http://en.wikipedia.org/wiki/SAML_2.0#Web_Browser_SSO_Profile

In SAML 2.0, as in SAML 1.1, the primary use case is still Web Browser SSO, but the scope of SAML 2.0 is broader than previous versions of SAML, as suggested in the following exhaustive list of profiles:

  • SSO Profiles

    • Web Browser SSO Profile
    • Enhanced Client or Proxy (ECP) Profile
    • Identity Provider Discovery Profile
    • Single Logout Profile
    • Name Identifier Management Profile
  • Artifact Resolution Profile
  • Assertion Query/Request Profile
  • Name Identifier Mapping Profile
  • SAML Attribute Profiles
    • Basic Attribute Profile
    • X.500/LDAP Attribute Profile
    • UUID Attribute Profile
    • DCE PAC Attribute Profile
    • XACML Attribute Profile

Although the number of supported profiles is quite large, the Profiles specification (SAMLProf[5]) is simplified since the binding aspects of each profile have been factored out into a separate Bindings specification (SAMLBind[4]).

Web Browser SSO Profile[edit]

SAML 2.0 specifies a Web Browser SSO Profile involving an identity provider (IdP), a service provider (SP), and a principal wielding an HTTP user agent. The SP has four bindings from which to choose while the IdP has three, which leads to twelve (12) possible deployment scenarios. We outline two such deployment scenarios below.

SP POST Request; IdP POST Response[edit]

This is a relatively simple deployment of the SAML 2.0 Web Browser SSO Profile where both the service provider (SP) and the identity provider (IdP) use the HTTP POST binding.

SAML 2.0 Web Browser SSO (POST)

The message flow begins with a request for a secured resource at the SP.

1. Request the target resource at the SP

The principal (via an HTTP user agent) requests a target resource at the service provider:

  1. https://sp.example.com/myresource

The service provider performs a security check on behalf of the target resource. If a valid security context at the service provider already exists, skip steps 2–7.

2. Respond with an XHTML form

The service provider responds with a document containing an XHTML form:

  1. <form method="post" action="https://idp.example.org/SAML2/SSO/POST" ...>
  2. <input type="hidden" name="SAMLRequest" value="''request''" />
  3. <input type="hidden" name="RelayState" value="''token''" />
  4. ...
  5. <input type="submit" value="Submit" />
  6. </form>

The RelayState token is an opaque reference to state information maintained at the service provider. The value of the SAMLRequest parameter is the base64 encoding of the following <samlp:AuthnRequest> element:

  1. <samlp:AuthnRequest
  2. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  3. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  4. ID="identifier_1"
  5. Version="2.0"
  6. IssueInstant="2004-12-05T09:21:59"
  7. AssertionConsumerServiceIndex="0">
  8. <saml:Issuer>https://sp.example.com/SAML2</saml:Issuer>
  9. <samlp:NameIDPolicy
  10. AllowCreate="true"
  11. Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient"/>
  12. </samlp:AuthnRequest>

Before the <samlp:AuthnRequest> element is inserted into the XHTML form, it is first base64-encoded.

3. Request the SSO Service at the IdP

The user agent issues a POST request to the SSO service at the identity provider:

  1. POST /SAML2/SSO/POST HTTP/1.1
  2. Host: idp.example.org
  3. Content-Type: application/x-www-form-urlencoded
  4. Content-Length: nnn

  5. SAMLRequest=request&RelayState=token

where the values of the SAMLRequest and RelayState parameters are taken from the XHTML form at step 2. The SSO service processes the <samlp:AuthnRequest>element (by URL-decoding, base64-decoding and inflating the request, in that order) and performs a security check. If the user does not have a valid security context, the identity provider identifies the user (details omitted).

4. Respond with an XHTML form

The SSO service validates the request and responds with a document containing an XHTML form:

  1. <form method="post" action="https://sp.example.com/SAML2/SSO/POST" ...>
  2. <input type="hidden" name="SAMLResponse" value="''response''" />
  3. <input type="hidden" name="RelayState" value="''token''" />
  4. ...
  5. <input type="submit" value="Submit" />
  6. </form>

The value of the RelayState parameter has been preserved from step 3. The value of the SAMLResponse parameter is the base64 encoding of the following<samlp:Response> element:

  1. <samlp:Response
  2. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  3. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  4. ID="identifier_2"
  5. InResponseTo="identifier_1"
  6. Version="2.0"
  7. IssueInstant="2004-12-05T09:22:05"
  8. Destination="https://sp.example.com/SAML2/SSO/POST">
  9. <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>
  10. <samlp:Status>
  11. <samlp:StatusCode
  12. Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  13. </samlp:Status>
  14. <saml:Assertion
  15. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  16. ID="identifier_3"
  17. Version="2.0"
  18. IssueInstant="2004-12-05T09:22:05">
  19. <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>
  20. <!-- a POSTed assertion MUST be signed -->
  21. <ds:Signature
  22. xmlns:ds="http://www.w3.org/2000/09/xmldsig#">...</ds:Signature>
  23. <saml:Subject>
  24. <saml:NameID
  25. Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">
  26. 3f7b3dcf-1674-4ecd-92c8-1544f346baf8
  27. </saml:NameID>
  28. <saml:SubjectConfirmation
  29. Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
  30. <saml:SubjectConfirmationData
  31. InResponseTo="identifier_1"
  32. Recipient="https://sp.example.com/SAML2/SSO/POST"
  33. NotOnOrAfter="2004-12-05T09:27:05"/>
  34. </saml:SubjectConfirmation>
  35. </saml:Subject>
  36. <saml:Conditions
  37. NotBefore="2004-12-05T09:17:05"
  38. NotOnOrAfter="2004-12-05T09:27:05">
  39. <saml:AudienceRestriction>
  40. <saml:Audience>https://sp.example.com/SAML2</saml:Audience>
  41. </saml:AudienceRestriction>
  42. </saml:Conditions>
  43. <saml:AuthnStatement
  44. AuthnInstant="2004-12-05T09:22:00"
  45. SessionIndex="identifier_3">
  46. <saml:AuthnContext>
  47. <saml:AuthnContextClassRef>
  48. urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
  49. </saml:AuthnContextClassRef>
  50. </saml:AuthnContext>
  51. </saml:AuthnStatement>
  52. </saml:Assertion>
  53. </samlp:Response>

5. Request the Assertion Consumer Service at the SP

The user agent issues a POST request to the assertion consumer service at the service provider:

  1. POST /SAML2/SSO/POST HTTP/1.1
  2. Host: sp.example.com
  3. Content-Type: application/x-www-form-urlencoded
  4. Content-Length: nnn
  5. SAMLResponse=response&RelayState=token

where the values of the SAMLResponse and RelayState parameters are taken from the XHTML form at step 4.

6. Redirect to the target resource

The assertion consumer service processes the response, creates a security context at the service provider and redirects the user agent to the target resource.

7. Request the target resource at the SP again

The user agent requests the target resource at the service provider (again):

  1. https://sp.example.com/myresource

8. Respond with requested resource

Since a security context exists, the service provider returns the resource to the user agent.

SP Redirect Artifact; IdP Redirect Artifact[edit]

This is a complex deployment of the SAML 2.0 Web Browser SSO Profile where both the service provider (SP) and the identity provider (IdP) use the HTTP Artifact binding. Both artifacts are delivered to their respective endpoints via HTTP GET.

SAML 2.0 Web Browser SSO (Artifact)

The message flow begins with a request for a secured resource at the SP:

1. Request the target resource at the SP

The principal (via an HTTP user agent) requests a target resource at the service provider:

  1. https://sp.example.com/myresource

The service provider performs a security check on behalf of the target resource. If a valid security context at the service provider already exists, skip steps 2–11.

2. Redirect to the Single Sign-on (SSO) Service at the IdP

The service provider redirects the user agent to the single sign-on (SSO) service at the identity provider. A RelayState parameter and a SAMLart parameter are appended to the redirect URL.

3. Request the SSO Service at the IdP

The user agent requests the SSO service at the identity provider:

  1. https://idp.example.org/SAML2/SSO/Artifact?SAMLart=artifact_1&RelayState=token

where token is an opaque reference to state information maintained at the service provider and artifact_1 is a SAML artifact, both issued at step 2.

4. Request the Artifact Resolution Service at the SP

The SSO service dereferences the artifact by sending a <samlp:ArtifactResolve> element bound to a SAML SOAP message to the artifact resolution service at the service provider:

  1. <samlp:ArtifactResolve
  2. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  3. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  4. ID="identifier_1"
  5. Version="2.0"
  6. IssueInstant="2004-12-05T09:21:58"
  7. Destination="https://sp.example.com/SAML2/ArtifactResolution">
  8. <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>
  9. <!-- an ArtifactResolve message SHOULD be signed -->
  10. <ds:Signature
  11. xmlns:ds="http://www.w3.org/2000/09/xmldsig#">...</ds:Signature>
  12. <samlp:Artifact>''artifact_1''</samlp:Artifact>
  13. </samlp:ArtifactResolve>

where the value of the <samlp:Artifact> element is the SAML artifact transmitted at step 3.

5. Respond with a SAML AuthnRequest

The artifact resolution service at the service provider returns a <samlp:ArtifactResponse> element (containing an <samlp:AuthnRequest> element) bound to a SAML SOAP message to the SSO service at the identity provider:

  1. <samlp:ArtifactResponse
  2. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  3. ID="identifier_2"
  4. InResponseTo="identifier_1"
  5. Version="2.0"
  6. IssueInstant="2004-12-05T09:21:59">
  7. <!-- an ArtifactResponse message SHOULD be signed -->
  8. <ds:Signature
  9. xmlns:ds="http://www.w3.org/2000/09/xmldsig#">...</ds:Signature>
  10. <samlp:Status>
  11. <samlp:StatusCode
  12. Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  13. </samlp:Status>
  14. <samlp:AuthnRequest
  15. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  16. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  17. ID="identifier_3"
  18. Version="2.0"
  19. IssueInstant="2004-12-05T09:21:59"
  20. Destination="https://idp.example.org/SAML2/SSO/Artifact"
  21. ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact"
  22. AssertionConsumerServiceURL="https://sp.example.com/SAML2/SSO/Artifact">
  23. <saml:Issuer>https://sp.example.com/SAML2</saml:Issuer>
  24. <samlp:NameIDPolicy
  25. AllowCreate="false"
  26. Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"/>
  27. </samlp:AuthnRequest>
  28. </samlp:ArtifactResponse>

The SSO service processes the <samlp:AuthnRequest> element and performs a security check. If the user does not have a valid security context, the identity provider identifies the user (details omitted).

6. Redirect to the Assertion Consumer Service

The SSO service at the identity provider redirects the user agent to the assertion consumer service at the service provider. The previous RelayState parameter and a new SAMLart parameter are appended to the redirect URL.

7. Request the Assertion Consumer Service at the SP

The user agent requests the assertion consumer service at the service provider:

  1. https://sp.example.com/SAML2/SSO/Artifact?SAMLart=artifact_2&RelayState=token

where token is the token value from step 3 and artifact_2 is the SAML artifact issued at step 6.

8. Request the Artifact Resolution Service at the IdP

The assertion consumer service dereferences the artifact by sending a <samlp:ArtifactResolve> element bound to a SAML SOAP message to the artifact resolution service at the identity provider:

  1. <samlp:ArtifactResolve
  2. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  3. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  4. ID="identifier_4"
  5. Version="2.0"
  6. IssueInstant="2004-12-05T09:22:04"
  7. Destination="https://idp.example.org/SAML2/ArtifactResolution">
  8. <saml:Issuer>https://sp.example.com/SAML2</saml:Issuer>
  9. <!-- an ArtifactResolve message SHOULD be signed -->
  10. <ds:Signature
  11. xmlns:ds="http://www.w3.org/2000/09/xmldsig#">...</ds:Signature>
  12. <samlp:Artifact>''artifact_2''</samlp:Artifact>
  13. </samlp:ArtifactResolve>

where the value of the <samlp:Artifact> element is the SAML artifact transmitted at step 7.

