简体   繁体   English

SSO-SP端SAML响应验证的行业实践

[英]SSO - Industry practice with SP side SAML response validation

we are implementing SSO solution with our customers.Due to its complex nature and time sensitivity, we employed a third party security partner firm that can act as SP and redirect the request after authenticating the user. 我们正在与客户一起实施SSO解决方案。由于其复杂的性质和时间敏感性,我们聘请了第三方安全合作伙伴公司,该公司可以充当SP并在验证用户身份后重定向请求。 The third party firm is now telling me they are going to send SAML response to our application to further validate. 第三方公司现在告诉我他们将向我们的应用程序发送SAML响应以进一步验证。

My question is , Given that SAML response is already validated at our third party provider(who is acting as SP on our behalf), why we(application owner) again have to do SAML assertion? 我的问题是,鉴于SAML响应已经在我们的第三方提供商(代表我们充当SP的提供商)中进行了验证,为什么我们(应用程序所有者)又必须进行SAML声明?

I was expecting it is going to be a redirect from the third party with some token to validate so that our application can skip the login validation part. 我期望它将是来自第三方的重定向,并带有一些令牌来进行验证,以便我们的应用程序可以跳过登录验证部分。 but I wanted to talk to them with research facts and industry practice. 但是我想和他们谈谈研究事实和行业实践。 Can anyone help? 有人可以帮忙吗? please let me know if i am missing something here. 如果我在这里想念什么,请告诉我。

The usual practice when using such intermediary SP for SSO to (typically a legacy) application is to: 使用此类中间SP进行SSO(通常是旧版)应用程序时,通常的做法是:

  • process and validate the SAML Authentication Response and the Assertion at the SP 在SP处处理和验证SAML身份验证响应和声明
  • SP then encodes a cookie on a common domain or a token provided as a request parameter/HTTP header 然后,SP对公共域上的cookie或作为请求参数/ HTTP标头提供的令牌进行编码
  • cookie/token is typically constructed using a symmetric cryptography with a shared secret and eg HMAC cookie /令牌通常使用具有共享机密和HMAC的对称密码来构造
  • SP redirects user to the application which verifies the provided cookie or token and grants access SP将用户重定向到应用程序,该应用程序验证提供的cookie或令牌并授予访问权限

I don't think you're missing anything. 我认为您没有丢失任何东西。 Perhaps your provider just confused things and gave you wrong information. 也许您的提供者只是混淆了事情,并给了您错误的信息。 It makes sense to include the SAML token itself in the response from SP to your application (eg for audit purposes), but it makes no sense to expect your application to understand or validate the SAML message once it's been done already by the intermediary SP. 在SP对您的应用程序的响应中包含SAML令牌本身是有意义的(例如,出于审计目的),但是一旦中间SP已经完成,则期望您的应用程序理解或验证SAML消息是没有意义的。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM