Closed spaceone closed 7 years ago
2017-08-25 18:36:05 DEBUG OpenSAML.MessageDecoder.SAML2 [10]: extracting issuer from SAML 2.0 protocol message
2017-08-25 18:36:05 DEBUG OpenSAML.MessageDecoder.SAML2 [10]: message from (https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php)
2017-08-25 18:36:05 DEBUG OpenSAML.MessageDecoder.SAML2 [10]: searching metadata for message issuer...
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.MessageFlow [10]: evaluating message flow policy (replay checking on, expiration 60)
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [10]: inserted record (_6f6fb3922452d4d4b4512907d0615b6affcd434548) in context (MessageFlow) with expiration (1503679205)
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [10]: validating signature profile
2017-08-25 18:36:05 DEBUG XMLTooling.TrustEngine.ExplicitKey [10]: attempting to validate signature with the peer's credentials
2017-08-25 18:36:05 DEBUG XMLTooling.TrustEngine.ExplicitKey [10]: signature validated with credential
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [10]: signature verified against message issuer
2017-08-25 18:36:05 DEBUG Shibboleth.SSO.SAML2 [10]: processing message against SAML 2.0 SSO profile
2017-08-25 18:36:05 DEBUG Shibboleth.SSO.SAML2 [10]: extracting issuer from SAML 2.0 assertion
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.MessageFlow [10]: evaluating message flow policy (replay checking on, expiration 60)
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [10]: inserted record (_aafe5216875f75821a5d51496a7005d22c154ddb9b) in context (MessageFlow) with expiration (1503679205)
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [10]: validating signature profile
2017-08-25 18:36:05 DEBUG XMLTooling.TrustEngine.ExplicitKey [10]: attempting to validate signature with the peer's credentials
2017-08-25 18:36:05 DEBUG XMLTooling.TrustEngine.ExplicitKey [10]: signature validated with credential
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [10]: signature verified against message issuer
2017-08-25 18:36:05 DEBUG OpenSAML.SecurityPolicyRule.BearerConfirmation [10]: assertion satisfied bearer confirmation requirements
2017-08-25 18:36:05 DEBUG Shibboleth.SSO.SAML2 [10]: SSO profile processing completed successfully
2017-08-25 18:36:05 DEBUG Shibboleth.SSO.SAML2 [10]: extracting pushed attributes...
2017-08-25 18:36:05 DEBUG Shibboleth.AttributeExtractor.XML [10]: unable to extract attributes, unknown XML object type: samlp:Response
2017-08-25 18:36:05 DEBUG Shibboleth.AttributeDecoder.NameID [10]: decoding NameIDAttribute (persistent-id) from SAML 2 NameID with Format (urn:oasis:names:tc:SAML:2.0:nameid-format:persistent)
2017-08-25 18:36:05 DEBUG Shibboleth.AttributeExtractor.XML [10]: unable to extract attributes, unknown XML object type: saml:AuthnStatement
2017-08-25 18:36:05 INFO Shibboleth.AttributeExtractor.XML [10]: skipping unmapped SAML 2.0 Attribute with Name: uid, Format:urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified
2017-08-25 18:36:05 DEBUG Shibboleth.AttributeFilter [10]: filtering 1 attribute(s) from (https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php)
2017-08-25 18:36:05 DEBUG Shibboleth.AttributeFilter [10]: applying filtering rule(s) for attribute (persistent-id) from (https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php)
2017-08-25 18:36:05 DEBUG Shibboleth.SSO.SAML2 [10]: resolving attributes...
2017-08-25 18:36:05 DEBUG Shibboleth.AttributeResolver.Query [10]: found AttributeStatement in input to new session, skipping query
2017-08-25 18:36:05 DEBUG Shibboleth.SessionCache [10]: creating new session
2017-08-25 18:36:05 DEBUG Shibboleth.SessionCache [10]: storing new session...
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [10]: inserted record (session) in context (_f0ed232345d44bfeb42cd68b3cd634f8) with expiration (1503682565)
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [10]: updated record (owncloud) in context (NameID) with expiration (1503707765)
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [10]: inserted record (_aafe5216875f75821a5d51496a7005d22c154ddb9b) in context (_f0ed232345d44bfeb42cd68b3cd634f8) with expiration (1503682565)
2017-08-25 18:36:05 INFO Shibboleth.SessionCache [10]: new session created: ID (_f0ed232345d44bfeb42cd68b3cd634f8) IdP (https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php) Protocol(urn:oasis:names:tc:SAML:2.0:protocol) Address (172.17.42.1)
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [10]: deleted record (97b03d5c3032687fb1ccf19551cc83cd249ecea7f49aa9cf496e48b815cde2ee) in context (RelayState)
2017-08-25 18:36:05 DEBUG Shibboleth.SSO.SAML2 [10]: ACS returning via redirect to: https://mdm.lmz.intranet/oc-shib/index.php
2017-08-25 18:36:05 DEBUG Shibboleth.Listener [9]: dispatching message (find::StorageService::SessionCache)
2017-08-25 18:36:05 DEBUG XMLTooling.StorageService [9]: updated expiration of valid records in context (_f0ed232345d44bfeb42cd68b3cd634f8) to (1503682565)
If I add a PHP file which prints the environment variables I see:
["persistent-id"]=>
string(110) "https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php!https://mdm.lmz.intranet/shibboleth!owncloud"
["REMOTE_USER"]=>
string(110) "https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php!https://mdm.lmz.intranet/shibboleth!owncloud"
["PHP_AUTH_USER"]=>
string(110) "https://ucs-sso.lmz.intranet/simplesamlphp/saml2/idp/metadata.php!https://mdm.lmz.intranet/shibboleth!owncloud"
The shibboleth configuration /etc/shibboleth/attribute-map.xml contains
<Attribute name="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" id="persistent-id">
<AttributeDecoder xsi:type="NameIDAttributeDecoder" formatter="$NameQualifier!$SPNameQualifier!$Name" defaultQualifiers="true"/>
</Attribute>
What does owncloud expect in the attribute? Only the username or also the NameQualifier and the SPNameQualifier?
It works when I change the attribute-map configuration to:
<Attribute name="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" id="persistent-id">
<AttributeDecoder xsi:type="NameIDAttributeDecoder" formatter="$Name" defaultQualifiers="true"/>
</Attribute>
That's stupid. I hope this gets documented. It costs multiple hours of debugging,
Hello,
we tried to setup Single Sign on for owncloud using Shibboleth as explained here: https://doc.owncloud.org/server/10.0/admin_manual/enterprise/user_management/user_auth_shibboleth.html?highlight=saml
We are using a Univention Corporate Server 4.2-1 as Identity Provider.
The set up succeeded so far, the SAML authentication at Apache with mod_shib seems to work but the owncloud service provider shows this error message during login:
Question: Does shibboleth or owncloud provide an XML file describing the SAML service provider (urn:oasis:names:tc:SAML:2.0:metadata EntityDescriptor)?
Question: What values from the SAML Response message does mod_shib write into which environment variables? My SAML Response message contains a Name-ID and some attributes. Are the attributes necessary or does it only use the Name-ID? Which Name-ID Format do I need to specify then? From the /etc/shibboleth/attribute-map.xml it seems
urn:oasis:names:tc:SAML:2.0:nameid-format:persistent
needs to be used? Or is iturn:mace:dir:attribute-def:eduPersonPrincipalName
?If I access /Shibboleth.sso/Session I see:
So I set up:
My SAML Response message looks like this: