-
-
Notifications
You must be signed in to change notification settings - Fork 217
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support zero signature in SAML response #467
Comments
I have the same problem |
@carsonwah @cisacpalma According to the section 4.1.3.5 in specification http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf,
That means the assertion in response issued from identity provider must be signed, you can also sign the outer response as a message signature to provide extra security protection, but assertion signature is the only requirement stated in the specification. There is a discussion thread on it http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf. it seems optional in Artifact binding but this library does't support it now. It would be good to know the reason why the signature has to be ignored in your use cases, and feel free to discuss here. :D |
@tngan Sorry for the late reply. I missed the notification. Below are my points of view:
That means the "MUST" you mention only applies to IdP-initiated login.
In my case, IdP is using
Based on above, I would suggest relaxing this hardcoded constraint, either by making it optional through parameter, or directly removing the constraint (I'm not sure which one makes more sense). Currently I forked the repo to solely remove this checking in order to work with my IdP. It would be great if this suggestion could be considered. Thanks. |
Hi @tngan. I have the same issue, and I agree with carson's opinion. SP-initiated login does not require signature, which is exactly my case. I think this should be an option so people working with this type can prevent |
Any news on this? |
Hi, I'm integrating my application with an IDP that returns encrypted response but without a signature in their SAML response. I encountered
Error: ERR_ZERO_SIGNATURE
thrown by samlify.In the source code of samlify, it is hardcoded to expect at least 1 signature in SAML response:
samlify/src/libsaml.ts
Lines 384 to 387 in 1bf1eba
Would it be reasonable to support an option to loosen this restriction? If not, is there any underlying reason why we should enforce this behaviour?
Many thanks.
The text was updated successfully, but these errors were encountered: