Friday, October 30, 2015

Shibboleth-Finally

After about two weeks of trial and error I finally succeeded to have a SSO/SAML POC based on open source components (Shibbolet/ApacheDS/KentorIT) working.

The last step was struggling with convincing Shibbolet to respond to SAML requests.

The main problem (for newbies) is the lack of any overview type information; almost all documentation (https://wiki.shibboleth.net/confluence/display/IDP30/Home) focuses on detailed specification aspects so you get lost in tens of .properties/.xml configuration files.

Debugging

Of course my first concern was about being able to set breakpoints and go step by step through sources.

Go to jetty_base and edit start.ini by adding the following lines:

-Xdebug 
-Xrunjdwp:transport=dt_socket,address=5005,server=y,suspend=n

Restart jetty.

Download latest source, open main pom.xml and rebuild project.

First steps

Supposing you have the metadata file for a target SP (we do not need the SP implementation for now) deploy it in shibbolet_sp/metadata (you will also find there idp_metadata.xml, the metadata related with IsP).

Edit conf/metadata-providers.xml by adding information about you SP; something like this:

  • <MetadataProvider id="LocalMetadata" xsi:type="FilesystemMetadataProvider" metadataFile="%{idp.home}/metadata/mySPmetadata.xml"/>

Edit conf/ldap.proprierties (watch out for useStartTLS):

  • idp.authn.LDAP.ldapURL = <ldap url>
  • idp.authn.LDAP.useStartTLS = false
  • idp.authn.LDAP.returnAttributes = <comma separated LDAP attributes>
  • idp.authn.LDAP.baseDN = <base DN for search)
  • idp.authn.LDAP.userFilter = (<LDAP attribute>={user})

Remark: This is enaough for default anonSearchAuthenticator; if bindSearchAuthenticator is required be sure to:

  • uncomment and change accordingly idp.authn.LDAP.authenticator = bindSearchAuthenticator
  • change the two configartion entries:
    • idp.authn.LDAP.bindDN = <DN of bind user>
    • idp.authn.LDAP.bindDNCredential = <password>

At this moment we can test authentication by using the IdP initiated login URL : HTTPS://<shibblolet-url>:<https-port>/idp/profile/SAML2/Unsolicited/SSO?providerId=<SP_entityID>

<SP_entityID> is the the SP EntityId as specified in metadata file.

Logout can be achieved through https://<shibblolet-url>:<https-port>/idp/profile/Logout

In order to debug the authentication proceeds have a look in net.shibboleth.idp.authn.impl.ValidateUsernamePasswordAgainstLDAP (method doExecute), module Shibboleth IdP :: Authentication Implementation; also look at org.ldaptive.auth.Authenticator from ladptive-1.0.0.jar (select the jar with right click->Download source, etc).

Configure Response

Now, even if you will get a browser error after going through the login UI process (since we dot have the actual SP implementation) you can use browser developer tools to check the SAMLResponse (use SSOCircle POST decoder). We notice that the Subject part is encrypted.

Response configuration can be done through conf/relying-party.xml; inside <bean id="shibboleth.DefaultRelyingParty" parent="RelyingParty"> change the SAML2.SSO attributes according to your needs:

  • (sample): <bean parent="SAML2.SSO" p:postAuthenticationFlows="attribute-release" p:encryptAssertions="false" p:encryptAttributes="false" p:encryptNameIDs="false"/>

Now we can see in clear text (after decoding) the Subject info but surprise(s):

  • NameID has a strange value (some Base64 encoded value)
  • No other assertions, even if we configured LDAP to return more attributes

NameID

I was used with ADFS where you can easily return sAMAcountName as NameID. It turned out to be a very difficult task so at the end of the day I gave up since I (somehow) understood that the role of NameID is different of what I wanted to achieve.

Some insights: You can have a look at (as a starting debugging point) getSAML2NameIDGenerator method from net.shibboleth.idp.saml.nameid.impl.NameIdentifierGenerationServiceImpl, module Shibboleth IdP :: SAML Profile Implementation. The main issue here is that the returned value (saml2Generator) is an implementation of org.opensaml.saml.saml2.profile.SAML2NameIDGenerator. Since in the module there is a compile dependency only to open-saml-api-3.1.1.jar you will have to add manually in pom.xml the dependency to the actual implementation.

