[prev in list] [next in list] [prev in thread] [next in thread] 

List:       shibboleth-users
Subject:    integrating Shibboleth SP 2 with ADFS, log out issue
From:       "Vu, Kien" <kien () brightcookie ! com ! au>
Date:       2013-03-24 23:39:53
Message-ID: CAD=-YqN2JV7WyxSjhjgUqPAzzgetz2=wsRBgn-A6DcHxETUe0A () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Hi everyone,


We are having log-out issue when integrating Shibboleth SP 2 with ADFS. The
log-in is working fine but when I log out the Shibboleth SP 2, the ADFS is
not logged out.

Can someone please help me on this issue?

This is our Shibboleth config file:


<SPConfig xmlns="urn:mace:shibboleth:2.0:native:sp:config"
    xmlns:conf="urn:mace:shibboleth:2.0:native:sp:config"
    xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
    xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
    xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
    clockSkew="180">

        <OutOfProcess>
                <Extensions>
                        <Library path="/usr/lib64/shibboleth/adfs.so"
fatal="true"/>
                </Extensions>
        </OutOfProcess>
        <InProcess>
                <Extensions>
                        <Library path="/usr/lib64/shibboleth/adfs-lite.so"
fatal="true"/>
                </Extensions>
        </InProcess>



       <Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
                  checkAddress="false" handlerSSL="false"
cookieProps="http">



         <SSO entityID="http://xxxxx/adfs/services/trust">
                         SAML2 SAML1 ADFS
            </SSO>



            <!-- SAML and local-only logout. -->
            <Logout>SAML2 ADFS Local</Logout>
            <!-- <LogoutInitiator type="Chaining" Location="/Logout"
relayState="cookie">
                                <LogoutInitiator type="SAML2"/>
                                <LogoutInitiator type="Local"/>
                        </LogoutInitiator> -->


            <Handler type="MetadataGenerator" Location="/Metadata"
signing="false"/>

            <!-- Status reporting service. -->
            <Handler type="Status" Location="/Status" acl="127.0.0.1 ::1"/>

            <!-- Session diagnostic service. -->
            <Handler type="Session" Location="/Session"
showAttributeValues="false"/>

            <!-- JSON feed of discovery information. -->
            <Handler type="DiscoveryFeed" Location="/DiscoFeed"/>
        </Sessions>

        <Errors supportContact="xxxx"
            helpLocation="/about.html"
            styleSheet="/shibboleth-sp/main.css"/>


<Notify
    Channel="back"
        Location="https://xxxxx/auth/shibboleth/logout.php" />



                 <MetadataProvider type="XML" uri="
https://xxxx/FederationMetadata/2007-06/FederationMetadata.xml"
             backingFilePath="/etc/shibboleth/editedFederationMetadata.xml"
reloadInterval="180000" />





        <!-- Map to extract attributes from SAML assertions. -->
        <AttributeExtractor type="XML" validate="true"
reloadChanges="false" path="attribute-map.xml"/>

        <!-- Use a SAML query if no attributes are supplied during SSO. -->
        <AttributeResolver type="Query" subjectMatch="true"/>

        <!-- Default filtering policy for recognized attributes, lets other
data pass. -->
        <AttributeFilter type="XML" validate="true"
path="attribute-policy.xml"/>

        <!-- Simple file-based resolver for using a single keypair. -->


                <CredentialResolver type="File"
key="/etc/pki/tls/private/xxxx.key"
certificate="/etc/pki/tls/certs/xxxx.crt"/>

    </ApplicationDefaults>

    <!-- Policies that determine how to process and authenticate runtime
messages. -->
    <SecurityPolicyProvider type="XML" validate="true"
path="security-policy.xml"/>

    <!-- Low-level configuration about protocols and bindings available for
use. -->
    <ProtocolProvider type="XML" validate="true" reloadChanges="false"
path="protocols.xml"/>

</SPConfig>


Many thanks,

Kien

[Attachment #5 (text/html)]

<span style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">Hi \
everyone,</span><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 <br></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)"><br></div><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 We are having log-out issue when integrating Shibboleth SP 2 with ADFS. The log-in \
is working fine but when I log out the Shibboleth SP 2, the ADFS is not logged \
out.</div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 <br></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">Can \
someone please help me on this issue?</div><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 <br></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">This \
is our Shibboleth config file:</div><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 <br></div><div style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)"><br></div><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 <div>&lt;SPConfig xmlns=&quot;urn:mace:shibboleth:2.0:native:sp:config&quot;</div><div> \
xmlns:conf=&quot;urn:mace:shibboleth:2.0:native:sp:config&quot;</div><div>    \
xmlns:saml=&quot;urn:oasis:names:tc:SAML:2.0:assertion&quot;</div> <div>    \
xmlns:samlp=&quot;urn:oasis:names:tc:SAML:2.0:protocol&quot;</div><div>    \
xmlns:md=&quot;urn:oasis:names:tc:SAML:2.0:metadata&quot;</div><div>    \
clockSkew=&quot;180&quot;&gt;</div><div><br></div><div>        \
&lt;OutOfProcess&gt;</div> <div>                &lt;Extensions&gt;</div><div>         \
&lt;Library path=&quot;/usr/lib64/shibboleth/adfs.so&quot; \
fatal=&quot;true&quot;/&gt;</div><div>                &lt;/Extensions&gt;</div><div>  \
&lt;/OutOfProcess&gt;</div> <div>        &lt;InProcess&gt;</div><div>                \
&lt;Extensions&gt;</div><div>                        &lt;Library \
path=&quot;/usr/lib64/shibboleth/adfs-lite.so&quot; \
fatal=&quot;true&quot;/&gt;</div><div>                &lt;/Extensions&gt;</div> <div> \
&lt;/InProcess&gt;</div><div><br></div><div>   </div></div><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)"><br></div><div \
style="color:rgb(34,34,34);font-family:arial,sans-serif;font-size:13px;background-color:rgb(255,255,255)">
 <div>       &lt;Sessions lifetime=&quot;28800&quot; timeout=&quot;3600&quot; \
relayState=&quot;ss:mem&quot;</div><div>                  \
checkAddress=&quot;false&quot; handlerSSL=&quot;false&quot; \
cookieProps=&quot;http&quot;&gt;</div> <div><br></div><div>        </div><div>        \
</div><div>         &lt;SSO entityID=&quot;<a href="http://xxxxx/adfs/services/trust" \
target="_blank" style="color:rgb(17,85,204)">http://xxxxx/adfs/services/trust</a>&quot;&gt;</div>
 <div>                         SAML2 SAML1 ADFS</div><div>            \
&lt;/SSO&gt;</div><div><br></div><div><br></div><div><br></div><div>            \
&lt;!-- SAML and local-only logout. --&gt;</div><div>            &lt;Logout&gt;SAML2 \
ADFS Local&lt;/Logout&gt;</div> <div>            &lt;!-- &lt;LogoutInitiator \
type=&quot;Chaining&quot; Location=&quot;/Logout&quot; \
relayState=&quot;cookie&quot;&gt;</div><div>                                \
&lt;LogoutInitiator type=&quot;SAML2&quot;/&gt;</div> <div>                           \
&lt;LogoutInitiator type=&quot;Local&quot;/&gt;</div><div>                        \
&lt;/LogoutInitiator&gt; --&gt;</div><div><br></div><div>          </div><div>        \
&lt;Handler type=&quot;MetadataGenerator&quot; Location=&quot;/Metadata&quot; \
signing=&quot;false&quot;/&gt;</div> <div><br></div><div>            &lt;!-- Status \
reporting service. --&gt;</div><div>            &lt;Handler type=&quot;Status&quot; \
Location=&quot;/Status&quot; acl=&quot;127.0.0.1 \
::1&quot;/&gt;</div><div><br></div><div>            &lt;!-- Session diagnostic \
service. --&gt;</div> <div>            &lt;Handler type=&quot;Session&quot; \
Location=&quot;/Session&quot; \
showAttributeValues=&quot;false&quot;/&gt;</div><div><br></div><div>            \
&lt;!-- JSON feed of discovery information. --&gt;</div><div>  &lt;Handler \
type=&quot;DiscoveryFeed&quot; Location=&quot;/DiscoFeed&quot;/&gt;</div><div>        \
&lt;/Sessions&gt;</div><div><br></div><div><div>        &lt;Errors \
supportContact=&quot;xxxx&quot;</div><div>            \
helpLocation=&quot;/about.html&quot;</div> <div>            \
styleSheet=&quot;/shibboleth-sp/main.css&quot;/&gt;</div><div><br></div><div>   \
</div><div>&lt;Notify</div><div>    Channel=&quot;back&quot;</div><div>        \
Location=&quot;<a href="https://xxxxx/auth/shibboleth/logout.php" target="_blank" \
style="color:rgb(17,85,204)">https://xxxxx/auth/shibboleth/logout.php</a>&quot; \
/&gt;</div> <div><br></div><div><br></div><div><br></div><div>                 \
&lt;MetadataProvider type=&quot;XML&quot; uri=&quot;<a \
href="https://xxxx/FederationMetadata/2007-06/FederationMetadata.xml" target="_blank" \
style="color:rgb(17,85,204)">https://xxxx/FederationMetadata/2007-06/FederationMetadata.xml</a>&quot;</div>
 <div>             backingFilePath=&quot;/etc/shibboleth/editedFederationMetadata.xml&quot; \
reloadInterval=&quot;180000&quot; \
/&gt;</div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div> \
&lt;!-- Map to extract attributes from SAML assertions. --&gt;</div> <div>        \
&lt;AttributeExtractor type=&quot;XML&quot; validate=&quot;true&quot; \
reloadChanges=&quot;false&quot; \
path=&quot;attribute-map.xml&quot;/&gt;</div><div><br></div><div>        &lt;!-- Use \
a SAML query if no attributes are supplied during SSO. --&gt;</div> <div>        \
&lt;AttributeResolver type=&quot;Query&quot; \
subjectMatch=&quot;true&quot;/&gt;</div><div><br></div><div>        &lt;!-- Default \
filtering policy for recognized attributes, lets other data pass. --&gt;</div><div>  \
&lt;AttributeFilter type=&quot;XML&quot; validate=&quot;true&quot; \
path=&quot;attribute-policy.xml&quot;/&gt;</div><div><br></div><div>        &lt;!-- \
Simple file-based resolver for using a single keypair. --&gt;</div> <div>  \
</div><div><br></div><div>                &lt;CredentialResolver \
type=&quot;File&quot; key=&quot;/etc/pki/tls/private/xxxx.key&quot; \
certificate=&quot;/etc/pki/tls/certs/xxxx.crt&quot;/&gt;</div><div>  </div><div>    \
&lt;/ApplicationDefaults&gt;</div> <div><br></div><div>    &lt;!-- Policies that \
determine how to process and authenticate runtime messages. --&gt;</div><div>    \
&lt;SecurityPolicyProvider type=&quot;XML&quot; validate=&quot;true&quot; \
path=&quot;security-policy.xml&quot;/&gt;</div> <div><br></div><div>    &lt;!-- \
Low-level configuration about protocols and bindings available for use. \
--&gt;</div><div>    &lt;ProtocolProvider type=&quot;XML&quot; \
validate=&quot;true&quot; reloadChanges=&quot;false&quot; \
path=&quot;protocols.xml&quot;/&gt;</div> \
<div><br></div><div>&lt;/SPConfig&gt;</div><div><br></div></div><div><br></div><div>Many \
thanks,</div><div><br></div><div>Kien</div></div><div><br></div>



--
To unsubscribe from this list send an email to users-unsubscribe@shibboleth.net

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic