By: Daemien Boyes user 22 Jun 2017 at 3:09 p.m. CDT

41 Responses
Daemien Boyes gravatar
Hi Team, I've followed the setup on webex integration also had to pulling thing from other SAAS guides, i can't seem to get past this issue. I get a webex error "Reason: Incorrect X.509 certificate to validate SAML assertion (8)" i've upload the shibIDP.crt and i've tryed out *.cert that we're using. still no joy. is there something i should be looking at which can help me troubleshoot this? log/config?? Thanks, Daemien

By Mohib Zico Account Admin 22 Jun 2017 at 3:14 p.m. CDT

Mohib Zico gravatar
Hi Daemien, If you use 'ShibIDP.crt' from Gluu Server, then it's definitely the correct one. As this error is coming from WebEx side so, there might be something from their side. I can see couple of troubleshooting [sections](http://www.cisco.com/c/en/us/td/docs/collaboration/CWMS/1_5/Troubleshooting_Guide/Troubleshooting_Guide_chapter_01.html#reference_BA11FDDDE69148799D263B02B22BB17E) from cisco.

By Daemien Boyes user 22 Jun 2017 at 3:51 p.m. CDT

Daemien Boyes gravatar
Hi Mohib, Thanks for the reply tho i've looked at that. how do i update the shibIDP.cert to be our *.cert.. i followed this admin-guide/certificate/ tho ShibIDP cert is still using the selfsigned one. https://gluu.org/docs/ce/3.0.1/admin-guide/certificate/

By Mohib Zico Account Admin 22 Jun 2017 at 3:55 p.m. CDT

Mohib Zico gravatar
May I ask, why you wanna replace default Shibboleth certificate of your Gluu Server?

By Daemien Boyes user 22 Jun 2017 at 3:56 p.m. CDT

Daemien Boyes gravatar
I'm wondering if its due to the cert being selfsigned ( not trusted) Incorrect X.509 Certificate to Validate SAML Assertion Problem You receive the error message, "Incorrect X.509 certificate to validate SAML assertion. Contact your administrator for further support." Possible Cause Your certificate or IdP is not valid. Solution Validate your certificate or IdP as necessary.

By Mohib Zico Account Admin 22 Jun 2017 at 3:59 p.m. CDT

Mohib Zico gravatar
No, that's not the issue. 99% SAML certs are self signed.

By Daemien Boyes user 22 Jun 2017 at 4:03 p.m. CDT

Daemien Boyes gravatar
Ok thanks

By Daemien Boyes user 22 Jun 2017 at 4:25 p.m. CDT

Daemien Boyes gravatar
I Noticed that in the issue below that you do not support AuthnContextClassRef is this something that would cause issues? AuthnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport https://github.com/GluuFederation/oxIdp/issues/6 ![webexss0 setting](https://unsee.cc/musipezo/ "enter image title here")

By Mohib Zico Account Admin 23 Jun 2017 at 7:36 a.m. CDT

Mohib Zico gravatar
Hi Daemien, No, it's not about Gluu Server setup / configuration. I think you should talk to WebEx support on this issue. We could post screenshots of WebEx SSO configuration in public doc or community ticket but I am afraid that I might violate some policies of Cisco or our customers, if I do that.

By Daemien Boyes user 23 Jun 2017 at 8:21 a.m. CDT

Daemien Boyes gravatar
Hi Mohib yup i'm raiseing a ticket with webex, tho could you email me screenshot privately? I'm clutching at straws here

By Daemien Boyes user 23 Jun 2017 at 10:05 a.m. CDT

Daemien Boyes gravatar
Hi Mohib, Does the below look like an issue? "did not produce a usable identifier" 017-06-23 15:02:00,274 - INFO [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:227] - Attribute sources [webexnameid] did not produce a usable identifier 2017-06-23 15:02:00,330 - INFO [Shibboleth-Audit.SSO:241] - 20170623T150200Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|s2517084188df3daebc9957f806a32f30449d9d970|https://azurix.webex.com|http://shibboleth.net/ns/profiles/saml2/sso/browser|https://sso.azurix.net/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_b97ade85a1ea3dc9ac790c00fecd12f3|(AD-USERNAMEREMOVED)|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|||_db0598fd8be37c0538c371f4493d9626|

By Mohib Zico Account Admin 30 Jun 2017 at 1:49 p.m. CDT

Mohib Zico gravatar
Hi, >> Does the below look like an issue? "did not produce a usable identifier" Yes, nameID is really important for WebEx. BTW, updated [webex doc](https://github.com/GluuFederation/docs-ce-prod/blob/3.0.1/3.0.1/source/integration/webex.md) a bit, released 'mail' attribute in Trust relationship and idp service restart.

By Daemien Boyes user 17 Jul 2017 at 1:36 p.m. CDT

Daemien Boyes gravatar
Hi Mohib, I'm not getting much luck with webex plesae see below. _"I’ve heard from Krish that unfortunately they were unable to support you further as from a WebEx perspective it seemed to be configured correctly and Gluu is not one of supported/lab environments, do you happen to have access to Gluu Support to help us troubleshoot from their angle? It would be nice if they could be engaged to see if there are any error logs in the Gluu service appearing when the authentication tries to happen."_ Is there anything log wise i should be looking at or config wise that could be causing this error? i would really like to get this going so any help would be much appreciated Thanks, Daemien.

By Mohib Zico Account Admin 17 Jul 2017 at 1:38 p.m. CDT

Mohib Zico gravatar
Hi Daemien, We prepared that doc from a working setup. So there is little doubt on that. :-) I'll double check the public doc.

By Daemien Boyes user 17 Jul 2017 at 1:43 p.m. CDT

Daemien Boyes gravatar
Thanks Mohib, Which logs should i monitors while performing a SSO request, and could i post them for you to run your eye over it? Daemien

By Daemien Boyes user 17 Jul 2017 at 3:04 p.m. CDT

Daemien Boyes gravatar
also i've noticed in the idp-process.log this: Attribute sources [webexnameid] did not produce a usable identifier 2017-07-17 20:00:21,901 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:157] - Session validation successful. User is logged in 2017-07-17 20:00:22,302 - INFO [net.shibboleth.idp.authn.impl.ValidateExternalAuthentication:115] - Profile Action ValidateExternalAuthentication: External authentication succeeded for user: <RemovedUserName> 2017-07-17 20:00:22,346 - INFO [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:227] - Attribute sources [webexnameid] did not produce a usable identifier 2017-07-17 20:00:22,405 - INFO [Shibboleth-Audit.SSO:241] - 20170717T200022Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|s23bde315f95835557b39430c385bd8b7241e26d12|https://blah.webex.com|http://shibboleth.net/ns/profiles/saml2/sso/browser|https://sso.blah.net/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_2c65a542d992f9b078e771b53b5fb463|<RemovedUserName>|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|||_6482f01b04e1a5c8192b462ca1890fdd|

By Mohib Zico Account Admin 18 Jul 2017 at 8:57 a.m. CDT

Mohib Zico gravatar
Hi Daemein, Can you please double check your configuration with [this](https://github.com/GluuFederation/docs-ce-prod/blob/3.0.1/3.0.1/source/integration/saas/webex.md) doc?

By Daemien Boyes user 18 Jul 2017 at 9:33 a.m. CDT

Daemien Boyes gravatar
Hi Mohib, Just looking at what changed in the doc you added username which I've updated. but did you make other changes? I see on line 65 -68 there was a change but was that a copy and paste issue? as it looks like nothing has change bar moving the #END

By Mohib Zico Account Admin 18 Jul 2017 at 9:36 a.m. CDT

Mohib Zico gravatar
>> Just looking at what changed in the doc you added username which I've updated. but did you make other changes? Username and Email address. Point is... whichever nameID we supply in trust relationship, we have to supply the base attribute of that nameID together. >> I see on line 65 -68 there was a change but was that a copy and paste issue? as it looks like nothing has change bar moving the #END Yes, nothing changed much. I added that #END.. #END.. #END to make user understand the place of attribute resolver velocity template exactly.

By Daemien Boyes user 18 Jul 2017 at 9:36 a.m. CDT

Daemien Boyes gravatar
after updating USERNAME.. i now get a SSO Protocol error (1) now from website 017-07-18 14:19:35,002 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.authorize.url] loaded from oxTrust.properties 2017-07-18 14:19:35,003 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.client.id] loaded from oxTrust.properties 2017-07-18 14:19:35,005 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.client.scope] loaded from oxTrust.properties 2017-07-18 14:20:02,106 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.authorize.url] loaded from oxTrust.properties 2017-07-18 14:20:02,107 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.token.url] loaded from oxTrust.properties 2017-07-18 14:20:02,107 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.token.validation.url] loaded from oxTrust.properties 2017-07-18 14:20:02,107 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.userinfo.url] loaded from oxTrust.properties 2017-07-18 14:20:02,108 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.client.id] loaded from oxTrust.properties 2017-07-18 14:20:02,108 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.client.password] loaded from oxTrust.properties 2017-07-18 14:20:02,299 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:151] - validate check session status:200 2017-07-18 14:20:02,299 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:157] - Session validation successful. User is logged in 2017-07-18 14:20:02,690 - INFO [net.shibboleth.idp.authn.impl.ValidateExternalAuthentication:115] - Profile Action ValidateExternalAuthentication: External authentication succeeded for user: RemovedUserName 2017-07-18 14:20:02,739 - INFO [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:227] - Attribute sources [webexnameid] did not produce a usable identifier 2017-07-18 14:20:02,865 - INFO [Shibboleth-Audit.SSO:241] - 20170718T142002Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|s28192a215186817325c03fd2f9e0e500bdf80eb51|https://blah.webex.com|http://shibboleth.net/ns/profiles/saml2/sso/browser|https://sso.blah.net/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_b6e0d40ee8f1b67a2f5562549a8dcef0|(RemovedUserName)|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|||_e5b2157173ebd7c4d4e0c736dac049a3|

By Mohib Zico Account Admin 18 Jul 2017 at 9:41 a.m. CDT

Mohib Zico gravatar
Please share your configuration files ( 1. attribute-resolver.xml, 2. attribute-resolver.xml.vm, 3. saml-nameid.xml, 4. metadata-providers.xml ), screenshots of your attributes, screenshot of trust relationship and WebEx metadata.

By Daemien Boyes user 18 Jul 2017 at 10:02 a.m. CDT

Daemien Boyes gravatar
Thanks Mohib for helping me out on this let me know if this link works for you https://drive.google.com/open?id=0BzByYr_KU8wfZEhMNmVmS2dXMDQ

By Mohib Zico Account Admin 18 Jul 2017 at 10:18 a.m. CDT

Mohib Zico gravatar
Thanks, I can access them. I'll check and share my info with you.

By Mohib Zico Account Admin 18 Jul 2017 at 11:30 a.m. CDT

Mohib Zico gravatar
Ok, your attribute-resolver.xml.vm looks different. I am attaching a screenshot from my setup. Please make sure to declare those attributes in this way and don't forget to restart 'idp' and 'identity' service after that.

By Daemien Boyes user 18 Jul 2017 at 11:55 a.m. CDT

Daemien Boyes gravatar
could you please paste the config of the attribute-resolver.xml.vm here, as now i'm getting the below with the same webex error 2017-07-18 16:52:05,551 - INFO [net.shibboleth.idp.authn.impl.ValidateExternalAuthentication:115] - Profile Action ValidateExternalAuthentication: External authentication succeeded for user: removed username 2017-07-18 16:52:05,761 - ERROR [net.shibboleth.idp.profile.impl.ResolveAttributes:240] - Profile Action ResolveAttributes: Error resolving attributes: Invalid Attribute resolver configuration 2017-07-18 16:52:05,878 - WARN [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:154] - Unable to locate AttributeContext

By Daemien Boyes user 18 Jul 2017 at 2:12 p.m. CDT

Daemien Boyes gravatar
also new question do you know how i can start the gluu-server without starting apache? looks like i left the passphrase on as i tried a restart hoping it might fix the above issue :-) systemctl status gluu-server-3.0.2.service ● gluu-server-3.0.2.service - LSB: This shell script takes care of starting and stopping Loaded: loaded (/etc/init.d/gluu-server-3.0.2; bad; vendor preset: enabled) Active: failed (Result: timeout) since Wed 2017-07-19 04:32:01 AEST; 24s ago Docs: man:systemd-sysv-generator(8) Process: 13921 ExecStop=/etc/init.d/gluu-server-3.0.2 stop (code=exited, status=0/SUCCESS) Process: 14347 ExecStart=/etc/init.d/gluu-server-3.0.2 start (code=killed, signal=TERM) Tasks: 43 Memory: 1.2G CPU: 20.789s CGroup: /system.slice/gluu-server-3.0.2.service ├─ 2265 /usr/sbin/cron ├─ 2275 /usr/bin/dbus-daemon --system ├─ 2281 /usr/bin/memcached -m 64 -p 11211 -u memcache -l 127.0.0.1 ├─14388 su - root -c /etc/init.d/rc 3 ├─14389 /bin/sh /etc/init.d/rc 3 ├─14419 /opt/jre/bin/java -server -Xms256m -XX:MaxMetaspaceSize=970m -XX:+DisableExplicitGC -Dgluu.base=/etc/gluu -Dpython.home=/opt/jython -Dcatalina.base=/opt/gluu/jetty/oxauth -Djetty.loggin ├─14585 /usr/sbin/rsyslogd -f /etc/rsyslog.conf -i /var/run/gluu_rsyslogd.pid ├─14591 /bin/sh /etc/rc3.d/S02apache2 start ├─14600 /bin/sh /usr/sbin/apache2ctl start ├─14603 /usr/sbin/apache2 -k start └─14604 /bin/systemd-ask-password --timeout=0 Enter passphrase for SSL/TLS keys for

By Mohib Zico Account Admin 18 Jul 2017 at 2:16 p.m. CDT

Mohib Zico gravatar
service apache2 restart or service httpd restart

By Daemien Boyes user 18 Jul 2017 at 2:30 p.m. CDT

Daemien Boyes gravatar
that would be nice if i could start the gluu-server - as its failing to start due to apache asking for password which is the chroot. is there way i can start gluuServer with out apache starting?

By Mohib Zico Account Admin 18 Jul 2017 at 2:32 p.m. CDT

Mohib Zico gravatar
Why would apache ask for password? Also it will be beneficial for community if you can open a new ticket on apache issue.

By Daemien Boyes user 18 Jul 2017 at 2:36 p.m. CDT

Daemien Boyes gravatar
its the passphrase for the SSL certificate's private key. ok log a ticket new fot this issue

By Daemien Boyes user 19 Jul 2017 at 4:40 p.m. CDT

Daemien Boyes gravatar
Hi Mohib, Now that my server has been rebuilt :-) and i've fixed the last issue with my attribute-resolver.xml.vm : I'm now getting the below and webex page Reason: SSO protocol error (1) ( it could be the SSL i just upload to webex) 2017-07-19 21:28:15,506 - INFO [org.gluu.oxauth.client.OpenIdClient:118] - Successfully loaded oxAuth configuration 2017-07-19 21:28:15,507 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.authorize.url] loaded from oxTrust.properties 2017-07-19 21:28:15,507 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.client.id] loaded from oxTrust.properties 2017-07-19 21:28:15,508 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.client.scope] loaded from oxTrust.properties 2017-07-19 21:28:37,631 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.authorize.url] loaded from oxTrust.properties 2017-07-19 21:28:37,632 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.token.url] loaded from oxTrust.properties 2017-07-19 21:28:37,632 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.token.validation.url] loaded from oxTrust.properties 2017-07-19 21:28:37,632 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.userinfo.url] loaded from oxTrust.properties 2017-07-19 21:28:37,632 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.client.id] loaded from oxTrust.properties 2017-07-19 21:28:37,632 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.client.password] loaded from oxTrust.properties 2017-07-19 21:28:37,882 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:151] - validate check session status:200 2017-07-19 21:28:37,882 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:157] - Session validation successful. User is logged in 2017-07-19 21:28:38,292 - INFO [net.shibboleth.idp.authn.impl.ValidateExternalAuthentication:115] - Profile Action ValidateExternalAuthentication: External authentication succeeded for user: usernameremoved 2017-07-19 21:28:38,623 - INFO [Shibboleth-Audit.SSO:241] - 20170719T212838Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|s2bcccb3be7df901bc2862ea10294c81a36b9546a3|https://blah.webex.com|http://shibboleth.net/ns/profiles/saml2/sso/browser|https://sso.blah.net/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_c2de439e11f202e0ce0fb5d8d4f312bb|usernameremoved|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|webexnameid,uid,mail|user.name@blah.com|_6aa3f3a46f8835aca3070a721fd4102b|

By Mohib Zico Account Admin 19 Jul 2017 at 4:45 p.m. CDT

Mohib Zico gravatar
We need more verbose mode ( DEBUG ) for idp-process.log. It's clear that your log seems much better now but we need to check attributes with values as well. Plus... please note that.. you need to use 'shibIDP.crt' ( the shibboleth cert of your Gluu Server ) in WebEx configuration and it varies server to server; so please double check that as well.

By Daemien Boyes user 19 Jul 2017 at 4:49 p.m. CDT

Daemien Boyes gravatar
I've used the correct cert :-) how do i turn on Verbose mode for idp process?

By Mohib Zico Account Admin 19 Jul 2017 at 4:50 p.m. CDT

Mohib Zico gravatar
[Here](https://wiki.shibboleth.net/confluence/display/SHIB2/IdPLogging) is the doc. You need to restart 'idp' service after changing log level.

By Daemien Boyes user 19 Jul 2017 at 5:24 p.m. CDT

Daemien Boyes gravatar
here are the debug logs GLUU.root@sso:/opt/shibboleth-idp/conf# tail -f /opt/shibboleth-idp/logs/idp-process.log 2017-07-19 22:16:56,760 - INFO [net.shibboleth.utilities.java.support.service.AbstractReloadableService:258] - Service 'shibboleth.ReloadableCASServiceRegistry': Reloading service configuration 2017-07-19 22:16:56,761 - INFO [net.shibboleth.ext.spring.util.SchemaTypeAwareXMLBeanDefinitionReader:317] - Loading XML bean definitions from file [/opt/shibboleth-idp/conf/cas-protocol.xml] 2017-07-19 22:16:56,766 - INFO [net.shibboleth.ext.spring.context.FilesystemGenericApplicationContext:577] - Refreshing ApplicationContext:shibboleth.ReloadableCASServiceRegistry: startup date [Wed Jul 19 22:16:56 UTC 2017]; parent: Root WebApplicationContext 2017-07-19 22:16:56,778 - INFO [net.shibboleth.ext.spring.service.ReloadableSpringService:378] - Service 'shibboleth.ReloadableCASServiceRegistry': Completed reload and swapped in latest configuration for service 'shibboleth.ReloadableCASServiceRegistry' 2017-07-19 22:16:56,778 - INFO [net.shibboleth.ext.spring.context.FilesystemGenericApplicationContext:957] - Closing ApplicationContext:shibboleth.ReloadableCASServiceRegistry: startup date [Wed Jul 19 22:01:56 UTC 2017]; parent: Root WebApplicationContext 2017-07-19 22:16:56,783 - INFO [net.shibboleth.ext.spring.service.ReloadableSpringService:385] - Service 'shibboleth.ReloadableCASServiceRegistry': Reload complete 2017-07-19 22:16:56,802 - INFO [net.shibboleth.ext.spring.config.DurationToLongConverter:48] - Deprecated duration of 300000 was specified. Use XML duration of P0Y0M0DT0H5M0.000S 2017-07-19 22:16:56,848 - INFO [net.shibboleth.ext.spring.service.ReloadableSpringService:378] - Service 'shibboleth.RelyingPartyResolverService': Completed reload and swapped in latest configuration for service 'shibboleth.RelyingPartyResolverService' 2017-07-19 22:16:56,848 - INFO [net.shibboleth.ext.spring.context.FilesystemGenericApplicationContext:957] - Closing ApplicationContext:shibboleth.RelyingPartyResolverService: startup date [Wed Jul 19 22:01:56 UTC 2017]; parent: Root WebApplicationContext 2017-07-19 22:16:56,854 - INFO [net.shibboleth.ext.spring.service.ReloadableSpringService:385] - Service 'shibboleth.RelyingPartyResolverService': Reload complete 2017-07-19 22:19:02,567 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.impl.CheckMessageVersionHandler' on INBOUND message context 2017-07-19 22:19:02,568 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,569 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.saml1.binding.impl.SAML1ArtifactRequestIssuerHandler' on INBOUND message context 2017-07-19 22:19:02,569 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,571 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.impl.SAMLProtocolAndRoleHandler' on INBOUND message context 2017-07-19 22:19:02,573 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,578 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.impl.SAMLMetadataLookupHandler' on INBOUND message context 2017-07-19 22:19:02,580 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,582 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.impl.SAMLAddAttributeConsumingServiceHandler' on INBOUND message context 2017-07-19 22:19:02,584 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,584 - DEBUG [net.shibboleth.idp.saml.profile.impl.InitializeRelyingPartyContextFromSAMLPeer:132] - Profile Action InitializeRelyingPartyContextFromSAMLPeer: Attaching RelyingPartyContext based on SAML peer https://blah.webex.com 2017-07-19 22:19:02,585 - DEBUG [net.shibboleth.idp.relyingparty.impl.DefaultRelyingPartyConfigurationResolver:293] - Resolving relying party configuration 2017-07-19 22:19:02,586 - DEBUG [net.shibboleth.idp.relyingparty.impl.DefaultRelyingPartyConfigurationResolver:305] - Checking if relying party configuration EntityNames[https://blah.webex.com,] is applicable 2017-07-19 22:19:02,587 - DEBUG [net.shibboleth.idp.relyingparty.impl.DefaultRelyingPartyConfigurationResolver:307] - Relying party configuration EntityNames[https://blah.webex.com,] is applicable 2017-07-19 22:19:02,587 - DEBUG [net.shibboleth.idp.profile.impl.SelectRelyingPartyConfiguration:136] - Profile Action SelectRelyingPartyConfiguration: Found relying party configuration EntityNames[https://blah.webex.com,] for request 2017-07-19 22:19:02,592 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.PopulateProfileInterceptorContext:126] - Profile Action PopulateProfileInterceptorContext: Installing flow intercept/security-policy/saml2-sso into interceptor context 2017-07-19 22:19:02,594 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.FilterFlowsByNonBrowserSupport:52] - Profile Action FilterFlowsByNonBrowserSupport: Request does not have non-browser requirement, nothing to do 2017-07-19 22:19:02,595 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.SelectProfileInterceptorFlow:101] - Profile Action SelectProfileInterceptorFlow: Checking flow intercept/security-policy/saml2-sso for applicability... 2017-07-19 22:19:02,595 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.SelectProfileInterceptorFlow:84] - Profile Action SelectProfileInterceptorFlow: Selecting flow intercept/security-policy/saml2-sso 2017-07-19 22:19:02,598 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.security.impl.ReceivedEndpointSecurityHandler' on INBOUND message context 2017-07-19 22:19:02,599 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,601 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.security.impl.MessageReplaySecurityHandler' on INBOUND message context 2017-07-19 22:19:02,602 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,606 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.security.impl.MessageLifetimeSecurityHandler' on INBOUND message context 2017-07-19 22:19:02,606 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,609 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.saml2.binding.security.impl.SAML2AuthnRequestsSignedSecurityHandler' on INBOUND message context 2017-07-19 22:19:02,609 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,610 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.common.binding.security.impl.SAMLProtocolMessageXMLSignatureSecurityHandler' on INBOUND message context 2017-07-19 22:19:02,613 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,615 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.saml2.binding.security.impl.SAML2HTTPRedirectDeflateSignatureSecurityHandler' on INBOUND message context 2017-07-19 22:19:02,615 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,616 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.saml.saml2.binding.security.impl.SAML2HTTPPostSimpleSignSecurityHandler' on INBOUND message context 2017-07-19 22:19:02,619 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,620 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:154] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.messaging.handler.impl.CheckMandatoryIssuer' on INBOUND message context 2017-07-19 22:19:02,620 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.AuthnRequestImpl' 2017-07-19 22:19:02,621 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.WriteProfileInterceptorResultToStorage:68] - Profile Action WriteProfileInterceptorResultToStorage: No results available from interceptor context, nothing to store 2017-07-19 22:19:02,622 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.FilterFlowsByNonBrowserSupport:52] - Profile Action FilterFlowsByNonBrowserSupport: Request does not have non-browser requirement, nothing to do 2017-07-19 22:19:02,622 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.SelectProfileInterceptorFlow:65] - Profile Action SelectProfileInterceptorFlow: Moving completed flow intercept/security-policy/saml2-sso to completed set, selecting next one 2017-07-19 22:19:02,623 - DEBUG [net.shibboleth.idp.profile.interceptor.impl.SelectProfileInterceptorFlow:80] - Profile Action SelectProfileInterceptorFlow: No flows available to choose from 2017-07-19 22:19:02,623 - DEBUG [net.shibboleth.idp.saml.profile.impl.InitializeOutboundMessageContext:149] - Profile Action InitializeOutboundMessageContext: Initialized outbound message context 2017-07-19 22:19:02,625 - DEBUG [net.shibboleth.idp.saml.profile.impl.PopulateBindingAndEndpointContexts:369] - Profile Action PopulateBindingAndEndpointContexts: Attempting to resolve endpoint of type {urn:oasis:names:tc:SAML:2.0:metadata}AssertionConsumerService for outbound message 2017-07-19 22:19:02,627 - DEBUG [net.shibboleth.idp.saml.profile.impl.PopulateBindingAndEndpointContexts:507] - Profile Action PopulateBindingAndEndpointContexts: Populating template endpoint for resolution from SAML AuthnRequest 2017-07-19 22:19:02,627 - DEBUG [net.shibboleth.idp.saml.profile.impl.PopulateBindingAndEndpointContexts:411] - Profile Action PopulateBindingAndEndpointContexts: Resolved endpoint at location https://blah.webex.com/dispatcher/SAML2AuthService?siteurl=blah using binding urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST 2017-07-19 22:19:02,628 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.PopulateDelegationContext:392] - No AttributeConsumingService was resolved, won't be able to determine delegation requested status via metadata 2017-07-19 22:19:02,629 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.PopulateDelegationContext:525] - No AttributeConsumingService was available 2017-07-19 22:19:02,629 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.PopulateDelegationContext:510] - Delegation request was not explicitly indicated, using default value: NOT_REQUESTED 2017-07-19 22:19:02,630 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.PopulateDelegationContext:294] - Issuance of a delegated Assertion is not in effect, skipping further processing 2017-07-19 22:19:02,633 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.PopulateEncryptionParameters:298] - Profile Action PopulateEncryptionParameters: No encryption requested, nothing to do 2017-07-19 22:19:02,637 - DEBUG [net.shibboleth.idp.saml.profile.impl.ExtractSubjectFromRequest:144] - Profile Action ExtractSubjectFromRequest: No Subject NameID/NameIdentifier in message needs inbound processing 2017-07-19 22:19:02,644 - DEBUG [net.shibboleth.idp.saml.profile.impl.InitializeAuthenticationContext:115] - Profile Action InitializeAuthenticationContext: Created authentication context: AuthenticationContext{initiationInstant=2017-07-19T22:19:02.644Z, isPassive=false, forceAuthn=false, hintedName=null, potentialFlows=[], activeResults=[], attemptedFlow=null, signaledFlowId=null, authenticationStateMap={}, resultCacheable=true, initialAuthenticationResult=null, authenticationResult=null, completionInstant=1970-01-01T00:00:00.000Z} 2017-07-19 22:19:02,645 - DEBUG [net.shibboleth.idp.authn.impl.InitializeRequestedPrincipalContext:111] - Profile Action InitializeRequestedPrincipalContext: Profile configuration does not include any default authentication methods 2017-07-19 22:19:02,646 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.ProcessRequestedAuthnContext:146] - Profile Action ProcessRequestedAuthnContext: AuthnRequest did not contain a RequestedAuthnContext, nothing to do 2017-07-19 22:19:02,649 - DEBUG [net.shibboleth.idp.authn.impl.PopulateAuthenticationContext:126] - Profile Action PopulateAuthenticationContext: Installing custom PrincipalEvalPredicateFactoryRegistry into AuthenticationContext 2017-07-19 22:19:02,650 - DEBUG [net.shibboleth.idp.authn.impl.PopulateAuthenticationContext:167] - Profile Action PopulateAuthenticationContext: Installed 1 authentication flows into AuthenticationContext 2017-07-19 22:19:02,651 - DEBUG [net.shibboleth.idp.session.impl.PopulateSessionContext:131] - Profile Action PopulateSessionContext: No session found for client 2017-07-19 22:19:02,652 - DEBUG [net.shibboleth.idp.authn.impl.FilterFlowsByForcedAuthn:53] - Profile Action FilterFlowsByForcedAuthn: Request does not have forced authentication requirement, nothing to do 2017-07-19 22:19:02,653 - DEBUG [net.shibboleth.idp.authn.impl.FilterFlowsByPassivity:53] - Profile Action FilterFlowsByPassivity: Request does not have passive requirement, nothing to do 2017-07-19 22:19:02,654 - DEBUG [net.shibboleth.idp.authn.impl.FilterFlowsByNonBrowserSupport:53] - Profile Action FilterFlowsByNonBrowserSupport: Request does not have non-browser requirement, nothing to do 2017-07-19 22:19:02,656 - DEBUG [net.shibboleth.idp.authn.impl.SelectAuthenticationFlow:257] - Profile Action SelectAuthenticationFlow: No specific Principals requested 2017-07-19 22:19:02,656 - DEBUG [net.shibboleth.idp.authn.impl.SelectAuthenticationFlow:292] - Profile Action SelectAuthenticationFlow: No usable active results available, selecting an inactive flow 2017-07-19 22:19:02,657 - DEBUG [net.shibboleth.idp.authn.impl.SelectAuthenticationFlow:334] - Profile Action SelectAuthenticationFlow: Selecting inactive authentication flow authn/RemoteUser 2017-07-19 22:19:03,271 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.authorize.url] loaded from oxTrust.properties 2017-07-19 22:19:03,271 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.client.id] loaded from oxTrust.properties 2017-07-19 22:19:03,271 - INFO [org.gluu.oxauth.client.authentication.AuthenticationFilter:51] - Property [oxauth.client.scope] loaded from oxTrust.properties 2017-07-19 22:19:27,854 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.authorize.url] loaded from oxTrust.properties 2017-07-19 22:19:27,855 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.token.url] loaded from oxTrust.properties 2017-07-19 22:19:27,855 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.token.validation.url] loaded from oxTrust.properties 2017-07-19 22:19:27,855 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.userinfo.url] loaded from oxTrust.properties 2017-07-19 22:19:27,856 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.client.id] loaded from oxTrust.properties 2017-07-19 22:19:27,856 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:51] - Property [oxauth.client.password] loaded from oxTrust.properties 2017-07-19 22:19:28,108 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:151] - validate check session status:200 2017-07-19 22:19:28,108 - INFO [org.gluu.oxauth.client.validation.OAuthValidationFilter:157] - Session validation successful. User is logged in 2017-07-19 22:19:28,218 - DEBUG [net.shibboleth.idp.authn.impl.RemoteUserAuthServlet:231] - User identity extracted from REMOTE_USER: UserNameRemoved 2017-07-19 22:19:28,556 - INFO [net.shibboleth.idp.authn.impl.ValidateExternalAuthentication:115] - Profile Action ValidateExternalAuthentication: External authentication succeeded for user: UserNameRemoved 2017-07-19 22:19:28,557 - DEBUG [net.shibboleth.idp.authn.AbstractValidationAction:311] - Profile Action ValidateExternalAuthentication: Adding custom Principal(s) defined on underlying flow descriptor 2017-07-19 22:19:28,647 - DEBUG [net.shibboleth.idp.authn.impl.PopulateSubjectCanonicalizationContext:79] - Profile Action PopulateSubjectCanonicalizationContext: Installing 2 canonicalization flows into SubjectCanonicalizationContext 2017-07-19 22:19:28,650 - DEBUG [net.shibboleth.idp.authn.impl.SelectSubjectCanonicalizationFlow:100] - Profile Action SelectSubjectCanonicalizationFlow: Checking canonicalization flow c14n/x500 for applicability... 2017-07-19 22:19:28,651 - DEBUG [net.shibboleth.idp.authn.impl.SelectSubjectCanonicalizationFlow:106] - Profile Action SelectSubjectCanonicalizationFlow: Canonicalization flow c14n/x500 was not applicable to this request 2017-07-19 22:19:28,651 - DEBUG [net.shibboleth.idp.authn.impl.SelectSubjectCanonicalizationFlow:100] - Profile Action SelectSubjectCanonicalizationFlow: Checking canonicalization flow c14n/simple for applicability... 2017-07-19 22:19:28,652 - DEBUG [net.shibboleth.idp.authn.impl.SelectSubjectCanonicalizationFlow:83] - Profile Action SelectSubjectCanonicalizationFlow: Selecting canonicalization flow c14n/simple 2017-07-19 22:19:28,692 - DEBUG [net.shibboleth.idp.authn.AbstractSubjectCanonicalizationAction:226] - Profile Action SimpleSubjectCanonicalization: trimming whitespace of input string 'UserNameRemoved' 2017-07-19 22:19:28,697 - DEBUG [net.shibboleth.idp.session.impl.DetectIdentitySwitch:148] - Profile Action DetectIdentitySwitch: No previous session found, nothing to do 2017-07-19 22:19:28,701 - DEBUG [net.shibboleth.idp.authn.impl.FinalizeAuthentication:137] - Profile Action FinalizeAuthentication: Canonical principal name was established as 'UserNameRemoved' 2017-07-19 22:19:28,702 - DEBUG [net.shibboleth.idp.authn.impl.FinalizeAuthentication:186] - Profile Action FinalizeAuthentication: Request did not have explicit authentication requirements, result is accepted 2017-07-19 22:19:28,706 - DEBUG [net.shibboleth.idp.session.impl.UpdateSessionWithAuthenticationResult:221] - Profile Action UpdateSessionWithAuthenticationResult: Creating new session for principal UserNameRemoved 2017-07-19 22:19:28,718 - DEBUG [net.shibboleth.idp.session.impl.StorageBackedSessionManager:533] - Created new session df882787e032a9ebfb34ddb04343e868c4fc61119a9d623de6b8a971e2a70ce4 for principal UserNameRemoved 2017-07-19 22:19:28,719 - DEBUG [net.shibboleth.idp.session.impl.StorageBackedIdPSession:561] - Saving AuthenticationResult for flow authn/RemoteUser in session df882787e032a9ebfb34ddb04343e868c4fc61119a9d623de6b8a971e2a70ce4 2017-07-19 22:19:28,743 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:183] - Attribute Resolver 'ShibbolethAttributeResolver': Initiating attribute resolution 2017-07-19 22:19:28,755 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:191] - Attribute Resolver 'ShibbolethAttributeResolver': Attempting to resolve the following attribute definitions [uid, webexnameid, mail, lastnamewebex, firstnamewebex, uidwebex, emailwebex] 2017-07-19 22:19:28,756 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'uid' 2017-07-19 22:19:28,756 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:329] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving data connector siteLDAP 2017-07-19 22:19:28,772 - DEBUG [net.shibboleth.idp.attribute.resolver.dc.ldap.impl.TemplatedExecutableSearchFilterBuilder:212] - Template text (uid=$requestContext.principalName) yields (uid=UserNameRemoved) 2017-07-19 22:19:28,898 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:139] - Data Connector 'siteLDAP': produced the following 13 attributes during resolution [mail, objectClass, cn, inum, gluuSLAManager, uid, oxLastLogonTime, gluuStatus, oxCreationTimestamp, sn, memberOf, entryDN, updatedAt] 2017-07-19 22:19:28,898 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'mail': Values '[StringAttributeValue{value=daemien.boyes@blah.com.au}]' 2017-07-19 22:19:28,899 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'objectClass': Values '[StringAttributeValue{value=top}, StringAttributeValue{value=gluuPerson}]' 2017-07-19 22:19:28,899 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'cn': Values '[StringAttributeValue{value=Daemien Boyes}]' 2017-07-19 22:19:28,900 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'inum': Values '[StringAttributeValue{value=@!A792.8560.4498.9707!0001!729A.C307!0000!34D2.317D}]' 2017-07-19 22:19:28,908 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'gluuSLAManager': Values '[StringAttributeValue{value=true}]' 2017-07-19 22:19:28,909 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'uid': Values '[StringAttributeValue{value=UserNameRemoved}]' 2017-07-19 22:19:28,910 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'oxLastLogonTime': Values '[StringAttributeValue{value=20170719221925.188Z}]' 2017-07-19 22:19:28,914 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'gluuStatus': Values '[StringAttributeValue{value=active}]' 2017-07-19 22:19:28,914 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'oxCreationTimestamp': Values '[StringAttributeValue{value=20170719195334.606Z}]' 2017-07-19 22:19:28,915 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'sn': Values '[StringAttributeValue{value=Boyes}]' 2017-07-19 22:19:28,915 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'memberOf': Values '[StringAttributeValue{value=inum=@!A792.8560.4498.9707!0001!729A.C307!0003!60B7,ou=groups,o=@!A792.8560.4498.9707!0001!729A.C307,o=gluu}]' 2017-07-19 22:19:28,916 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'entryDN': Values '[StringAttributeValue{value=inum=@!A792.8560.4498.9707!0001!729A.C307!0000!34D2.317D,ou=people,o=@!A792.8560.4498.9707!0001!729A.C307,o=gluu}]' 2017-07-19 22:19:28,916 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractDataConnector:143] - Data Connector 'siteLDAP': Attribute 'updatedAt': Values '[StringAttributeValue{value=20170719195514.187Z}]' 2017-07-19 22:19:28,917 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:347] - Attribute Resolver 'ShibbolethAttributeResolver': Data connector 'siteLDAP' resolved the following attributes: [mail, objectClass, cn, inum, gluuSLAManager, uid, oxLastLogonTime, gluuStatus, oxCreationTimestamp, sn, memberOf, entryDN, updatedAt] 2017-07-19 22:19:28,918 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'uid' 2017-07-19 22:19:28,919 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:247] - Attribute Definition 'uid': produced an attribute with the following values [StringAttributeValue{value=UserNameRemoved}] 2017-07-19 22:19:28,920 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'uid' produced an attribute with 1 values 2017-07-19 22:19:28,921 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'webexnameid' 2017-07-19 22:19:28,922 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'webexnameid' 2017-07-19 22:19:28,922 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:247] - Attribute Definition 'webexnameid': produced an attribute with the following values [StringAttributeValue{value=daemien.boyes@blah.com.au}] 2017-07-19 22:19:28,923 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'webexnameid' produced an attribute with 1 values 2017-07-19 22:19:28,923 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'mail' 2017-07-19 22:19:28,924 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'mail' 2017-07-19 22:19:28,924 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:247] - Attribute Definition 'mail': produced an attribute with the following values [StringAttributeValue{value=daemien.boyes@blah.com.au}] 2017-07-19 22:19:28,925 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'mail' produced an attribute with 1 values 2017-07-19 22:19:28,925 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'lastnamewebex' 2017-07-19 22:19:28,925 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'lastnamewebex' 2017-07-19 22:19:28,926 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:245] - Attribute Definition 'lastnamewebex': produced an attribute with no values 2017-07-19 22:19:28,927 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'lastnamewebex' produced an attribute with 0 values 2017-07-19 22:19:28,931 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'firstnamewebex' 2017-07-19 22:19:28,932 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'firstnamewebex' 2017-07-19 22:19:28,935 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:245] - Attribute Definition 'firstnamewebex': produced an attribute with no values 2017-07-19 22:19:28,935 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'firstnamewebex' produced an attribute with 0 values 2017-07-19 22:19:28,936 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'uidwebex' 2017-07-19 22:19:28,936 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'uidwebex' 2017-07-19 22:19:28,936 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:245] - Attribute Definition 'uidwebex': produced an attribute with no values 2017-07-19 22:19:28,937 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'uidwebex' produced an attribute with 0 values 2017-07-19 22:19:28,937 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:372] - Attribute Resolver 'ShibbolethAttributeResolver': Resolving dependencies for 'emailwebex' 2017-07-19 22:19:28,938 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:388] - Attribute Resolver 'ShibbolethAttributeResolver': Finished resolving dependencies for 'emailwebex' 2017-07-19 22:19:28,938 - DEBUG [net.shibboleth.idp.attribute.resolver.AbstractAttributeDefinition:245] - Attribute Definition 'emailwebex': produced an attribute with no values 2017-07-19 22:19:28,939 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:272] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute definition 'emailwebex' produced an attribute with 0 values 2017-07-19 22:19:28,940 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:201] - Attribute Resolver 'ShibbolethAttributeResolver': Finalizing resolved attributes 2017-07-19 22:19:28,940 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:434] - Attribute Resolver 'ShibbolethAttributeResolver': De-duping attribute definition uid result 2017-07-19 22:19:28,941 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:446] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute 'uid' has 1 values after post-processing 2017-07-19 22:19:28,941 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:434] - Attribute Resolver 'ShibbolethAttributeResolver': De-duping attribute definition webexnameid result 2017-07-19 22:19:28,942 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:446] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute 'webexnameid' has 1 values after post-processing 2017-07-19 22:19:28,942 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:434] - Attribute Resolver 'ShibbolethAttributeResolver': De-duping attribute definition mail result 2017-07-19 22:19:28,943 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:446] - Attribute Resolver 'ShibbolethAttributeResolver': Attribute 'mail' has 1 values after post-processing 2017-07-19 22:19:28,943 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:428] - Attribute Resolver 'ShibbolethAttributeResolver': Removing result of attribute definition 'lastnamewebex', contains no values 2017-07-19 22:19:28,944 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:428] - Attribute Resolver 'ShibbolethAttributeResolver': Removing result of attribute definition 'firstnamewebex', contains no values 2017-07-19 22:19:28,944 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:428] - Attribute Resolver 'ShibbolethAttributeResolver': Removing result of attribute definition 'uidwebex', contains no values 2017-07-19 22:19:28,944 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:428] - Attribute Resolver 'ShibbolethAttributeResolver': Removing result of attribute definition 'emailwebex', contains no values 2017-07-19 22:19:28,945 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:206] - Attribute Resolver 'ShibbolethAttributeResolver': Final resolved attribute collection: [webexnameid, uid, mail] 2017-07-19 22:19:28,952 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:108] - Attribute filtering engine 'ShibbolethAttributeFilter' Beginning process of filtering the following 3 attributes: [mail, webexnameid, uid] 2017-07-19 22:19:28,952 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:125] - Attribute Filter Policy 'SiteApp1' Checking if attribute filter policy is active 2017-07-19 22:19:28,953 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_883c6e83acc7cc647de05601e3d5890a': Found attribute requester: https://blah.webex.com 2017-07-19 22:19:28,953 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:132] - Attribute Filter Policy 'SiteApp1' Policy is active for this request 2017-07-19 22:19:28,954 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:159] - Attribute Filter Policy 'SiteApp1' Applying attribute filter policy to current set of attributes: [mail, webexnameid, uid] 2017-07-19 22:19:28,955 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeRule:168] - Attribute filtering engine '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/AttributeRule:_80d83c86584c15966b66029d4bb6ec06' Filtering values for attribute 'uid' which currently contains 1 values 2017-07-19 22:19:28,955 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeRule:177] - Attribute filtering engine '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/AttributeRule:_80d83c86584c15966b66029d4bb6ec06' Filter has permitted the release of 1 values for attribute 'uid' 2017-07-19 22:19:28,956 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeRule:168] - Attribute filtering engine '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/AttributeRule:_d861c9aab068cee4e5aef0250b7be2ef' Filtering values for attribute 'webexnameid' which currently contains 1 values 2017-07-19 22:19:28,956 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeRule:177] - Attribute filtering engine '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/AttributeRule:_d861c9aab068cee4e5aef0250b7be2ef' Filter has permitted the release of 1 values for attribute 'webexnameid' 2017-07-19 22:19:28,957 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeRule:168] - Attribute filtering engine '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/AttributeRule:_bdcbf11f99e13523c019c012cfa6095a' Filtering values for attribute 'mail' which currently contains 1 values 2017-07-19 22:19:28,957 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeRule:177] - Attribute filtering engine '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/AttributeRule:_bdcbf11f99e13523c019c012cfa6095a' Filter has permitted the release of 1 values for attribute 'mail' 2017-07-19 22:19:28,958 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:125] - Attribute Filter Policy 'SiteApp2' Checking if attribute filter policy is active 2017-07-19 22:19:28,958 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_6e4f42c18db25c53778095650cba5ff7': Found attribute requester: https://blah.webex.com 2017-07-19 22:19:28,958 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:134] - Attribute Filter Policy 'SiteApp2' Policy is not active for this request 2017-07-19 22:19:28,959 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:167] - Attribute filtering engine 'ShibbolethAttributeFilter': 1 values for attribute 'mail' remained after filtering 2017-07-19 22:19:28,959 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:167] - Attribute filtering engine 'ShibbolethAttributeFilter': 1 values for attribute 'webexnameid' remained after filtering 2017-07-19 22:19:28,960 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:167] - Attribute filtering engine 'ShibbolethAttributeFilter': 1 values for attribute 'uid' remained after filtering 2017-07-19 22:19:29,016 - DEBUG [net.shibboleth.idp.saml.profile.impl.BaseAddAuthenticationStatementToAssertion:170] - Profile Action AddAuthnStatementToAssertion: Attempting to add an AuthenticationStatement to outgoing Assertion 2017-07-19 22:19:29,025 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAuthnStatementToAssertion:165] - Profile Action AddAuthnStatementToAssertion: Added AuthenticationStatement to Assertion _5c887090f2856240f2d12841ecad36a8 2017-07-19 22:19:29,043 - DEBUG [net.shibboleth.idp.saml.profile.impl.BaseAddAttributeStatementToAssertion:229] - Profile Action AddAttributeStatementToAssertion: Attempting to add an AttributeStatement to outgoing Assertion 2017-07-19 22:19:29,043 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:174] - Profile Action AddAttributeStatementToAssertion: Attempting to encode attribute webexnameid as a SAML 2 Attribute 2017-07-19 22:19:29,044 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:204] - Profile Action AddAttributeStatementToAssertion: Attribute webexnameid did not have a usable SAML 2 Attribute encoder associated with it, nothing to do 2017-07-19 22:19:29,044 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:174] - Profile Action AddAttributeStatementToAssertion: Attempting to encode attribute uid as a SAML 2 Attribute 2017-07-19 22:19:29,045 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:188] - Profile Action AddAttributeStatementToAssertion: Encoding attribute uid as a SAML 2 Attribute 2017-07-19 22:19:29,045 - DEBUG [net.shibboleth.idp.saml.attribute.encoding.AbstractSAMLAttributeEncoder:154] - Beginning to encode attribute uid 2017-07-19 22:19:29,047 - DEBUG [net.shibboleth.idp.saml.attribute.encoding.SAMLEncoderSupport:73] - Encoding value UserNameRemoved of attribute uid 2017-07-19 22:19:29,049 - DEBUG [net.shibboleth.idp.saml.attribute.encoding.AbstractSAMLAttributeEncoder:191] - Completed encoding 1 values for attribute uid 2017-07-19 22:19:29,051 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:174] - Profile Action AddAttributeStatementToAssertion: Attempting to encode attribute mail as a SAML 2 Attribute 2017-07-19 22:19:29,051 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:188] - Profile Action AddAttributeStatementToAssertion: Encoding attribute mail as a SAML 2 Attribute 2017-07-19 22:19:29,052 - DEBUG [net.shibboleth.idp.saml.attribute.encoding.AbstractSAMLAttributeEncoder:154] - Beginning to encode attribute mail 2017-07-19 22:19:29,052 - DEBUG [net.shibboleth.idp.saml.attribute.encoding.SAMLEncoderSupport:73] - Encoding value daemien.boyes@blah.com.au of attribute mail 2017-07-19 22:19:29,053 - DEBUG [net.shibboleth.idp.saml.attribute.encoding.AbstractSAMLAttributeEncoder:191] - Completed encoding 1 values for attribute mail 2017-07-19 22:19:29,054 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:118] - Profile Action AddAttributeStatementToAssertion: Adding constructed AttributeStatement to Assertion _5c887090f2856240f2d12841ecad36a8 2017-07-19 22:19:29,079 - DEBUG [net.shibboleth.idp.saml.profile.logic.DefaultNameIdentifierFormatStrategy:100] - Configuration specifies the following formats: [] 2017-07-19 22:19:29,079 - DEBUG [net.shibboleth.idp.saml.profile.logic.DefaultNameIdentifierFormatStrategy:113] - Configuration did not specify any formats, relying on metadata alone 2017-07-19 22:19:29,080 - DEBUG [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:197] - Checking for source attribute webexnameid 2017-07-19 22:19:29,081 - DEBUG [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:216] - Generating NameID from String-valued attribute webexnameid 2017-07-19 22:19:29,138 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.DecorateDelegatedAssertion:585] - Found Assertion with AuthnStatement to decorate in outbound Response 2017-07-19 22:19:29,139 - DEBUG [net.shibboleth.idp.saml.saml2.profile.delegation.impl.DecorateDelegatedAssertion:288] - Issuance of delegated was not indicated, skipping assertion decoration 2017-07-19 22:19:29,390 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:159] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.messaging.handler.impl.BasicMessageHandlerChain' on OUTBOUND message context 2017-07-19 22:19:29,391 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:175] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.ResponseImpl' 2017-07-19 22:19:29,415 - DEBUG [net.shibboleth.idp.saml.profile.impl.SpringAwareMessageEncoderFactory:100] - Looking up message encoder based on binding URI: urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST 2017-07-19 22:19:29,456 - DEBUG [net.shibboleth.idp.profile.impl.RecordResponseComplete:89] - Profile Action RecordResponseComplete: Record response complete 2017-07-19 22:19:29,464 - INFO [Shibboleth-Audit.SSO:241] - 20170719T221929Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|s2ecc78c3f01e5edcb73a00fabf9871136e06fa866|https://blah.webex.com|http://shibboleth.net/ns/profiles/saml2/sso/browser|https://sso.blah.net/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_ceec9343c4bf025d329afbc6364d448d|UserNameRemoved|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|webexnameid,uid,mail|user.name@blah.com|_5c887090f2856240f2d12841ecad36a8|