        <dependency>
            <groupId>${opensaml.groupId}</groupId>
            <artifactId>opensaml-saml-impl</artifactId>
            <version>${opensaml.version}</version>
        </dependency>
 

Be sure to remove the test time dependency (a compile error will prevent to successfully compile the module anyway).

The default configured strategy relies on TransientSAML2NameIDGenerator and CryptoTransientIdGenerationStrategy (generate method).

Configuration of the strategy is done in conf/saml-nameid.xml. Initially I tried switching from <ref bean="shibboleth.SAML2TransientGenerator" /> to

    <!-- urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress -->
    <bean parent="shibboleth.SAML2AttributeSourcedGenerator"
            p:format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient"
            p:attributeSourceIds="#{ {'cn'} }" />

Watch out of the p:format attribute value, changed from email to transient as the net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator (one of the subsequent calls to other classes methods) will check for attributes with this format.

Anyway, it didn't work because here we speak about SAML attributes (that will go into Assertions) not about LDAP attributes and since I didn't get in the response no Assertions...no NameID was also generated.

Finally Getting the Assertions

After further hours spent in analysing online wiki it was obvious that AttributeResolverConfiguration was next step to success.

Having a look in conf/attribute-resolver.xml and putting breakpoints in classes like from net.shibboleth.idp.attribute.resolver.ad.impl namespace like (PrincipalNameAttributeDefinition, ScopedAttributeDefinition, AbstractAttributeReleaseAction or AttributeResolverImpl) it looked that everything went Ok since I've got all 4 attributes with the expected values (by watching variables during breakpoint sessions) but no Assertions were generated.

So I had a look in conf/atribute-filter.xml and surprise, attribute generation was filtered by a fictious EntityId of https://sp.example.org. By changing the attribute value to the right value in <afp:PolicyRequirementRule xsi:type="basic:AttributeRequesterString" value="<mySPEntityID>" /> everything started to work as expected.

After about two weeks of trial and error I finally succeeded to have a SSO/SAML POC based on open source components (Shibbolet/ApacheDS/KentorIT) working. 

The last step was struggling with convincing Shibbolet to respond to SAML requests.

The main problem (for newbies) is the lack of any overview type information; almost all documentation ([https://wiki.shibboleth.net/confluence/display/IDP30/Home](https://wiki.shibboleth.net/confluence/display/IDP30/Home)) focuses on detailed specification aspects so you get lost in tens of .properties/.xml configuration files.

# Debugging

Of course my first concern was about being able to set breakpoints and go step by step through sources.

Go to jetty_base and edit start.ini by adding the following lines:

```
-Xdebug 
-Xrunjdwp:transport=dt_socket,address=5005,server=y,suspend=n
```

Restart jetty.

Download latest source, open main pom.xml and rebuild project.

# First steps

Supposing you have the metadata file for a target SP (we do not need the SP implementation for now) deploy it in `shibbolet_sp/metadata` (you will also find there idp_metadata.xml, the metadata related with IsP).

Edit `conf/metadata-providers.xml` by adding information about you SP; something like this:
*    `<MetadataProvider id="LocalMetadata"  xsi:type="FilesystemMetadataProvider" metadataFile="%{idp.home}/metadata/mySPmetadata.xml"/>`


Edit conf/ldap.proprierties (watch out for useStartTLS):

* idp.authn.LDAP.ldapURL				= <ldap url\>
* idp.authn.LDAP.useStartTLS    		= false
* idp.authn.LDAP.returnAttributes   	= \<comma separated LDAP attributes\>
* idp.authn.LDAP.baseDN					= <base DN for search)
* idp.authn.LDAP.userFilter             = (\<LDAP attribute\>={user})

**Remark**: This is enaough for default *anonSearchAuthenticator*; if *bindSearchAuthenticator* is required be sure to:

* uncomment and change accordingly `idp.authn.LDAP.authenticator = bindSearchAuthenticator`
* change the two configartion entries:
	* idp.authn.LDAP.bindDN                           = \<DN of bind user\>
	* idp.authn.LDAP.bindDNCredential                 = \<password\>



At this moment we can test authentication by using the IdP initiated login URL : `HTTPS://<shibblolet-url>:<https-port>/idp/profile/SAML2/Unsolicited/SSO?providerId=<SP_entityID>`

<SP_entityID> is the the SP EntityId as specified in metadata file.

