certificate - Spring SAML - Failed to establish trust of KeyInfo-derived credential -


on web application have implemented saml delegate authentication on cas 5.1 server. working until web app receivers saml assertion: then, error reported in subject, followed authentication failure.

this extract of log:

17:11:15,466 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) signature validation using candidate credential successful 17:11:15,466 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) verified signature using keyinfo-derived credential 17:11:15,466 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) attempting establish trust of keyinfo-derived credential 17:11:15,468 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) failed establish trust of keyinfo-derived credential 17:11:15,469 debug [org.opensaml.xml.signature.impl.basesignaturetrustengine] (default task-15) failed verify signature and/or establish trust using keyinfo-derived credentials 17:11:15,469 debug [org.opensaml.xml.signature.impl.explicitkeysignaturetrustengine] (default task-15) attempting verify signature using trusted credentials 17:11:15,469 debug [org.opensaml.xml.signature.impl.explicitkeysignaturetrustengine] (default task-15) failed verify signature using either keyinfo-derived or directly trusted credentials 17:11:15,469 debug [org.opensaml.common.binding.security.samlprotocolmessagexmlsignaturesecuritypolicyrule] (default task-15) validation of protocol message signature failed context issuer 'development:cas:idp', message type: {urn:oasis:names:tc:saml:2.0:protocol}response 17:11:15,469 debug [org.springframework.security.saml.samlprocessingfilter] (default task-15) incoming saml message invalid: org.opensaml.ws.security.securitypolicyexception: validation of protocol message signature failed 

step-by-step analysis shows explicitkeysignaturetrustengine tries find credentials criteria involving entityid, protocol , usage signing. metadata configured web app seems meet criteria, trusted credential collection empty.

the certificate used in signing loaded in web app's keystore , same in cas server, web app , respective metadata.

can explain doing wrong , how fix it? in advance.


Comments

Popular posts from this blog

Is there a better way to structure post methods in Class Based Views -

performance - Why is XCHG reg, reg a 3 micro-op instruction on modern Intel architectures? -

jquery - Responsive Navbar with Sub Navbar -