carbon-identity | This repository is no longer used for development | Configuration Management library
kandi X-RAY | carbon-identity Summary
kandi X-RAY | carbon-identity Summary
| Branch | Build Status | | :------------ |:------------- | master | [Build Status] |. This repository is no longer used for development. Current developments are done in following repositories. This repository contains the source code of modules used for WSO2 Idenity Server 5.1.0 and previous releases. Some of these modules are used by other products of the the platform as well. Service Stubs, Components and Features of each module is contained in this repository.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Validates the grant .
- Processes the policy DTO and returns an array of strings representing the rules .
- Update the local and outbound authentication configuration .
- Returns the default policy editor configuration .
- Extract metadata from an apply element .
- get a group
- Build SAML authentication configuration .
- This method is used to authenticate a user .
- Invokes the dispatch method .
- Construct a SCIMObject from a map of attributes .
carbon-identity Key Features
carbon-identity Examples and Code Snippets
Community Discussions
Trending Discussions on carbon-identity
QUESTION
WSO2 5.3.0. I am attempting to put in a local authentication step into my flow BEFORE basic auth runs. This is to aid in upgrading our password hashing algorithm (see this other question I asked)
The problem (I think) I am running into is that the initiateAuthenticationRequest is not being called for my new local authenticator (so username is null at the time, the basic authenticator runs to pop the login screen and fill it in, but my code never reruns).
EDIT: My initiateAuthenticationRequest was being skipped because canHandle was evaluating to true. If the method returns false initiateAuthenticationRequest gets called (Code reference here )
My current conundrum is how to pass the http request parameters onto the next step (the BasicAuthenticator) such that my login screen doesn't show up twice. Any help with this issue is appreciated.
EDIT 2: The request parameters are being passed along, but something else is causing BasicAuthenticator.initiateAuthenticationRequest to be called (see same code reference above). It looks like it is because the attribute "commonAuthHandled" is set to true on the request, but I can't find where that's happening, so help finding THAT is what I'm currently looking for
...ANSWER
Answered 2019-Jun-14 at 12:56My solution here was to override the process method (after reading this code more carefully I realized that my step was toggling the commonAuthHandled bit back to true after processing its response)
A little hacky, but it seems to be working
QUESTION
I can't find source for package org.wso2.carbon.identity.sso.saml. In github repository wso2-attic/carbon-identity there are these classes, but there is note, that repository is no longer used for development and I find there 2 links:
...ANSWER
Answered 2017-Sep-02 at 15:59I'm assuming you are looking for SPInitLogoutRequestProcessor
. You can find it at [1]. For IS 5.3.0, the SAML component related development happens in the 5.3.x branch.
For your query on SLO; when you have the 2 applications configured for single logout and you logout from one application, the Identity Server is invalidating the user's authenticated session and sends back-channel SAML logout request to the other session participants (App 2 in this case). So the 2nd application should invalidate it's user session upon receiving the logout request from IS.
The error you are seeing should be due to IS not being able to find a valid authenticated session (as the session is already removed) for the logout request. [2] has a detailed explanation on how the single logout happens in IS.
One other approach you can take is to check whether there's an existing authenticated session in the IDP side before sending the logout request. You can use a passive SAML request to check the status of the session and if the session is already there then send the logout request.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install carbon-identity
You can use carbon-identity like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the carbon-identity component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page