0:protocol}StatusCode]
> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] 
> ********************************************************************************
> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] Logging 
> [org.opensaml.saml.saml2.core.impl.ResponseImpl]
> cas_1 | 
> cas_1 | [<?xml version="1.0" encoding="UTF-8"?><saml2p:Response 
> xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="
> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp"; 
> ID="_111942357346883584" 
> InResponseTo="_f23e8fe1993a1a61287f3d30288ee5700f936c0631" 
> IssueInstant="2021-04-05T07:55:18.827Z" Version="2.0">
> cas_1 | <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" 
> Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
> https://login.umcs.pl/cas/idp/metadata</saml2:Issuer>
> cas_1 | <saml2p:Status>
> cas_1 | <saml2p:StatusCode 
> Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
> cas_1 | </saml2p:Status>
> cas_1 | <saml2:Assertion 
> xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" 
> ID="_5878410931315849216" IssueInstant="2021-04-05T07:55:18.753Z" 
> Version="2.0">
> cas_1 | <saml2:Issuer>https://login.umcs.pl/cas/idp/metadata
> </saml2:Issuer>
> cas_1 | <saml2:Subject>
> // DELETED
> cas_1 | </saml2:Assertion>
> cas_1 | </saml2p:Response>
> cas_1 | ]
> cas_1 | 
> cas_1 | 
> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlUtils] 
> ********************************************************************************
> cas_1 | DEBUG 
> [org.apereo.cas.support.saml.web.idp.profile.builders.response.SamlProfileSaml2ResponseBuilder]
>  
> SAML entity id [
> https://aai.pionier.net.pl/test/module.php/saml/sp/metadata.php/default-sp] 
> indicates that SAML responses should be signed
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Attempting to encode [org.opensaml.saml.saml2.core.impl.ResponseImpl] for [
> https://aai.pionier.net.pl/test/module.php/saml/sp/metadata.php/default-sp
> ]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Outbound saml object to use is 
> [org.opensaml.saml.saml2.core.impl.ResponseImpl]
> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlIdPUtils] Fetched assertion 
> consumer service url [
> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp] 
> with binding [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST] from 
> authentication request
> cas_1 | DEBUG [org.apereo.cas.support.saml.SamlIdPUtils] Configured peer 
> entity endpoint to be [
> https://aai.pionier.net.pl/test/module.php/saml/sp/saml2-acs.php/default-sp] 
> with binding [urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Default signature signing blocked algorithms: [[
> http://www.w3.org/2001/04/xmldsig-more#hmac-md5, 
> http://www.w3.org/2001/04/xmldsig-more#md5, 
> http://www.w3.org/2001/04/xmldsig-more#rsa-md5]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Default signature signing signature algorithms: [[
> http://www.w3.org/2001/04/xmldsig-more#rsa-sha256, 
> http://www.w3.org/2001/04/xmldsig-more#rsa-sha384, 
> http://www.w3.org/2001/04/xmldsig-more#rsa-sha512, 
> http://www.w3.org/2000/09/xmldsig#rsa-sha1, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1, 
> http://www.w3.org/2000/09/xmldsig#dsa-sha1, 
> http://www.w3.org/2001/04/xmldsig-more#hmac-sha256, 
> http://www.w3.org/2001/04/xmldsig-more#hmac-sha384, 
> http://www.w3.org/2001/04/xmldsig-more#hmac-sha512, 
> http://www.w3.org/2000/09/xmldsig#hmac-sha1]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Default signature signing signature canonicalization algorithm: [
> http://www.w3.org/2001/10/xml-exc-c14n#]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Default signature signing allowed algorithms: [[]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Default signature signing reference digest methods: [[
> http://www.w3.org/2001/04/xmlenc#sha256, 
> http://www.w3.org/2001/04/xmldsig-more#sha384, 
> http://www.w3.org/2001/04/xmlenc#sha512, 
> http://www.w3.org/2000/09/xmldsig#sha1]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Finalized signature signing blocked algorithms: [[
> http://www.w3.org/2001/04/xmldsig-more#hmac-md5, 
> http://www.w3.org/2001/04/xmldsig-more#md5, 
> http://www.w3.org/2001/04/xmldsig-more#rsa-md5]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Finalized signature signing signature algorithms: [[
> http://www.w3.org/2001/04/xmldsig-more#rsa-sha256, 
> http://www.w3.org/2001/04/xmldsig-more#rsa-sha384, 
> http://www.w3.org/2001/04/xmldsig-more#rsa-sha512, 
> http://www.w3.org/2000/09/xmldsig#rsa-sha1, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha256, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha384, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha512, 
> http://www.w3.org/2001/04/xmldsig-more#ecdsa-sha1, 
> http://www.w3.org/2000/09/xmldsig#dsa-sha1, 
