Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HTTP-Redirect for Assertions Consumer Service #70

Closed
serpulga opened this issue May 11, 2015 · 6 comments
Closed

HTTP-Redirect for Assertions Consumer Service #70

serpulga opened this issue May 11, 2015 · 6 comments

Comments

@serpulga
Copy link
Contributor

I understand that HTTP-Redirect is not a supported binding for the Assertions Consumer Service,

Was this just to keep the toolkip simple?
Would this be a welcome feature/PR?

I'm not a SAML2 expert so,
Do you think this would required a big effort?

Thanks

@pitbulk
Copy link
Contributor

pitbulk commented May 11, 2015

Why you need HTTP-Redirect for the Assertions Consumer Service endpoint?

I don't know any IdP that is not able to send a SAML Response using the HTTP-POST binding.
For security reason (since it should contain user data) is the best approach to send a SAML Response, so I don't see any point implementing a new binding.

Is not too hard, it requires some changes on the response.py, but as you mention this will add more complexity and for me makes no sense.

If you have a project that requires it, you can use another SAML toolkit that support it like pysaml2

@serpulga
Copy link
Contributor Author

The idea is to support many IdPs on my project, and I do have encountered one that requires HTTP-Redirect.

@pitbulk
Copy link
Contributor

pitbulk commented May 11, 2015

You can create a fork with that functionality and I can help you to implement it.

You can extend the current OneLogin_Saml2_Response to OneLogin_Saml2_Response_Post and OneLogin_Saml2_Response_Redirect. Keep the common code at OneLogin_Saml2_Response and put the Signature validation in each subclass. (Notice that at the LogoutRequest/LogoutResponse class you already have code to validate Signatures of the HTTP-Redirect binding).

At the process_response of the OneLogin_Saml2_Auth you may build one or other object.

@serpulga
Copy link
Contributor Author

Thank you.
I'll create thr fork and work on the functionality.

@pitbulk
Copy link
Contributor

pitbulk commented May 11, 2015

I don't know if later we will merge all those changes on the master branch, but I have no problem creating a new branch with all those "rare" behavior that some of you suggested in the past.

@pitbulk
Copy link
Contributor

pitbulk commented Apr 8, 2016

Review #78 (comment)

@pitbulk pitbulk closed this as completed Apr 8, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants