org.opensaml.security.SecurityException Java Examples
The following examples show how to use
org.opensaml.security.SecurityException.
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example #1
Source File: SamlClient.java From saml-client with MIT License | 5 votes |
/** Sign a SamlObject with default settings. * Note that this method is a no-op if spCredential is unset. * @param samlObject The object to sign * * @throws SamlException if {@link SignatureSupport#signObject(SignableXMLObject, SignatureSigningParameters) signObject} fails * */ private void signSAMLObject(SignableSAMLObject samlObject) throws SamlException { if (spCredential != null) { try { // Describe how we're going to sign the request SignatureBuilder signer = new SignatureBuilder(); Signature signature = signer.buildObject(Signature.DEFAULT_ELEMENT_NAME); signature.setCanonicalizationAlgorithm(SignatureConstants.ALGO_ID_C14N_EXCL_OMIT_COMMENTS); signature.setSignatureAlgorithm(SignatureConstants.ALGO_ID_SIGNATURE_RSA_SHA256); signature.setKeyInfo( new X509KeyInfoGeneratorFactory().newInstance().generate(spCredential)); signature.setSigningCredential(spCredential); samlObject.setSignature(signature); // Actually sign the request SignatureSigningParameters signingParameters = new SignatureSigningParameters(); signingParameters.setSigningCredential(spCredential); signingParameters.setSignatureCanonicalizationAlgorithm( SignatureConstants.ALGO_ID_C14N_EXCL_OMIT_COMMENTS); signingParameters.setSignatureAlgorithm(SignatureConstants.ALGO_ID_SIGNATURE_RSA_SHA256); signingParameters.setKeyInfoGenerator(new X509KeyInfoGeneratorFactory().newInstance()); SignatureSupport.signObject(samlObject, signingParameters); } catch (SecurityException | MarshallingException | SignatureException e) { throw new SamlException("Failed to sign request", e); } } }
Example #2
Source File: HttpRedirectBindingUtil.java From armeria with Apache License 2.0 | 5 votes |
/** * Generates a signature of the specified {@code input}. */ @VisibleForTesting static String generateSignature(Credential signingCredential, String algorithmURI, String input) { try { final byte[] signature = XMLSigningUtil.signWithURI(signingCredential, algorithmURI, input.getBytes(StandardCharsets.UTF_8)); return Base64.getEncoder().encodeToString(signature); } catch (SecurityException e) { throw new SamlException("failed to generate a signature", e); } }
Example #3
Source File: SAML2ReaderWriter.java From syncope with Apache License 2.0 | 5 votes |
public void sign(final SignableSAMLObject signableObject) throws SecurityException { org.opensaml.xmlsec.signature.Signature signature = OpenSAMLUtil.buildSignature(); signature.setCanonicalizationAlgorithm(SignatureConstants.ALGO_ID_C14N_EXCL_OMIT_COMMENTS); signature.setSignatureAlgorithm(sigAlgo); signature.setSigningCredential(loader.getCredential()); signature.setKeyInfo(keyInfoGenerator.generate(loader.getCredential())); signableObject.setSignature(signature); signableObject.releaseDOM(); signableObject.releaseChildrenDOM(true); }
Example #4
Source File: SamlMetadataServiceFunction.java From armeria with Apache License 2.0 | 4 votes |
private EntityDescriptor buildMetadataEntityDescriptorElement( String defaultHostname, SamlPortConfig portConfig) { final EntityDescriptor entityDescriptor = build(EntityDescriptor.DEFAULT_ELEMENT_NAME); entityDescriptor.setEntityID(entityId); final SPSSODescriptor spSsoDescriptor = build(SPSSODescriptor.DEFAULT_ELEMENT_NAME); spSsoDescriptor.setAuthnRequestsSigned(true); spSsoDescriptor.setWantAssertionsSigned(true); spSsoDescriptor.addSupportedProtocol(SAMLConstants.SAML20P_NS); final List<String> nameIdFormats = idpConfigs.values().stream() .map(p -> p.nameIdPolicy().format()) .distinct() .map(SamlNameIdFormat::urn) .collect(Collectors.toList()); spSsoDescriptor.getNameIDFormats().addAll(buildNameIdFormatElements(nameIdFormats)); final List<SingleLogoutService> sloList = spSsoDescriptor.getSingleLogoutServices(); singleLogoutEndpoints.forEach(endpoint -> { final SingleLogoutService slo = build(SingleLogoutService.DEFAULT_ELEMENT_NAME); slo.setBinding(endpoint.bindingProtocol().urn()); slo.setLocation(endpoint.toUriString(portConfig.scheme().uriText(), defaultHostname, portConfig.port())); sloList.add(slo); }); int acsIndex = 0; final List<AssertionConsumerService> services = spSsoDescriptor.getAssertionConsumerServices(); for (final SamlAssertionConsumerConfig acs : assertionConsumerConfigs) { services.add(buildAssertionConsumerServiceElement(acs, portConfig, defaultHostname, acsIndex++)); } final X509KeyInfoGeneratorFactory keyInfoGeneratorFactory = new X509KeyInfoGeneratorFactory(); keyInfoGeneratorFactory.setEmitEntityCertificate(true); keyInfoGeneratorFactory.setEmitEntityCertificateChain(true); final KeyInfoGenerator keyInfoGenerator = keyInfoGeneratorFactory.newInstance(); try { spSsoDescriptor.getKeyDescriptors().add( buildKeyDescriptorElement(UsageType.SIGNING, keyInfoGenerator.generate(signingCredential))); spSsoDescriptor.getKeyDescriptors().add( buildKeyDescriptorElement(UsageType.ENCRYPTION, keyInfoGenerator.generate(encryptionCredential))); } catch (SecurityException e) { throw new SamlException("failed to generate KeyInfo element", e); } entityDescriptor.getRoleDescriptors().add(spSsoDescriptor); return entityDescriptor; }