> http://www.w3.org/2001/04/xmldsig-more#hmac-sha256, 
> http://www.w3.org/2001/04/xmldsig-more#hmac-sha384, 
> http://www.w3.org/2001/04/xmldsig-more#hmac-sha512, 
> http://www.w3.org/2000/09/xmldsig#hmac-sha1]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Finalized signature signing signature canonicalization algorithm: [
> http://www.w3.org/2001/10/xml-exc-c14n#]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Finalized signature signing allowed algorithms: [[]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Finalized signature signing reference digest methods: [[
> http://www.w3.org/2001/04/xmlenc#sha256, 
> http://www.w3.org/2001/04/xmldsig-more#sha384, 
> http://www.w3.org/2001/04/xmlenc#sha512, 
> http://www.w3.org/2000/09/xmldsig#sha1]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator]
>  
> Metadata directory location for [aai_pionier_net_pl_test] is 
> [/etc/cas/saml/aai_pionier_net_pl_test-1001]
> cas_1 | DEBUG 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Locating signature signing key for 
> [SamlRegisteredService(super=AbstractRegisteredService(serviceId=
> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, 
> theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
> id=1001, description=null, 
> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
>  
> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true,
>  
> messageCode=null, text=null), 
> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, 
> ticketGrantingTicketExpirationPolicy=null, 
> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, 
> evaluationOrder=999, 
> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c,
>  
> logoutType=BACK_CHANNEL, environments=[], 
> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>  
> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
> authorizedToReleaseCredentialPassword=false, 
> authorizedToReleaseProxyGrantingTicket=false, 
> excludeDefaultAttributes=false, 
> authorizedToReleaseAuthenticationAttributes=true, 
> principalIdAttribute=null, order=0), 
> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, 
> displayName, givenName, sn, eduPersonScopedAffiliation]), 
> entityAttribute=null, entityAttributeFormat=null, 
> entityAttributeValues=[]), 
> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>  
> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
> authorizedToReleaseCredentialPassword=false, 
> authorizedToReleaseProxyGrantingTicket=false, 
> excludeDefaultAttributes=false, 
> authorizedToReleaseAuthenticationAttributes=true, 
> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, 
> attribute=uidNumber)], mergingPolicy=replace, order=0), 
> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
>  
> failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
> principalAttributeValueToMatch=null, bypassEnabled=false, 
> forceExecution=false, bypassTrustedDeviceEnabled=false, 
> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
> script=null), 
> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=
> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, 
> redirectUrl=null, 
> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
>  
> permitUndefined=true, exclusive=false), requireAllAttributes=true, 
> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), 
> publicKey=null, 
> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
>  
> excludedAuthenticationHandlers=[], 
> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
>  
> properties={}, contacts=[]), 
> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, 
> metadataProxyLocation=null, metadataMaxValidity=0, 
> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, 
> metadataCriteriaPattern=null, 
> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
> metadataSignatureLocation=null, logoutResponseBinding=null, 
> requireSignedRoot=true, serviceProviderNameIdQualifier=null, 
> nameIdQualifier=null, metadataExpirationDuration=PT60M, 
> signingCredentialFingerprint=null, issuerEntityId=null, 
> signingKeyAlgorithm=null, signAssertions=false, 
> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, 
> skipGeneratingSubjectConfirmationInResponseTo=false, 
> skipGeneratingSubjectConfirmationNotOnOrAfter=false, 
> skipGeneratingSubjectConfirmationRecipient=false, 
> skipGeneratingSubjectConfirmationNotBefore=true, 
> skipGeneratingSubjectConfirmationNameId=true, 
> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, 
> signResponses=true, encryptAssertions=false, encryptAttributes=false, 
> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, 
> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, 
> metadataCriteriaRemoveRolelessEntityDescriptors=true, 
> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, 
> whiteListBlackListPrecedence=null, attributeNameFormats={}, 
> attributeFriendlyNames={}, attributeValueTypes={}, 
> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], 
> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], 
> signingSignatureWhiteListedAlgorithms=[], 
> signingSignatureCanonicalizationAlgorithm=null, 
> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], 
> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])] 
> using algorithm [RSA]
> cas_1 | DEBUG [org.opensaml.saml.security.impl.MetadataCredentialResolver] 
> Resolving credentials from metadata using entityID: 
> https://login.umcs.pl/cas/idp/metadata, role: 
> {urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor, protocol: null, 
> usage: SIGNING
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator]
>  
> Metadata directory location for [aai_pionier_net_pl_test] is 
> [/etc/cas/saml/aai_pionier_net_pl_test-1001]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.FileSystemSamlIdPMetadataLocator]
>  
> Metadata directory location for [aai_pionier_net_pl_test] is 
> [/etc/cas/saml/aai_pionier_net_pl_test-1001]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Resolved metadata resource is [file [/etc/cas/saml/idp-metadata.xml]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Located metadata root element [EntityDescriptor]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Initializing metadata resolver [SamlIdPMetadataResolver]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Resolving metadata for criteria [[UsageCriterion [credUsage=SIGNING], 
> EntityRoleCriterion 
> [role={urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor], 
> SamlIdPSamlRegisteredServiceCriterion(registeredService=SamlRegisteredService(super=AbstractRegisteredService(serviceId=
> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, 
> theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
> id=1001, description=null, 
> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
>  
> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true,
>  
> messageCode=null, text=null), 
> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, 
> ticketGrantingTicketExpirationPolicy=null, 
> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, 
> evaluationOrder=999, 
> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c,
>  
> logoutType=BACK_CHANNEL, environments=[], 
> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>  
> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
> authorizedToReleaseCredentialPassword=false, 
> authorizedToReleaseProxyGrantingTicket=false, 
> excludeDefaultAttributes=false, 
> authorizedToReleaseAuthenticationAttributes=true, 
> principalIdAttribute=null, order=0), 
> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, 
> displayName, givenName, sn, eduPersonScopedAffiliation]), 
> entityAttribute=null, entityAttributeFormat=null, 
> entityAttributeValues=[]), 
> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>  
> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
> authorizedToReleaseCredentialPassword=false, 
> authorizedToReleaseProxyGrantingTicket=false, 
> excludeDefaultAttributes=false, 
> authorizedToReleaseAuthenticationAttributes=true, 
> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, 
> attribute=uidNumber)], mergingPolicy=replace, order=0), 
> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
>  
> failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
> principalAttributeValueToMatch=null, bypassEnabled=false, 
> forceExecution=false, bypassTrustedDeviceEnabled=false, 
> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
> script=null), 
> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=
> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, 
> redirectUrl=null, 
> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
>  
> permitUndefined=true, exclusive=false), requireAllAttributes=true, 
> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), 
> publicKey=null, 
> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
>  
> excludedAuthenticationHandlers=[], 
> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
>  
> properties={}, contacts=[]), 
> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, 
> metadataProxyLocation=null, metadataMaxValidity=0, 
> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, 
> metadataCriteriaPattern=null, 
> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
> metadataSignatureLocation=null, logoutResponseBinding=null, 
> requireSignedRoot=true, serviceProviderNameIdQualifier=null, 
> nameIdQualifier=null, metadataExpirationDuration=PT60M, 
> signingCredentialFingerprint=null, issuerEntityId=null, 
> signingKeyAlgorithm=null, signAssertions=false, 
> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, 
> skipGeneratingSubjectConfirmationInResponseTo=false, 
> skipGeneratingSubjectConfirmationNotOnOrAfter=false, 
> skipGeneratingSubjectConfirmationRecipient=false, 