9. Respond with a SAML Assertion

The artifact resolution service at the identity provider returns a <samlp:ArtifactResponse> element (containing an <samlp:Response> element) bound to a SAML SOAP message to the assertion consumer service at the service provider:

  1. <samlp:ArtifactResponse
  2. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  3. ID="identifier_5"
  4. InResponseTo="identifier_4"
  5. Version="2.0"
  6. IssueInstant="2004-12-05T09:22:05">
  7. <!-- an ArtifactResponse message SHOULD be signed -->
  8. <ds:Signature
  9. xmlns:ds="http://www.w3.org/2000/09/xmldsig#">...</ds:Signature>
  10. <samlp:Status>
  11. <samlp:StatusCode
  12. Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  13. </samlp:Status>
  14. <samlp:Response
  15. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  16. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  17. ID="identifier_6"
  18. InResponseTo="identifier_3"
  19. Version="2.0"
  20. IssueInstant="2004-12-05T09:22:05"
  21. Destination="https://sp.example.com/SAML2/SSO/Artifact">
  22. <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>
  23. <ds:Signature
  24. xmlns:ds="http://www.w3.org/2000/09/xmldsig#">...</ds:Signature>
  25. <samlp:Status>
  26. <samlp:StatusCode
  27. Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  28. </samlp:Status>
  29. <saml:Assertion
  30. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  31. ID="identifier_7"
  32. Version="2.0"
  33. IssueInstant="2004-12-05T09:22:05">
  34. <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>
  35. <!-- a Subject element is required -->
  36. <saml:Subject>
  37. <saml:NameID
  38. Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">
  39. user@mail.example.org
  40. </saml:NameID>
  41. <saml:SubjectConfirmation
  42. Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
  43. <saml:SubjectConfirmationData
  44. InResponseTo="identifier_3"
  45. Recipient="https://sp.example.com/SAML2/SSO/Artifact"
  46. NotOnOrAfter="2004-12-05T09:27:05"/>
  47. </saml:SubjectConfirmation>
  48. </saml:Subject>
  49. <saml:Conditions
  50. NotBefore="2004-12-05T09:17:05"
  51. NotOnOrAfter="2004-12-05T09:27:05">
  52. <saml:AudienceRestriction>
  53. <saml:Audience>https://sp.example.com/SAML2</saml:Audience>
  54. </saml:AudienceRestriction>
  55. </saml:Conditions>
  56. <saml:AuthnStatement
  57. AuthnInstant="2004-12-05T09:22:00"
  58. SessionIndex="identifier_7">
  59. <saml:AuthnContext>
  60. <saml:AuthnContextClassRef>
  61. urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
  62. </saml:AuthnContextClassRef>
  63. </saml:AuthnContext>
  64. </saml:AuthnStatement>
  65. </saml:Assertion>
  66. </samlp:Response>
  67. </samlp:ArtifactResponse>

10. Redirect to the target resource

The assertion consumer service processes the response, creates a security context at the service provider and redirects the user agent to the target resource.

11. Request the target resource at the SP again

The user agent requests the target resource at the service provider (again):

  1. https://sp.example.com/myresource

12. Respond with the requested resource

Since a security context exists, the service provider returns the resource to the user agent.

Identity Provider Discovery Profile[edit]

The SAML 2.0 Identity Provider Discovery Profile introduces the following concepts:

  • Common Domain
  • Common Domain Cookie
  • Common Domain Cookie Writing Service
  • Common Domain Cookie Reading Service

As a hypothetical example of a Common Domain, let's suppose Example UK (example.co.uk) and Example Deutschland (example.de) belong to the virtual organization Example Global Alliance (example.com). In this example, the domain example.com is the common domain. Both Example UK and Example Deutschland have a presence in this domain (uk.example.com and de.example.com, resp.).

The Common Domain Cookie is a secure browser cookie scoped to the common domain. For each browser user, this cookie stores a history list of recently visited IdPs. The name and value of the cookie are specified in the IdP Discovery Profile (SAMLProf[5]).

