Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for SAML 2.0 asynchronous (front-channel) binding for single logout #210

Merged
merged 20 commits into from
Feb 22, 2019

Conversation

sachiniWettasinghe
Copy link
Contributor

@sachiniWettasinghe sachiniWettasinghe commented Feb 22, 2019

Proposed changes in this pull request

  • Add HTTP Redirect Binding for front-channel single logout.
  • Add HTTP POST Binding for front-channel single logout.

Fixes wso2/product-is#4038

@JKAUSHALYA JKAUSHALYA merged commit d729ea4 into master Feb 22, 2019
import java.util.List;
import java.util.Set;

public class Util {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IMO without releasing a major version, we cannot remove a public API.

Copy link
Contributor Author

@sachiniWettasinghe sachiniWettasinghe Oct 28, 2019

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This API was removed as this component did not get packed in the product

if ((getTextValue(elem, SAMLSSOConstants.FileBasedSPConfig.FRONT_CHANNEL_LOGOUT)) != null) {
spDO.setDoFrontChannelLogout(Boolean.valueOf(getTextValue(elem, SAMLSSOConstants.FileBasedSPConfig
.FRONT_CHANNEL_LOGOUT)));
if(spDO.isDoFrontChannelLogout()) {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Formatting issue.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed with 1149d97

"<input type='hidden' name='AuthenticatedIdPs' value='"
+ Encode.forHtmlAttribute(authenticatedIdPs) + "'/>");
}
PrintWriter out = resp.getWriter();

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Without writing each and every line to response, it's better to build the whole response and write to output in a single go.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed with 3bbc008

@@ -847,4 +849,4 @@
<http:address location="https://localhost:9443/services/IdentitySAMLSSOConfigService.IdentitySAMLSSOConfigServiceHttpsEndpoint/"/>
</wsdl:port>
</wsdl:service>
</wsdl:definitions>
</wsdl:definitions>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

new line please

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed with 1149d97

@@ -136,6 +137,42 @@ public static boolean isSingleLogoutEnabled(boolean isSpEdit, SAMLSSOServiceProv
return false;
}

/**
* Check front-Channel logout enable and if not enable return false.
* @param isSpEdit Operation on service provider, create or edit.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Put a space after the description line, to make it clean to read

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed with 1149d97

sachiniWettasinghe added a commit to sachiniWettasinghe/identity-inbound-auth-saml that referenced this pull request Oct 28, 2019
@madurangasiriwardena madurangasiriwardena deleted the feature-front-channel-logout branch February 15, 2020 01:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants