I had a look to the configuration and I'm wondering why the Security Token Request is sent to the CXF service instead of your STS.
Originally, you raised the issue that the SAML token can't be validated. But meanwhile, we face an issue one step before where the SAML token should be issued by the STS. Acording to your client configuration: <issuer address="http://stsbli.cloudapp.net:8080/STSService.svc/IWSTrust13" binding="ws2007HttpBinding" bindingConfiguration="http://srvsk01.skdevel.local/WCFTestSTS/Service.svc/IWSTrust13" > The STS request should be sent to the sts deployed at stsbli.cloudapp.net. Any idea why .NET sends it to the application service instead? According to your configuration, a symmetric key is generated: <message algorithmSuite="Default" issuedKeyType="SymmetricKey" negotiateServiceCredential="true"> The requested token type (issuedTokenType="string") is not configured which means it is left to the STS to decide what kind of token should be issued. I'm not sure about the impact of negotiateServiceCredential. Let's assume you can sort out the issue that the STS request is sent again to your STS instance instead of the CXF application service. The question then is how is the symmetric key shared between the service consumer and service provider. <?xml version="1.0"?> <saml:Assertion xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion" MajorVersion="1" MinorVersion="1" AssertionID="_2bea327c-8791-4bd2-9f98-5690c0c6a83b" Issuer="BLISTS" IssueInstant="2011-11-09T22:47:38.202Z"> <saml:Conditions NotBefore="2011-11-09T22:47:38.124Z" NotOnOrAfter="2011-11-09T23:47:38.124Z"> <saml:AudienceRestrictionCondition> <saml:Audience>http://66.211.102.200/gen4/services/AssessmentDataService</saml:Audience> </saml:AudienceRestrictionCondition> </saml:Conditions> <saml:AttributeStatement> <saml:Subject> <saml:SubjectConfirmation> <saml:ConfirmationMethod>urn:oasis:names:tc:SAML:1.0:cm:holder-of-key</saml:ConfirmationMethod> <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <trust:BinarySecret xmlns:trust="http://docs.oasis-open.org/ws-sx/ws-trust/200512">sYjbfcODXJg0oBL0EPlCMlUJ2SZnjk/51e2rDs+2e+E=</trust:BinarySecret> </KeyInfo> </saml:SubjectConfirmation> </saml:Subject> <saml:Attribute AttributeName="Name" AttributeNamespace="http://www.bli.org/claims"> <saml:AttributeValue>roccbufalino1</saml:AttributeValue> </saml:Attribute> <saml:Attribute AttributeName="IDNamespace" AttributeNamespace="http://www.bli.org/claims"> <saml:AttributeValue>http://www.bli.org/Rocketship/</saml:AttributeValue> </saml:Attribute> <saml:Attribute AttributeName="ID" AttributeNamespace="http://www.bli.org/claims"> <saml:AttributeValue>123111111111111111111</saml:AttributeValue> </saml:Attribute> </saml:AttributeStatement> <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> <ds:SignedInfo> <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/> <ds:Reference URI="#_2bea327c-8791-4bd2-9f98-5690c0c6a83b"> <ds:Transforms> <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/> <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> </ds:Transforms> <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/> <ds:DigestValue>1cIz27KwzN0gwLkDSLolHTxaAMQ19YsVcF3eV1sA/68=</ds:DigestValue> </ds:Reference> </ds:SignedInfo> <ds:SignatureValue>t1vCq6MWMWupEDcfv/8b+FOCcb8bi7gIbBNM9XCLsIjm20xMPla5u43DjPaRb2+rPdnlVeNt/s/8Id/zxvPmBqIohdJY3ZeAC0/i+DLV+8tMdA/q6azSUjgZHKniUtqPjH6B5aLYm3niwkqivwhWCcl3txVjfbtjoxDTUmMendaDxZ80zHmIy73vzf1nNo+SokdGvwEbQY8RKSYXnUoXXP2oAkyUSG2efr/41eXkeOd+nLdCWLKEhDJCWYNEs1KlneJclh9Fu15DRmnihjeV3eFDFy1xmIXQ8IiVI+78CYvcPN7HMDSKOkDSQs3DmNQaamlxTYkMN0AMYwwEhcyWsA==</ds:SignatureValue> <KeyInfo xmlns="http://www.w3.org/2000/09/xmldsig#"> <X509Data> <X509Certificate>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</X509Certificate> </X509Data> </KeyInfo> </ds:Signature> </saml:Assertion> What is in the BinarySecret and against what should CXF process the proof-of-possession requirement? ------ Oliver Wulff http://owulff.blogspot.com Solution Architect Talend Application Integration Division http://www.talend.com ________________________________________ Von: satya [[email protected]] Gesendet: Montag, 9. Januar 2012 22:38 Bis: [email protected] Betreff: Re: AW: General security error (Provided SAML token does not contain a suitable key) The following is the configuration from the .net client. The configuration works with .net services <system.serviceModel> <client> <endpoint address="http://66.211.102.200/gen4/services/AssessmentDataService" binding="ws2007FederationHttpBinding" bindingConfiguration="WS2007FederationHttpBinding_IAssessmentDataService" contract="ServiceReference2.IAssessmentDataService" name="WSHttpBinding_IAssessmentDataService" behaviorConfiguration="clientEndpointCredential"> <identity> <certificate encodedValue="" /> </identity> </endpoint> </client> <behaviors> <endpointBehaviors> <behavior name="clientEndpointCredential"> <clientCredentials> <clientCertificate storeName="My" storeLocation="LocalMachine" x509FindType="FindBySubjectName" findValue="BLITokenRequest" /> </clientCredentials> </behavior> </endpointBehaviors> <serviceBehaviors/> </behaviors> <bindings> <ws2007FederationHttpBinding> <binding name="WS2007FederationHttpBinding_IAssessmentDataService" > <security mode="Message"> <message algorithmSuite="Default" issuedKeyType="SymmetricKey" negotiateServiceCredential="true"> <issuer address="http://stsbli.cloudapp.net:8080/STSService.svc/IWSTrust13" binding="ws2007HttpBinding" bindingConfiguration="http://srvsk01.skdevel.local/WCFTestSTS/Service.svc/IWSTrust13" > <identity> <certificate encodedValue="*" /> </identity> </issuer> <issuerMetadata address="http://localhost:56636/Hybrid.STS/mex" /> </message> </security> </binding> </ws2007FederationHttpBinding> <ws2007HttpBinding> <binding name="http://srvsk01.skdevel.local/WCFTestSTS/Service.svc/IWSTrust13"> <security mode="Message"> <message clientCredentialType="Certificate" negotiateServiceCredential="false" algorithmSuite="Default" establishSecurityContext="false" /> </security> </binding> </ws2007HttpBinding> </bindings> </system.serviceModel> -- View this message in context: http://cxf.547215.n5.nabble.com/Re-General-security-error-Provided-SAML-token-does-not-contain-a-suitable-key-tp4990489p5132596.html Sent from the cxf-dev mailing list archive at Nabble.com.