After a successful act of authentication, the IdP requests the Common Domain Cookie Writing Service. This service appends the IdP's unique identifier to the common domain cookie. An SP, when it receives an unauthenticated request for a protected resource, requests the Common Domain Cookie Reading Service to discover the browser user's most recently used IdP.

Assertion Query/Request Profile[edit]

The Assertion Query/Request Profile is a general profile that accommodates numerous types of so-called queries using the following SAML 2.0 elements:

  • the <samlp:AssertionIDRequest> element, which is used to request an assertion given its unique identifier (ID)
  • the <samlp:SubjectQuery> element, which is an abstract extension point that allows new subject-based SAML queries to be defined
  • the <samlp:AuthnQuery> element, which is used to request existing authentication assertions about a given subject from an Authentication Authority
  • the <samlp:AttributeQuery> element, which is used to request attributes about a given subject from an Attribute Authority
  • the <samlp:AuthzDecisionQuery> element, which is used to request an authorization decision from a trusted third party

The SAML SOAP binding is often used in conjunction with queries.

SAML Attribute Query[edit]

The Attribute Query is perhaps the most important type of SAML query. Often a requester, acting on behalf of the principal, queries an identity provider for attributes. Below we give an example of a query issued by a principal directly:

  1. <samlp:AttributeQuery
  2. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  3. xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
  4. ID="aaf23196-1773-2113-474a-fe114412ab72"
  5. Version="2.0"
  6. IssueInstant="2006-07-17T20:31:40">
  7. <saml:Issuer
  8. Format="urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName">
  9. CN=trscavo@uiuc.edu,OU=User,O=NCSA-TEST,C=US
  10. </saml:Issuer>
  11. <saml:Subject>
  12. <saml:NameID
  13. Format="urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName">
  14. CN=trscavo@uiuc.edu,OU=User,O=NCSA-TEST,C=US
  15. </saml:NameID>
  16. </saml:Subject>
  17. <saml:Attribute
  18. NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
  19. Name="urn:oid:2.5.4.42"
  20. FriendlyName="givenName">
  21. </saml:Attribute>
  22. <saml:Attribute
  23. NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
  24. Name="urn:oid:1.3.6.1.4.1.1466.115.121.1.26"
  25. FriendlyName="mail">
  26. </saml:Attribute>
  27. </samlp:AttributeQuery>

Note that the Issuer is the Subject in this case. This is sometimes called an attribute self-query. An identity provider might return the following assertion, wrapped in a <samlp:Response> element (not shown):

