certificate - Spring SAML - Failed to establish trust of KeyInfo-derived credential -
on web application have implemented saml delegate authentication on cas 5.1 server. working until web app receivers saml assertion: then, error reported in subject, followed authentication failure.
this extract of log:
17:11:15,466 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) signature validation using candidate credential successful 17:11:15,466 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) verified signature using keyinfo-derived credential 17:11:15,466 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) attempting establish trust of keyinfo-derived credential 17:11:15,468 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) failed establish trust of keyinfo-derived credential 17:11:15,469 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) failed verify signature and/or establish trust using keyinfo-derived credentials 17:11:15,469 debug [org.opensaml.xml.signature.impl.explicitkeysignaturetrustengine] (default task-15) attempting verify signature using trusted credentials 17:11:15,469 debug [org.opensaml.xml.signature.impl.explicitkeysignaturetrustengine] (default task-15) failed verify signature using either keyinfo-derived or directly trusted credentials 17:11:15,469 debug [org.opensaml.common.binding.security.samlprotocolmessagexmlsignaturesecuritypolicyrule] (default task-15) validation of protocol message signature failed context issuer 'development:cas:idp', message type: {urn:oasis:names:tc:saml:2.0:protocol}response 17:11:15,469 debug [org.springframework.security.saml.samlprocessingfilter] (default task-15) incoming saml message invalid: org.opensaml.ws.security.securitypolicyexception: validation of protocol message signature failed
step-by-step analysis shows explicitkeysignaturetrustengine tries find credentials criteria involving entityid, protocol , usage signing. metadata configured web app seems meet criteria, trusted credential collection empty.
the certificate used in signing loaded in web app's keystore , same in cas server, web app , respective metadata.
can explain doing wrong , how fix it? in advance.
Comments
Post a Comment