Logout can be achieved through `https://<shibblolet-url>:<https-port>/idp/profile/Logout`

In order to debug the authentication proceeds have a look in `net.shibboleth.idp.authn.impl.ValidateUsernamePasswordAgainstLDAP` (method doExecute), module `Shibboleth IdP :: Authentication Implementation`; also look at `org.ldaptive.auth.Authenticator` from ladptive-1.0.0.jar (select the jar with right click-\>Download source, etc).

# Configure Response

Now, even if you will get a browser error after going through the login UI process (since we dot have the actual SP implementation) you can use browser developer tools to check the SAMLResponse (use SSOCircle POST decoder). We notice that the Subject part is encrypted.

Response configuration can be done through  conf/relying-party.xml; inside ` <bean id="shibboleth.DefaultRelyingParty" parent="RelyingParty">` change the SAML2.SSO attributes according to your needs:

* (sample): `<bean parent="SAML2.SSO" p:postAuthenticationFlows="attribute-release" p:encryptAssertions="false" p:encryptAttributes="false" p:encryptNameIDs="false"/>`
 
Now we can see in clear text (after decoding) the Subject info but surprise(s):

* NameID has a strange value (some Base64 encoded value)
* No other assertions, even if we configured LDAP to return more attributes

# NameID

I was used with ADFS where you can easily return sAMAcountName as NameID. It turned out to be a very difficult task so at the end of the day I gave up since I (somehow) understood that the role of NameID is different of what I wanted to achieve.

Some insights:
You can have a look at (as a starting debugging point) `getSAML2NameIDGenerator` method from `net.shibboleth.idp.saml.nameid.impl.NameIdentifierGenerationServiceImpl`, module `Shibboleth IdP :: SAML Profile Implementation`. The main issue here is that the returned value (saml2Generator) is an implementation of `org.opensaml.saml.saml2.profile.SAML2NameIDGenerator`. Since in the module there is a compile dependency only to `open-saml-api-3.1.1.jar` you will have to add manually in pom.xml the dependency to the actual implementation.

```xml
        <dependency>
            <groupId>${opensaml.groupId}</groupId>
            <artifactId>opensaml-saml-impl</artifactId>
            <version>${opensaml.version}</version>
        </dependency>
 
```

Be sure to remove the test time dependency (a compile error will prevent to successfully compile the module anyway).

The default configured strategy relies on `TransientSAML2NameIDGenerator` and `CryptoTransientIdGenerationStrategy` (`generate` method).

Configuration of the strategy is done in `conf/saml-nameid.xml`. Initially I tried switching from `<ref bean="shibboleth.SAML2TransientGenerator" />` to 
```
	<!-- urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress -->
	<bean parent="shibboleth.SAML2AttributeSourcedGenerator"
            p:format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient"
            p:attributeSourceIds="#{ {'cn'} }" />

```
Watch out of the `p:format` attribute value, changed from *email* to *transient* as the `net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator` (one of the subsequent calls to other classes methods) will check  for attributes with this format.

Anyway, it didn't work because here we speak about SAML attributes (that will go into Assertions)  not about LDAP attributes and since I didn't get in the response no Assertions...no NameID was also generated.

# Finally Getting the Assertions

After further hours spent in analysing online wiki it was obvious that  [AttributeResolverConfiguration](https://wiki.shibboleth.net/confluence/display/IDP30/AttributeResolverConfiguration) was next step to success.

Having a look in `conf/attribute-resolver.xml` and putting breakpoints in classes like from `net.shibboleth.idp.attribute.resolver.ad.impl` namespace like (`PrincipalNameAttributeDefinition`, `ScopedAttributeDefinition`, `AbstractAttributeReleaseAction` or `AttributeResolverImpl`) it looked that everything went Ok since I've got all 4 attributes with the expected values (by watching variables during breakpoint sessions) but no Assertions were generated.

So I had a look in `conf/atribute-filter.xml` and surprise, attribute generation was filtered by a fictious EntityId of *https://sp.example.org*. By changing the attribute *value* to the right value in `<afp:PolicyRequirementRule xsi:type="basic:AttributeRequesterString" value="<mySPEntityID>" />` everything started to work as expected.


No comments :

Post a Comment