From 2aa1f76aabf095bc0083dcb00bacb513855f3540 Mon Sep 17 00:00:00 2001 From: Aldo Mihasi Date: Tue, 13 Jun 2023 15:47:18 +0300 Subject: [PATCH] use sha256 with rsa keys for saml2, fix bug for authentication request's id --- .../validators/configurableProvider/Saml2SSOUtils.java | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/dmp-backend/web/src/main/java/eu/eudat/logic/security/validators/configurableProvider/Saml2SSOUtils.java b/dmp-backend/web/src/main/java/eu/eudat/logic/security/validators/configurableProvider/Saml2SSOUtils.java index 454557103..5f31b65a2 100644 --- a/dmp-backend/web/src/main/java/eu/eudat/logic/security/validators/configurableProvider/Saml2SSOUtils.java +++ b/dmp-backend/web/src/main/java/eu/eudat/logic/security/validators/configurableProvider/Saml2SSOUtils.java @@ -807,7 +807,7 @@ public class Saml2SSOUtils { Credential credential = getCredential(provider.getSigningCert()); signature.setSigningCredential(credential); - signature.setSignatureAlgorithm(SignatureConstants.ALGO_ID_SIGNATURE_DSA_SHA256); + signature.setSignatureAlgorithm(SignatureConstants.ALGO_ID_SIGNATURE_RSA_SHA256); signature.setCanonicalizationAlgorithm(SignatureConstants.ALGO_ID_C14N_EXCL_OMIT_COMMENTS); X509KeyInfoGeneratorFactory keyInfoGeneratorFactory = new X509KeyInfoGeneratorFactory(); @@ -853,7 +853,7 @@ public class Saml2SSOUtils { break; } authnRequest.setAssertionConsumerServiceURL(provider.getAssertionConsumerServiceUrl()); - authnRequest.setID(UUID.randomUUID().toString()); + authnRequest.setID('_' + UUID.randomUUID().toString()); authnRequest.setIssuer(buildIssuer(provider.getSpEntityId())); authnRequest.setNameIDPolicy(buildNameIdPolicy());