By Daemien Boyes user 21 Jul 2017 at 4:03 a.m. CDT

Daemien Boyes gravatar
Hi Mohib, any luck with the debug? Daemien

By Mohib Zico Account Admin 21 Jul 2017 at 4:04 a.m. CDT

Mohib Zico gravatar
Hi Daemien, I am sorry but do you think you can share the SAML assertion only? You can use the 'SAML tool' of chrome. Just grab those syntax from SAML box ( screenshot attached ) and share txt file.

By Daemien Boyes user 21 Jul 2017 at 4:25 a.m. CDT

Daemien Boyes gravatar
here you go ?xml version="1.0" encoding="UTF-8"?> <saml2p:Response Destination="https://blah.webex.com/dispatcher/SAML2AuthService? siteurl=blah" ID="_df233d40c7be5efee7b03cf8219c58f0" InResponseTo="s2f4b0e3913342f5c40f93c4a254f6fb12618e0d73" IssueInstant="2017-07-21T09:18:43.513Z" Version="2.0" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"> <saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://sso.blah.net/idp/shibboleth </saml2:Issuer> <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> <ds:SignedInfo> <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/> <ds:Reference URI="#_df233d40c7be5efee7b03cf8219c58f0"> <ds:Transforms> <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/> <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> </ds:Transforms> <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/> <ds:DigestValue> pACkF0VMB0XvBa6yloOxuS2IRRY7y5R9maHyTeYSoqI= </ds:DigestValue> </ds:Reference> </ds:SignedInfo> <ds:SignatureValue> REMOVED </ds:SignatureValue> <ds:KeyInfo> <ds:X509Data> <ds:X509Certificate> REMOVED </ds:X509Certificate> </ds:X509Data> </ds:KeyInfo> </ds:Signature> <saml2p:Status> <saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/> </saml2p:Status> <saml2:Assertion ID="_6b6d568c9ca2f6d51bb7d7c47fb5fc2b" IssueInstant="2017-07-21T09:18:43.513Z" Version="2.0" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"> <saml2:Issuer>https://sso.blah.net/idp/shibboleth</saml2:Issuer> <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"> <ds:SignedInfo> <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/> <ds:Reference URI="#_6b6d568c9ca2f6d51bb7d7c47fb5fc2b"> <ds:Transforms> <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/> <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> </ds:Transforms> <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/> <ds:DigestValue>+m/uVhpSViBbtkmI4e5tqZuq+Y3+sT7LzsK5cu/ oFZA= </ds:DigestValue> </ds:Reference> </ds:SignedInfo> <ds:SignatureValue> REMOVED </ds:SignatureValue> <ds:KeyInfo> <ds:X509Data> <ds:X509Certificate> REMOVED </ds:X509Certificate> </ds:X509Data> </ds:KeyInfo> </ds:Signature> <saml2:Subject> <saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" NameQualifier="https://sso.blah.net/idp/shibboleth" SPNameQualifier="https://blah.webex.com">user.name@blah.com.au </saml2:NameID> <saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"> <saml2:SubjectConfirmationData Address="127.0.0.1" InResponseTo="s2f4b0e3913342f5c40f93c4a254f6fb12618e0d73" NotOnOrAfter="2017-07-21T09:23:43.544Z" Recipient="https://blah.webex.com/dispatcher/SAML2AuthService? siteurl=blah"/> </saml2:SubjectConfirmation> </saml2:Subject> <saml2:Conditions NotBefore="2017-07-21T09:18:43.513Z" NotOnOrAfter="2017-07-21T09:23:43.513Z"> <saml2:AudienceRestriction> <saml2:Audience>https://blah.webex.com</saml2:Audience> </saml2:AudienceRestriction> </saml2:Conditions> <saml2:AuthnStatement AuthnInstant="2017-07-21T09:18:43.426Z" SessionIndex="_873331452654510f20b664ec7dc3c2ef"> <saml2:SubjectLocality Address="127.0.0.1"/> <saml2:AuthnContext> <saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef> </saml2:AuthnContext> </saml2:AuthnStatement> <saml2:AttributeStatement> <saml2:Attribute FriendlyName="uid" Name="urn:oid:0.9.2342.19200300.100.1.1" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml2:AttributeValue>username</saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute FriendlyName="mail" Name="urn:oid:0.9.2342.19200300.100.1.3" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml2:AttributeValue>user.name@blah.com.au</saml2:AttributeValue> </saml2:Attribute> </saml2:AttributeStatement> </saml2:Assertion> </saml2p:Response>

By Mohib Zico Account Admin 21 Jul 2017 at 5:10 a.m. CDT

Mohib Zico gravatar
Ok. so.. clearly your IDP is not releasing all attributes to webex. I am attaching two screenshots from working condition. 1. webex_attributes.png: This is the working SAML assertion from my Gluu Server to WebEx; see the list of attributes we are releasing. 2. webex_user_attributes.png: User information which we are using to test this SSO.

By Daemien Boyes user 21 Jul 2017 at 5:33 a.m. CDT

Daemien Boyes gravatar
OK,so do i have to release the attributes for every user? i've now done that for my user - and i'm still getting the Reason: SSO protocol error (1) ml2:AttributeStatement> <saml2:Attribute FriendlyName="uid" Name="urn:oid:0.9.2342.19200300.100.1.1" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml2:AttributeValue>username</saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute FriendlyName="mail" Name="urn:oid:0.9.2342.19200300.100.1.3" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml2:AttributeValue>username.name@blah.com.au</saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute Name="lastname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"> <saml2:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xsd:string">Name </saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute Name="firstname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"> <saml2:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xsd:string">user </saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"> <saml2:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xsd:string">username </saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"> <saml2:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xsd:string">user.name@BLah.com.au </saml2:AttributeValue> </saml2:Attribute> </saml2:AttributeStatement> </saml2:Assertion> </saml2p:Response>

By Mohib Zico Account Admin 21 Jul 2017 at 5:50 a.m. CDT

Mohib Zico gravatar
Please talk to webex support on this. I think you have covered everything from Gluu server side. If you need more troubleshooting help please subscribe to any VIP subscription.

By Daemien Boyes user 21 Jul 2017 at 5:52 a.m. CDT

Daemien Boyes gravatar
OK thanks for your help Mohib.