  1. <saml:Assertion
  2. xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
  3. xmlns:xs="http://www.w3.org/2001/XMLSchema"
  4. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  5. xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
  6. ID="_33776a319493ad607b7ab3e689482e45"
  7. Version="2.0"
  8. IssueInstant="2006-07-17T20:31:41">
  9. <saml:Issuer>https://idp.example.org/SAML2</saml:Issuer>
  10. <ds:Signature>...</ds:Signature>
  11. <saml:Subject>
  12. <saml:NameID
  13. Format="urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName">
  14. CN=trscavo@uiuc.edu,OU=User,O=NCSA-TEST,C=US
  15. </saml:NameID>
  16. <saml:SubjectConfirmation
  17. Method="urn:oasis:names:tc:SAML:2.0:cm:holder-of-key">
  18. <saml:SubjectConfirmationData>
  19. <ds:KeyInfo>
  20. <ds:X509Data>
  21. <!-- principal's X.509 cert -->
  22. <ds:X509Certificate>
  23. MIICiDCCAXACCQDE+9eiWrm62jANBgkqhkiG9w0BAQQFADBFMQswCQYDVQQGEwJV
  24. UzESMBAGA1UEChMJTkNTQS1URVNUMQ0wCwYDVQQLEwRVc2VyMRMwEQYDVQQDEwpT
  25. UC1TZXJ2aWNlMB4XDTA2MDcxNzIwMjE0MVoXDTA2MDcxODIwMjE0MVowSzELMAkG
  26. A1UEBhMCVVMxEjAQBgNVBAoTCU5DU0EtVEVTVDENMAsGA1UECxMEVXNlcjEZMBcG
  27. A1UEAwwQdHJzY2F2b0B1aXVjLmVkdTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkC
  28. gYEAv9QMe4lRl3XbWPcflbCjGK9gty6zBJmp+tsaJINM0VaBaZ3t+tSXknelYife
  29. nCc2O3yaX76aq53QMXy+5wKQYe8Rzdw28Nv3a73wfjXJXoUhGkvERcscs9EfIWcC
  30. g2bHOg8uSh+Fbv3lHih4lBJ5MCS2buJfsR7dlr/xsadU2RcCAwEAATANBgkqhkiG
  31. 9w0BAQQFAAOCAQEAdyIcMTob7TVkelfJ7+I1j0LO24UlKvbLzd2OPvcFTCv6fVHx
  32. Ejk0QxaZXJhreZ6+rIdiMXrEzlRdJEsNMxtDW8++sVp6avoB5EX1y3ez+CEAIL4g
  33. cjvKZUR4dMryWshWIBHKFFul+r7urUgvWI12KbMeE9KP+kiiiiTskLcKgFzngw1J
  34. selmHhTcTCrcDocn5yO2+d3dog52vSOtVFDBsBuvDixO2hv679JR6Hlqjtk4GExp
  35. E9iVI0wdPE038uQIJJTXlhsMMLvUGVh/c0ReJBn92Vj4dI/yy6PtY/8ncYLYNkjg
  36. oVN0J/ymOktn9lTlFyTiuY4OuJsZRO1+zWLy9g==
  37. </ds:X509Certificate>
  38. </ds:X509Data>
  39. </ds:KeyInfo>
  40. </saml:SubjectConfirmationData>
  41. </saml:SubjectConfirmation>
  42. </saml:Subject>
  43. <!-- assertion lifetime constrained by principal's X.509 cert -->
  44. <saml:Conditions
  45. NotBefore="2006-07-17T20:31:41"
  46. NotOnOrAfter="2006-07-18T20:21:41">
  47. </saml:Conditions>
  48. <saml:AuthnStatement
  49. AuthnInstant="2006-07-17T20:31:41">
  50. <saml:AuthnContext>
  51. <saml:AuthnContextClassRef>
  52. urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient
  53. </saml:AuthnContextClassRef>
  54. </saml:AuthnContext>
  55. </saml:AuthnStatement>
  56. <saml:AttributeStatement>
  57. <saml:Attribute
  58. xmlns:x500="urn:oasis:names:tc:SAML:2.0:profiles:attribute:X500"
  59. x500:Encoding="LDAP"
  60. NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
  61. Name="urn:oid:2.5.4.42"
  62. FriendlyName="givenName">
  63. <saml:AttributeValue
  64. xsi:type="xs:string">Tom</saml:AttributeValue>
  65. </saml:Attribute>
  66. <saml:Attribute
  67. xmlns:x500="urn:oasis:names:tc:SAML:2.0:profiles:attribute:X500"
  68. x500:Encoding="LDAP"
  69. NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
  70. Name="urn:oid:1.3.6.1.4.1.1466.115.121.1.26"
  71. FriendlyName="mail">
  72. <saml:AttributeValue
  73. xsi:type="xs:string">trscavo@gmail.com</saml:AttributeValue>
  74. </saml:Attribute>
  75. </saml:AttributeStatement>
  76. </saml:Assertion>

In contrast to the BearerAssertion shown earlier, this assertion has a longer lifetime corresponding to the lifetime of the X.509 certificate that the principal used to authenticate to the identity provider. Moreover, since the assertion is signed, the user can push this assertion to a relying party, and as long as the user can prove possession of the corresponding private key (hence the name "holder-of-key"), the relying party can be assured that the assertion is authentic.

SAML 2.0 Profiles--wiki的更多相关文章

  1. ComponentSpace SAML v2.0 for .NET 使用介绍

    下载地址:http://samlsso.codeplex.com/ 以下描叙参考版本为其官网最新版本2.5.0.6.相对2.4版本,2.5有了很大改进,很多接口方法都变了.使用起来更方便,易懂. 广告 ...

  2. SAML 2.0 实例分析 idp向sp发送响应(4)

    当idp与user建立起联系后,idp向sp发送响应 <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol ...

  3. SAML 2.0 实例分析 sp向idp发送请求(3)

    user没有登陆过sp,此时sp向idp发送请求,下文是请求的xml形式 <samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAM ...

  4. SAML 2.0简介(1)

    1.什么是SAML: SAML是Web浏览器用来通过安全令牌启用单点登录(SSO)的标准协议 2.优点: 跨多个应用程序管理用户身份和授权. 3.单点登录(SSO)是什么: 它使用户仅使用一组凭据(用 ...

  5. SAML 2.0 setup steps, 效果图

    Steps of setting up SAML SSO. 效果图 # Registry a Identity Provider services in:(Might need purchase) I ...

  6. SAML 2.0初始

    一.背景知识: SAML即安全断言标记语言,英文全称是Security Assertion Markup Language.它是一个基于XML的标准,用于在不同的安全域(security domain ...

  7. SAML 2.0 流程分析(2)

  8. 我眼中的SAML (Security Assertion Markup Language)

    提到SAML (Security Assertion Markup Language), 很多人都会联想到单点登录SSO.那么Saml到底是什么,它跟sso到底有什么联系?这里给大家分享一下我在读完了 ...

  9. OpenStack Identity API v3 extensions (CURRENT)

    Table Of Contents Identity API v3 extensions (CURRENT) OS-ENDPOINT-POLICY API Associate policy and e ...

随机推荐

  1. 使用python读写excel

    项目中要在excel要跨工作簿根据一列数据获取另一列的数据,而excel本身的函数vlookup一直不太好用,只能用程序进行处理了,最近刚接触了python,灵机一动使用Python进行处理,先将js ...

  2. wp8.1 SQLite的基本使用

    SQLite是一个轻量级的关系型数据库,正是由于其精悍小巧,在移动端平台被广泛应用,但不适合处理大量数据和批量操作.它的底层是由C语言编写,最初设计是为了应用于嵌入式,占用资源非常低且简单易用,而且绝 ...

  3. php 5.6 与之前版本不兼容中的数组属性定义辨析

    在php5.6官方文档的不兼容页(http://php.net/manual/zh/migration56.incompatible.php)中提到了几个与以前版本不兼容的情况,其中提到了为类定义数组 ...

  4. Buffer Pool--数据库内存结构

    数据库从操作系统申请到的内存可分为两部分:1.缓存池内存(数据页和空闲页)2.非缓存池内存(线程/DLL/连接服务器等) Note:通过服务器实例属性设置的最大/最小服务器内存是指缓存池内存Note: ...

  5. 如何创建一个自己的.NET Core Global Tools

    索引 NET Core应用框架之BitAdminCore框架应用篇系列 框架演示:https://www.bitadmincore.com 框架源码:https://github.com/chenyi ...

  6. unix网络编程卷2:进程间通信

    管道没有名字,只能有亲缘关系使用. FIFO也叫有名管道,有名所以没有了这个限制. 管道提供一个单向数据流,创建函数返回两个文件描述符.一个用来读,一个用来写. 宏S_ISFIFO可用于确定一个描述符 ...

  7. ORM的查询操作

    查询的分类 class Author(models.Model): name = models.CharField(max_length=32) age = models.IntegerField() ...

  8. 手机APP测试点总结

    一.功能性测试: (1)根据产品需求文档编写测试用例 (2)软件设计文档编写用例 二.兼容性适配性测试: (1)Android.iOS版本的兼容性 (2)手机分辨率兼容性 (3)网络的兼容性:2G/3 ...

  9. 【1】JMicro微服务-RPC体验

    如非授权,禁止用于商业用途,转载请注明出处作者:mynewworldyyl JMICRO运行简单服务提供者和消费者 1. 下载源代码 git checkout https://github.com/m ...

  10. 在IDEA中 SFTP 进行发布操作

    1, 2, 3, 4, 成功了 补充:] 也可以使用手动写配置文件的方式来的