-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added README, token generation, error handler, routes for all required use cases #1
Conversation
…erating and error handler
About these:
and
This reference implementation's IdP initiated Logout handling (i.e. case "2: IdP request logout after receive logout request from another SP that shared a session. ") doesn't work properly at all circumstances and whats worse it reports success even if it fails to terminate local session (as matter of fact it reports always success regardless of success/failure of local session termination). Further information available from:
There are two publicly available implementations which try to handle situation correctly but those implementations are very application specific (as of now it is impossible to implement IdP initiated SLO properly with passport-saml or with node-saml so that one implementation would work in all SW stacks / applications). Those publicly available implementations which might implement it correctly (and which might be used as example how to address IdP initated SLO problem) are:
fwiw this problem was discussed previously at your this issue report: node-saml/passport-saml#445 |
Thank you @srd90 for the input! That was a very good point, I added a logout handler to terminate the local session as well. |
I am sorry to inform you that 7372ab8 did not address or fix issue described at previous comment at all. Please, take a good look at all the material linked to this PR's previous comment. Hint: issue is related to the fact that 3rd party (session) cookies are not being delivered in modern browser under all circumstances (e.g. when IdP which lives another top level domain is propagating SLO requests from iframes). When there is not any session cookie available there cannot be any authenticated Under such conditions (not being 100% sure that correct local session was terminated) SAML service provider must not report successfull local session termination. If SAML service provided is not 100% sure it must report with some other response code. This was last attempt to comment this particular codebase. |
Yes, I understand your point. This codebase was to serve as a reference to myself, and it is not a full implementation (the proper cache for the sessions is not implemented at all). I will try to build on this if I have the time, but for now it is more of a hobby project. |
Added README, routes now handling all required use cases, added token-generating and error handler