Closed cveld closed 4 years ago
I believe this issue is related: https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/issues/1012
Yes, that issue is definitely related. I also created a PR which would fix it: https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/pull/1041 Unfortunately it's been stuck in discussions. One thing I've commented there is that a SAML assertion could contain nested signed data (such as an assertion) in any of the extension points. And obviously it is used in the wild too.
I'll bring this issue up as an example of why disallowing more signatures is a bad idea.
And as a workaround, the 1.0.0 version does not have this issue - if targeting the full .NET Framework is okay for you.
The AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet#1012 is fixed, so I'm closing this.
Non Security Issues
Information needed
What nuget packages are you using 2.2.0
What is the expected behaviour
Our saml2p:Response payload contains one main saml2:Assertion with a saml2:Advice in it. This saml2:Advice on its turn also contains one saml2:Assertion. The payload contains three signatures on the following levels:
The library throws the following exception:
IDX13102: Exception thrown while reading 'NameIDType' for Saml2SecurityToken. Inner exception: 'Microsoft.IdentityModel.Xml.XmlReadException: IDX30019: Unable to read XML. A second <Signature> element was found. The EnvelopedSignatureReader can only process one <Signature>.
Additional info
Please include
net472
,netcoreap2.1
) net471