Closed MartinR1993 closed 6 years ago
If I understood correctly, you want 2 IDP configurations in the same app, one protecting a set of endpoints, the other one protecting another set of endpoints. This is in theory possible, but if you want real isolation, you would need 2 different security contexts, with their own security filter chain, etc. This would involve also isolation at the JSESSIONID level, requiring you to setup 2 cookies. That way it's literally like you're hitting two different applications. My two cents here is that is not worth it. Why have 2 IDPs in the first place to differentiate who's admin and who's not? It's much cleaner to use 1 IDP, and just have a role "ADMIN". Or, if you really need 2 IDPs because you keep the accounts separate, you can hook up 2 IDPs very easily, but again, on the same application, this way they share the same authentication object, and all you gotta do is assign a role ADMIN to the users from the admin IDP.
closing due to no response
Hi ulises,
I have a spring boot system, now using only one SAML server for authentication. This is using authentication for almost all my endpoints (url). But now I want to have two SAML servers running on the same system, one for customer authorization and the new one for admin authorization. I have created and now running the new SAML server for admin and the certificates that's neccesary.
The two SAML servers are also working fine on thier own. But i can't figure out how to use both of them at the same time. I have now two IdP (SAML servers), the original for customer and the new for admin. And they should be connected to the same SP (using all url for Customer and only "/admin/**" for Admin). This is my configuration(this works with just one SAML server):
I have tried different solutions but nothing seems to work out for me. So i would like to ask if you can guide me in the right direction.
So how do I add another SAML server to the config, to authenticate only some urls ? Example: I want antMatches("/admin/**") and using SAML Admin authentication server.
Im using these specs: spring-boot-security-saml v. 1.13 java jdk 1.8