By: Bryan Sumon user 08 Apr 2021 at 9:18 a.m. CDT

3 Responses
Bryan Sumon gravatar
Hello guys, Lets me explain you the context to reproduce the error : I have added a new provider to use the SAML exchange in gluu. My IDP extern is ADFS azure for which we have configured all data needed to exchange with gluu. I have activate passport saml custom script to use the acr_value "passport_saml" in our http request. A good point, in our case we got an access of the specific login page which allows us to use saml protocol to get logged. But we have a 404 response when we send the saml request on our IDP extern (ADFS azure). Indeed, normally we should have an xml encoded in base64 which is submited in the data form sent in our http request but actually the encoding seems to be malformed. Maybe i missed something can you help me to solve that. Here you will find an example of saml request encoded by gluu/passport in according with the data fill for the provider created : ``` SAMLRequest: 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 ``` As you can see below, the xml is not correctly encoded in base64.

By Chris Eland staff 20 Apr 2021 at 3:12 p.m. CDT

Chris Eland gravatar
Hello Brian, sorry for the delayed response. You are using 4.2.2 in Ubuntu 20.04. About the `SAMLRequest` parameter, it's encoded using base64 and urlencode, even that I may be wrong. **Have it worked before with other IDP?** Also would you please provide: 1. `oxauth.log` (please set it in `TRACE` level) 2. `oxauth_script.log` 3. `passport.log` (please set it in `DEBUG` level) 4. A screnshot of your configured passport provider. Thanks, Chris

By Chris Eland staff 23 Apr 2021 at 10:42 a.m. CDT

Chris Eland gravatar
Hello Brian, how are you? I'm waiting your input to proceed. Best Chris

By Bryan Sumon user 29 Apr 2021 at 4:43 a.m. CDT

Bryan Sumon gravatar
Hi Chris, I'm fine thanks for asking. We have never succeed to make work SAML request with other SAML external IDP. But OpenID Connect works fine with azure ADFS. I can't give you for now some input but i'm sure the next week it would be possible. I will go back to you soon. Thanks for your support.