> skipGeneratingSubjectConfirmationNotBefore=true, 
> skipGeneratingSubjectConfirmationNameId=true, 
> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, 
> signResponses=true, encryptAssertions=false, encryptAttributes=false, 
> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, 
> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, 
> metadataCriteriaRemoveRolelessEntityDescriptors=true, 
> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, 
> whiteListBlackListPrecedence=null, attributeNameFormats={}, 
> attributeFriendlyNames={}, attributeValueTypes={}, 
> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], 
> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], 
> signingSignatureWhiteListedAlgorithms=[], 
> signingSignatureCanonicalizationAlgorithm=null, 
> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], 
> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])), 
> SignatureSigningConfigurationCriterion 
> [configs=[org.opensaml.xmlsec.impl.BasicSignatureSigningConfiguration@3df6e0b2]],
>  
> EntityIdCriterion [id=https://login.umcs.pl/cas/idp/metadata]]]
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
> Metadata Resolver SamlIdPMetadataResolver 
> https://login.umcs.pl/cas/idp/metadata: Metadata backing store does not 
> contain any EntityDescriptors with the ID: 
> https://login.umcs.pl/cas/idp/metadata
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.AbstractBatchMetadataResolver] 
> Metadata Resolver SamlIdPMetadataResolver 
> https://login.umcs.pl/cas/idp/metadata: Resolved 0 candidates via 
> EntityIdCriterion: EntityIdCriterion [id=
> https://login.umcs.pl/cas/idp/metadata]
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
> Metadata Resolver SamlIdPMetadataResolver 
> https://login.umcs.pl/cas/idp/metadata: Candidates iteration was empty, 
> nothing to filter via predicates
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Resolved metadata resource is [file [/etc/cas/saml/idp-metadata.xml]]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Located metadata root element [EntityDescriptor]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Initializing metadata resolver [SamlIdPMetadataResolver]
> cas_1 | TRACE 
> [org.apereo.cas.support.saml.idp.metadata.locator.SamlIdPMetadataResolver] 
> Resolving metadata for criteria [[UsageCriterion [credUsage=SIGNING], 
> EntityRoleCriterion 
> [role={urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor], 
> SamlIdPSamlRegisteredServiceCriterion(registeredService=SamlRegisteredService(super=AbstractRegisteredService(serviceId=
> https://aai\.pionier\.net\.pl/test/.*, name=aai_pionier_net_pl_test, 
> theme=null, informationUrl=null, privacyUrl=null, responseType=null, 
> id=1001, description=null, 
> expirationPolicy=DefaultRegisteredServiceExpirationPolicy(deleteWhenExpired=false,
>  
> notifyWhenDeleted=false, notifyWhenExpired=false, expirationDate=null), 
> acceptableUsagePolicy=DefaultRegisteredServiceAcceptableUsagePolicy(enabled=true,
>  
> messageCode=null, text=null), 
> proxyPolicy=org.apereo.cas.services.RefuseRegisteredServiceProxyPolicy@1, 
> proxyTicketExpirationPolicy=null, proxyGrantingTicketExpirationPolicy=null, 
> ticketGrantingTicketExpirationPolicy=null, 
> serviceTicketExpirationPolicy=null, singleSignOnParticipationPolicy=null, 
> evaluationOrder=999, 
> usernameAttributeProvider=org.apereo.cas.services.AnonymousRegisteredServiceUsernameAttributeProvider@9d20af0c,
>  
> logoutType=BACK_CHANNEL, environments=[], 
> attributeReleasePolicy=ChainingAttributeReleasePolicy(policies=[MetadataEntityAttributesAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>  
> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
> authorizedToReleaseCredentialPassword=false, 
> authorizedToReleaseProxyGrantingTicket=false, 
> excludeDefaultAttributes=false, 
> authorizedToReleaseAuthenticationAttributes=true, 
> principalIdAttribute=null, order=0), 
> allowedAttributes=[eduPersonPrincipalName, eduPersonTargetedID, mail, 
> displayName, givenName, sn, eduPersonScopedAffiliation]), 
> entityAttribute=null, entityAttributeFormat=null, 
> entityAttributeValues=[]), 
> EduPersonTargetedIdAttributeReleasePolicy(super=ReturnAllowedAttributeReleasePolicy(super=AbstractRegisteredServiceAttributeReleasePolicy(attributeFilter=null,
>  
> principalAttributesRepository=DefaultPrincipalAttributesRepository(), 
> consentPolicy=DefaultRegisteredServiceConsentPolicy(status=UNDEFINED, 
> excludedAttributes=null, includeOnlyAttributes=null, order=0), 
> authorizedToReleaseCredentialPassword=false, 
> authorizedToReleaseProxyGrantingTicket=false, 
> excludeDefaultAttributes=false, 
> authorizedToReleaseAuthenticationAttributes=true, 
> principalIdAttribute=null, order=0), allowedAttributes=[]), salt=abc, 
> attribute=uidNumber)], mergingPolicy=replace, order=0), 
