Java Code Examples for org.springframework.security.saml.websso.WebSSOProfileOptions#setIncludeScoping()
The following examples show how to use
org.springframework.security.saml.websso.WebSSOProfileOptions#setIncludeScoping() .
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: SSOConfigurer.java From spring-boot-security-saml with MIT License | 6 votes |
private WebSSOProfileOptions getProfileOptions() { WebSSOProfileOptionProperties properties = config.getProfileOptions(); WebSSOProfileOptions options = new WebSSOProfileOptions(); options.setAllowCreate(properties.getAllowCreate()); options.setAllowedIDPs(properties.getAllowedIdps()); options.setAssertionConsumerIndex(properties.getAssertionConsumerIndex()); options.setAuthnContextComparison(properties.getAuthnContextComparison().getType()); options.setAuthnContexts(properties.getAuthnContexts()); options.setBinding(properties.getBinding()); options.setForceAuthN(properties.getForceAuthn()); options.setIncludeScoping(properties.getIncludeScoping()); options.setNameID(properties.getNameId()); options.setPassive(properties.getPassive()); options.setProviderName(properties.getProviderName()); options.setProxyCount(properties.getProxyCount()); options.setRelayState(properties.getRelayState()); return options; }
Example 2
Source File: InsightsSecurityConfigurationAdapterSAML.java From Insights with Apache License 2.0 | 5 votes |
/** * Used to redirect after SAML authentication sucessful * * @return */ @Bean @Conditional(InsightsSAMLBeanInitializationCondition.class) public WebSSOProfileOptions defaultWebSSOProfileOptions() { WebSSOProfileOptions webSSOProfileOptions = new WebSSOProfileOptions(); webSSOProfileOptions.setRelayState("/user/insightsso/authenticateSSO"); webSSOProfileOptions.setIncludeScoping(false); return webSSOProfileOptions; }
Example 3
Source File: SAMLConfig.java From spring-boot-security-saml-samples with MIT License | 5 votes |
@Bean public SAMLEntryPoint samlEntryPoint() { WebSSOProfileOptions options = new WebSSOProfileOptions(); options.setIncludeScoping(false); SAMLEntryPoint entryPoint = new SAMLEntryPoint(); entryPoint.setDefaultProfileOptions(options); entryPoint.setFilterProcessesUrl("/saml/login"); return entryPoint; }
Example 4
Source File: SSOConfigurerTest.java From spring-boot-security-saml with MIT License | 4 votes |
@SuppressWarnings("unchecked") @Test public void configure_custom_entry_point() throws Exception { SSOConfigurer configurer = spy(new SSOConfigurer()); SAMLProcessingFilter ssoFilter = mock(SAMLProcessingFilter.class); when(configurer.createDefaultSamlProcessingFilter()).thenReturn(ssoFilter); SAMLWebSSOHoKProcessingFilter ssoHoKFilter = mock(SAMLWebSSOHoKProcessingFilter.class); when(configurer.createDefaultSamlHoKProcessingFilter()).thenReturn(ssoHoKFilter); SAMLDiscovery discoveryFilter = mock(SAMLDiscovery.class); when(configurer.createDefaultSamlDiscoveryFilter()).thenReturn(discoveryFilter); when(configurer.createDefaultSamlEntryPoint()).thenThrow(IllegalStateException.class); SavedRequestAwareAuthenticationSuccessHandler successHandler = mock(SavedRequestAwareAuthenticationSuccessHandler.class); SimpleUrlAuthenticationFailureHandler failureHandler = mock(SimpleUrlAuthenticationFailureHandler.class); WebSSOProfileOptions profileOptions = new WebSSOProfileOptions(); profileOptions.setAllowCreate(true); profileOptions.setAllowedIDPs(Collections.singleton("allowedIdps")); profileOptions.setAssertionConsumerIndex(999); profileOptions.setAuthnContextComparison(AuthnContextComparisonTypeEnumeration.MINIMUM); profileOptions.setAuthnContexts(Collections.singleton("contexts")); profileOptions.setBinding("binding"); profileOptions.setForceAuthN(true); profileOptions.setIncludeScoping(true); profileOptions.setNameID("nameId"); profileOptions.setPassive(true); profileOptions.setProviderName("providerName"); profileOptions.setProxyCount(null); profileOptions.setRelayState("relayState"); SAMLEntryPoint customEntryPoint = mock(SAMLEntryPoint.class); configurer.init(builder); configurer .defaultSuccessURL("/success") .failureHandler(failureHandler) .successHandler(successHandler) .defaultFailureURL("/failure") .discoveryProcessingURL("/discovery") .enableSsoHoK(true) .idpSelectionPageURL("/idp") .profileOptions(profileOptions) .ssoHoKProcessingURL("/hok") .ssoLoginURL("/login") .ssoProcessingURL("/sso") .samlEntryPoint(customEntryPoint); configurer.configure(builder); verify(properties, never()).getDefaultFailureUrl(); verify(properties, never()).getDefaultSuccessUrl(); verify(properties, never()).getDiscoveryProcessingUrl(); verify(properties, never()).getIdpSelectionPageUrl(); verify(properties, never()).getSsoHokProcessingUrl(); verify(properties, never()).getSsoLoginUrl(); verify(properties, never()).getSsoProcessingUrl(); verify(properties, never()).getProfileOptions(); verify(successHandler, never()).setDefaultTargetUrl(eq("/success")); verify(failureHandler, never()).setDefaultFailureUrl(eq("/failure")); verify(ssoFilter).setAuthenticationManager(eq(authenticationManager)); verify(ssoFilter).setAuthenticationSuccessHandler(eq(successHandler)); verify(ssoFilter).setAuthenticationFailureHandler(eq(failureHandler)); verify(ssoFilter).setFilterProcessesUrl(eq("/sso")); verify(ssoHoKFilter).setAuthenticationManager(eq(authenticationManager)); verify(ssoHoKFilter).setAuthenticationSuccessHandler(eq(successHandler)); verify(ssoHoKFilter).setAuthenticationFailureHandler(eq(failureHandler)); verify(ssoHoKFilter).setFilterProcessesUrl(eq("/hok")); verify(serviceProviderEndpoints).setSsoProcessingURL("/sso"); verify(serviceProviderEndpoints).setSsoHoKProcessingURL("/hok"); verify(serviceProviderEndpoints).setDefaultFailureURL("/failure"); verify(serviceProviderEndpoints).setDiscoveryProcessingURL("/discovery"); verify(serviceProviderEndpoints).setIdpSelectionPageURL("/idp"); verify(serviceProviderEndpoints).setSsoLoginURL("/login"); verify(discoveryFilter).setFilterProcessesUrl(eq("/discovery")); verify(discoveryFilter).setIdpSelectionPath(eq("/idp")); verify(customEntryPoint).setFilterProcessesUrl(eq("/login")); ArgumentCaptor<WebSSOProfileOptions> optionsCaptor = ArgumentCaptor.forClass(WebSSOProfileOptions.class); verify(customEntryPoint).setDefaultProfileOptions(optionsCaptor.capture()); WebSSOProfileOptions options = optionsCaptor.getValue(); Assertions.assertThat(options.isAllowCreate()).isEqualTo(true); Assertions.assertThat(options.getAllowedIDPs()).containsExactly("allowedIdps"); Assertions.assertThat(options.getAssertionConsumerIndex()).isEqualTo(999); Assertions.assertThat(options.getAuthnContextComparison()).isEqualTo(AuthnContextComparisonTypeEnumeration.MINIMUM); Assertions.assertThat(options.getAuthnContexts()).containsExactly("contexts"); Assertions.assertThat(options.getBinding()).isEqualTo("binding"); Assertions.assertThat(options.getForceAuthN()).isEqualTo(true); Assertions.assertThat(options.isIncludeScoping()).isEqualTo(true); Assertions.assertThat(options.getNameID()).isEqualTo("nameId"); Assertions.assertThat(options.getPassive()).isEqualTo(true); Assertions.assertThat(options.getProviderName()).isEqualTo("providerName"); Assertions.assertThat(options.getProxyCount()).isEqualTo(null); Assertions.assertThat(options.getRelayState()).isEqualTo("relayState"); verify(builder).setSharedObject(eq(SAMLProcessingFilter.class), eq(ssoFilter)); verify(builder).setSharedObject(eq(SAMLWebSSOHoKProcessingFilter.class), eq(ssoHoKFilter)); verify(builder).setSharedObject(eq(SAMLDiscovery.class), eq(discoveryFilter)); verify(builder).setSharedObject(eq(SAMLEntryPoint.class), eq(customEntryPoint)); }
Example 5
Source File: WebSecurityConfig.java From spring-boot-security-saml-sample with Apache License 2.0 | 4 votes |
@Bean public WebSSOProfileOptions defaultWebSSOProfileOptions() { WebSSOProfileOptions webSSOProfileOptions = new WebSSOProfileOptions(); webSSOProfileOptions.setIncludeScoping(false); return webSSOProfileOptions; }