Class SAML2IdPAuthModuleConf
java.lang.Object
org.apache.syncope.common.lib.auth.Pac4jAuthModuleConf
org.apache.syncope.common.lib.auth.SAML2IdPAuthModuleConf
- All Implemented Interfaces:
Serializable,AuthModuleConf,BaseBean
- See Also:
-
Nested Class Summary
Nested classes/interfaces inherited from interface org.apache.syncope.common.lib.auth.AuthModuleConf
AuthModuleConf.Mapper -
Field Summary
FieldsModifier and TypeFieldDescriptionprotected StringMaximum skew in seconds between SP and IDP clocks.protected intAllows the SAML client to select a specific ACS url from the metadata, if defined.protected intAttributeConsumingServiceIndex attribute of AuthnRequest element.Requested authentication context class in authn requests.protected StringSpecifies the comparison rule that should be used to evaluate the specified authentication methods.Collection of signing signature blacklisted algorithms, if any, to override the global defaults.protected SAML2BindingTypeThe destination binding to use when creating authentication requests.protected booleanWhether authentication requests should be tagged as forced auth.protected StringThe metadata location of the identity provider that is to handle authentications.protected StringBase64-encoded keystore content..protected StringThe password to use when generating the SP keystore.protected StringOnce you have an authenticated session on the identity provider, usually it won't prompt you again to enter your credentials and it will automatically generate a new assertion for you.protected TriStateBooleanFlag to indicate whether the allow-create flags for nameid policies should be set to true, false or ignored/undefined.protected StringNameID policy to request in the authentication requests.protected booleanWhether authentication requests should be tagged as passive.protected StringThe password to use when generating the private key for the SP keystore.protected StringProvider name set for the saml authentication request.protected booleanWhether metadata should be marked to request response signed.protected StringThe entity id of the SP that is used in the SP metadata generation process.protected StringBase64-encoded SP metadata content.Collection of signing signature algorithms, if any, to override the global defaults.protected StringThe signing signature canonicalization algorithm, if any, to override the global defaults.Collection of signing signature reference digest methods, if any, to override the global defaults.protected booleanWhether or not the authnRequest should be signed.protected booleanWhether or not the Logout Request sent from the SP should be signed.protected booleanWhether or not SAML SP metadata should be signed when generated.protected booleanWhether name qualifiers should be produced in the final saml response.protected StringThe attribute value that should be used for the authenticated username, upon a successful authentication attempt.protected booleanWhether metadata should be marked to request sign assertions. -
Constructor Summary
Constructors -
Method Summary
Modifier and TypeMethodDescriptionintintbooleanbooleanbooleanbooleanbooleanbooleanbooleanbooleanmap(AuthModuleTO authModule, AuthModuleConf.Mapper mapper) voidsetAcceptedSkew(String acceptedSkew) voidsetAssertionConsumerServiceIndex(int assertionConsumerServiceIndex) voidsetAttributeConsumingServiceIndex(int attributeConsumingServiceIndex) voidsetAuthnContextComparisonType(String authnContextComparisonType) voidsetDestinationBinding(SAML2BindingType destinationBinding) voidsetForceAuth(boolean forceAuth) voidsetIdentityProviderMetadataPath(String identityProviderMetadataPath) voidsetKeystore(String keystore) voidsetKeystorePassword(String keystorePassword) voidsetMaximumAuthenticationLifetime(String maximumAuthenticationLifetime) voidsetNameIdPolicyAllowCreate(TriStateBoolean nameIdPolicyAllowCreate) voidsetNameIdPolicyFormat(String nameIdPolicyFormat) voidsetPassive(boolean passive) voidsetPrivateKeyPassword(String privateKeyPassword) voidsetProviderName(String providerName) voidsetResponsesSigned(boolean responsesSigned) voidsetServiceProviderEntityId(String serviceProviderEntityId) voidsetServiceProviderMetadata(String serviceProviderMetadata) voidsetSignatureCanonicalizationAlgorithm(String signatureCanonicalizationAlgorithm) voidsetSignAuthnRequest(boolean signAuthnRequest) voidsetSignServiceProviderLogoutRequest(boolean signServiceProviderLogoutRequest) voidsetSignServiceProviderMetadata(boolean signServiceProviderMetadata) voidsetUseNameQualifier(boolean useNameQualifier) voidsetUserIdAttribute(String userIdAttribute) voidsetWantsAssertionsSigned(boolean wantsAssertionsSigned) Methods inherited from class org.apache.syncope.common.lib.auth.Pac4jAuthModuleConf
getClientName, setClientName
-
Field Details
-
userIdAttribute
The attribute value that should be used for the authenticated username, upon a successful authentication attempt. -
destinationBinding
The destination binding to use when creating authentication requests. -
keystore
Base64-encoded keystore content.. -
keystorePassword
The password to use when generating the SP keystore. -
privateKeyPassword
The password to use when generating the private key for the SP keystore. -
serviceProviderMetadata
Base64-encoded SP metadata content. -
identityProviderMetadataPath
The metadata location of the identity provider that is to handle authentications. -
nameIdPolicyAllowCreate
Flag to indicate whether the allow-create flags for nameid policies should be set to true, false or ignored/undefined. -
maximumAuthenticationLifetime
Once you have an authenticated session on the identity provider, usually it won't prompt you again to enter your credentials and it will automatically generate a new assertion for you. By default, the SAML client will accept assertions based on a previous authentication for one hour. You can adjust this behavior by modifying this setting. The unit of time here is seconds. -
acceptedSkew
Maximum skew in seconds between SP and IDP clocks. This skew is added onto theNotOnOrAfterfield in seconds for the SAML response validation. -
serviceProviderEntityId
The entity id of the SP that is used in the SP metadata generation process. -
forceAuth
protected boolean forceAuthWhether authentication requests should be tagged as forced auth. -
passive
protected boolean passiveWhether authentication requests should be tagged as passive. -
authnContextClassRefs
Requested authentication context class in authn requests. -
authnContextComparisonType
Specifies the comparison rule that should be used to evaluate the specified authentication methods. For example, if exact is specified, the authentication method used must match one of the authentication methods specified by the AuthnContextClassRef elements. AuthContextClassRef element require comparison rule to be used to evaluate the specified authentication methods. If not explicitly specified "exact" rule will be used by default. Other acceptable values are minimum, maximum, better. -
nameIdPolicyFormat
NameID policy to request in the authentication requests. -
responsesSigned
protected boolean responsesSignedWhether metadata should be marked to request response signed. -
wantsAssertionsSigned
protected boolean wantsAssertionsSignedWhether metadata should be marked to request sign assertions. -
attributeConsumingServiceIndex
protected int attributeConsumingServiceIndexAttributeConsumingServiceIndex attribute of AuthnRequest element. The given index points out a specific AttributeConsumingService structure, declared into the Service Provider (SP)'s metadata, to be used to specify all the attributes that the Service Provider is asking to be released within the authentication assertion returned by the Identity Provider (IdP). This attribute won't be sent with the request unless a positive value (including 0) is defined. -
assertionConsumerServiceIndex
protected int assertionConsumerServiceIndexAllows the SAML client to select a specific ACS url from the metadata, if defined. A negative value de-activates the selection process and is the default. -
useNameQualifier
protected boolean useNameQualifierWhether name qualifiers should be produced in the final saml response. -
signServiceProviderMetadata
protected boolean signServiceProviderMetadataWhether or not SAML SP metadata should be signed when generated. -
signAuthnRequest
protected boolean signAuthnRequestWhether or not the authnRequest should be signed. -
signServiceProviderLogoutRequest
protected boolean signServiceProviderLogoutRequestWhether or not the Logout Request sent from the SP should be signed. -
blockedSignatureSigningAlgorithms
Collection of signing signature blacklisted algorithms, if any, to override the global defaults. -
signatureAlgorithms
Collection of signing signature algorithms, if any, to override the global defaults. -
signatureReferenceDigestMethods
Collection of signing signature reference digest methods, if any, to override the global defaults. -
signatureCanonicalizationAlgorithm
The signing signature canonicalization algorithm, if any, to override the global defaults. -
providerName
Provider name set for the saml authentication request. Sets the human-readable name of the requester for use by the presenter's user agent or the identity provider.
-
-
Constructor Details
-
SAML2IdPAuthModuleConf
public SAML2IdPAuthModuleConf()
-
-
Method Details
-
getUserIdAttribute
-
setUserIdAttribute
-
getDestinationBinding
-
setDestinationBinding
-
getKeystorePassword
-
setKeystorePassword
-
getPrivateKeyPassword
-
setPrivateKeyPassword
-
getKeystore
-
setKeystore
-
getServiceProviderMetadata
-
setServiceProviderMetadata
-
getIdentityProviderMetadataPath
-
setIdentityProviderMetadataPath
-
getMaximumAuthenticationLifetime
-
setMaximumAuthenticationLifetime
-
getAcceptedSkew
-
setAcceptedSkew
-
getServiceProviderEntityId
-
setServiceProviderEntityId
-
isForceAuth
public boolean isForceAuth() -
setForceAuth
public void setForceAuth(boolean forceAuth) -
isPassive
public boolean isPassive() -
setPassive
public void setPassive(boolean passive) -
getNameIdPolicyAllowCreate
-
setNameIdPolicyAllowCreate
-
getAuthnContextClassRefs
-
getAuthnContextComparisonType
-
setAuthnContextComparisonType
-
getNameIdPolicyFormat
-
setNameIdPolicyFormat
-
isResponsesSigned
public boolean isResponsesSigned() -
setResponsesSigned
public void setResponsesSigned(boolean responsesSigned) -
isWantsAssertionsSigned
public boolean isWantsAssertionsSigned() -
setWantsAssertionsSigned
public void setWantsAssertionsSigned(boolean wantsAssertionsSigned) -
getAttributeConsumingServiceIndex
public int getAttributeConsumingServiceIndex() -
setAttributeConsumingServiceIndex
public void setAttributeConsumingServiceIndex(int attributeConsumingServiceIndex) -
getAssertionConsumerServiceIndex
public int getAssertionConsumerServiceIndex() -
setAssertionConsumerServiceIndex
public void setAssertionConsumerServiceIndex(int assertionConsumerServiceIndex) -
isUseNameQualifier
public boolean isUseNameQualifier() -
setUseNameQualifier
public void setUseNameQualifier(boolean useNameQualifier) -
isSignServiceProviderMetadata
public boolean isSignServiceProviderMetadata() -
setSignServiceProviderMetadata
public void setSignServiceProviderMetadata(boolean signServiceProviderMetadata) -
isSignAuthnRequest
public boolean isSignAuthnRequest() -
setSignAuthnRequest
public void setSignAuthnRequest(boolean signAuthnRequest) -
isSignServiceProviderLogoutRequest
public boolean isSignServiceProviderLogoutRequest() -
setSignServiceProviderLogoutRequest
public void setSignServiceProviderLogoutRequest(boolean signServiceProviderLogoutRequest) -
getBlockedSignatureSigningAlgorithms
-
getSignatureAlgorithms
-
getSignatureReferenceDigestMethods
-
getSignatureCanonicalizationAlgorithm
-
setSignatureCanonicalizationAlgorithm
-
getProviderName
-
setProviderName
-
map
- Specified by:
mapin interfaceAuthModuleConf
-