> multifactorPolicy=DefaultRegisteredServiceMultifactorPolicy(multifactorAuthenticationProviders=[],
>  
> failureMode=UNDEFINED, principalAttributeNameTrigger=null, 
> principalAttributeValueToMatch=null, bypassEnabled=false, 
> forceExecution=false, bypassTrustedDeviceEnabled=false, 
> bypassPrincipalAttributeName=null, bypassPrincipalAttributeValue=null, 
> script=null), 
> matchingStrategy=FullRegexRegisteredServiceMatchingStrategy(servicePattern=
> https://aai\.pionier\.net\.pl/test/.*), logo=null, logoutUrl=null, 
> redirectUrl=null, 
> accessStrategy=DefaultRegisteredServiceAccessStrategy(order=0, 
> enabled=true, ssoEnabled=true, unauthorizedRedirectUrl=null, 
> delegatedAuthenticationPolicy=DefaultRegisteredServiceDelegatedAuthenticationPolicy(allowedProviders=[],
>  
> permitUndefined=true, exclusive=false), requireAllAttributes=true, 
> requiredAttributes={}, rejectedAttributes={}, caseInsensitive=false), 
> publicKey=null, 
> authenticationPolicy=DefaultRegisteredServiceAuthenticationPolicy(requiredAuthenticationHandlers=[],
>  
> excludedAuthenticationHandlers=[], 
> criteria=AnyAuthenticationHandlerRegisteredServiceAuthenticationPolicyCriteria(tryAll=false)),
>  
> properties={}, contacts=[]), 
> metadataLocation=/etc/cas/metadata/aai.pionier.net.pl.xml, 
> metadataProxyLocation=null, metadataMaxValidity=0, 
> requiredAuthenticationContextClass=null, metadataCriteriaDirection=null, 
> metadataCriteriaPattern=null, 
> requiredNameIdFormat=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
> metadataSignatureLocation=null, logoutResponseBinding=null, 
> requireSignedRoot=true, serviceProviderNameIdQualifier=null, 
> nameIdQualifier=null, metadataExpirationDuration=PT60M, 
> signingCredentialFingerprint=null, issuerEntityId=null, 
> signingKeyAlgorithm=null, signAssertions=false, 
> signUnsolicitedAuthnRequest=false, skipGeneratingAssertionNameId=false, 
> skipGeneratingSubjectConfirmationInResponseTo=false, 
> skipGeneratingSubjectConfirmationNotOnOrAfter=false, 
> skipGeneratingSubjectConfirmationRecipient=false, 
> skipGeneratingSubjectConfirmationNotBefore=true, 
> skipGeneratingSubjectConfirmationNameId=true, 
> skipGeneratingNameIdQualifiers=false, skipGeneratingTransientNameId=false, 
> signResponses=true, encryptAssertions=false, encryptAttributes=false, 
> encryptionOptional=false, metadataCriteriaRoles=SPSSODescriptor, 
> metadataCriteriaRemoveEmptyEntitiesDescriptors=true, 
> metadataCriteriaRemoveRolelessEntityDescriptors=true, 
> signingCredentialType=null, assertionAudiences=null, skewAllowance=0, 
> whiteListBlackListPrecedence=null, attributeNameFormats={}, 
> attributeFriendlyNames={}, attributeValueTypes={}, 
> encryptableAttributes=[], signingSignatureReferenceDigestMethods=[], 
> signingSignatureAlgorithms=[], signingSignatureBlackListedAlgorithms=[], 
> signingSignatureWhiteListedAlgorithms=[], 
> signingSignatureCanonicalizationAlgorithm=null, 
> encryptionDataAlgorithms=[], encryptionKeyAlgorithms=[], 
> encryptionBlackListedAlgorithms=[], encryptionWhiteListedAlgorithms=[])), 
> SignatureSigningConfigurationCriterion 
> [configs=[org.opensaml.xmlsec.impl.BasicSignatureSigningConfiguration@3df6e0b2]],
>  
> EntityIdCriterion [id=https://login.umcs.pl/cas/idp/metadata]]]
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
> Metadata Resolver SamlIdPMetadataResolver 
> https://login.umcs.pl/cas/idp/metadata: Metadata backing store does not 
> contain any EntityDescriptors with the ID: 
> https://login.umcs.pl/cas/idp/metadata
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.AbstractBatchMetadataResolver] 
> Metadata Resolver SamlIdPMetadataResolver 
> https://login.umcs.pl/cas/idp/metadata: Resolved 0 candidates via 
> EntityIdCriterion: EntityIdCriterion [id=
> https://login.umcs.pl/cas/idp/metadata]
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.AbstractMetadataResolver] 
> Metadata Resolver SamlIdPMetadataResolver 
> https://login.umcs.pl/cas/idp/metadata: Candidates iteration was empty, 
> nothing to filter via predicates
> cas_1 | DEBUG 
> [org.opensaml.saml.metadata.resolver.impl.PredicateRoleDescriptorResolver] 
> Resolved no EntityDescriptors via underlying MetadataResolver, returning 
> empty collection
> cas_1 | ERROR 
> [org.apereo.cas.support.saml.web.idp.profile.builders.enc.SamlIdPObjectSigner]
>  
> Unable to locate any signing credentials for service 
> [aai_pionier_net_pl_test]
>
>
>
>

-- 
- Website: https://apereo.github.io/cas
- Gitter Chatroom: https://gitter.im/apereo/cas
- List Guidelines: https://goo.gl/1VRrw7
- Contributions: https://goo.gl/mh7qDG
--- 
You received this message because you are subscribed to the Google Groups "CAS 
Community" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/apereo.org/d/msgid/cas-user/6a5b687e-fdbf-408a-b998-37dc3d5366c9n%40apereo.org.

Reply via email to