diff --git a/README.md b/README.md index 491ad68e3..33983dce8 100644 --- a/README.md +++ b/README.md @@ -48,10 +48,10 @@ Config parameter details: * `host`: host for callback; will be combined with path and protocol to construct callback url if `callbackUrl` is not specified (default: `localhost`) * `entryPoint`: identity provider entrypoint * `issuer`: issuer string to supply to identity provider - * `cert`: see 'security and signatures' - * `privateCert`: see 'security and signatures' + * `cert`: see [Security and signatures](#security-and-signatures) + * `privateCert`: see [Security and signatures](#security-and-signatures) * `decryptionPvk`: optional private key that will be used to attempt to decrypt any encrypted assertions that are received - * `signatureAlgorithm`: optionally set the signature algorithm for signing requests, valid values are 'sha1' (default) or 'sha256' + * `signatureAlgorithm`: optionally set the signature algorithm for signing requests, valid values are 'sha1' (default), 'sha256', or 'sha512' * Additional SAML behaviors * `additionalParams`: dictionary of additional query params to add to all requests * `additionalAuthorizeParams`: dictionary of additional query params to add to 'authorize' requests @@ -104,7 +104,7 @@ app.get('/login', As a convenience, the strategy object exposes a `generateServiceProviderMetadata` method which will generate a service provider metadata document suitable for supplying to an identity provider. This method will only work on strategies which are configured with a `callbackUrl` (since the relative path for the callback is not sufficient information to generate a complete metadata document). -The `decryptionCert` argument should be a certificate matching the `decryptionPvk` and is required if the strategy is configured with a `decryptionPvk`. +The `decryptionCert` argument should be a public certificate matching the `decryptionPvk` and is required if the strategy is configured with a `decryptionPvk`. ## Security and signatures @@ -117,7 +117,7 @@ Authentication requests sent by Passport-SAML can be signed using RSA-SHA1. To s privateCert: fs.readFileSync('./cert.pem', 'utf-8') ``` -It is a good idea to validate the incoming SAML Responses. For this, you can provide the Identity Provider's certificate using the `cert` confguration key: +It is a good idea to validate the incoming SAML Responses. For this, you can provide the Identity Provider's public signing certificate using the `cert` configuration key: ```javascript cert: 'MIICizCCAfQCCQCY8tKaMc0BMjANBgkqh ... W==' diff --git a/lib/passport-saml/saml.js b/lib/passport-saml/saml.js index 2ef65955f..42d4c208b 100644 --- a/lib/passport-saml/saml.js +++ b/lib/passport-saml/saml.js @@ -60,13 +60,13 @@ SAML.prototype.initialize = function (options) { options.cacheProvider = new InMemoryCacheProvider( {keyExpirationPeriodMs: options.requestIdExpirationPeriodMs }); } - + if (!options.logoutUrl) { // Default to Entry Point options.logoutUrl = options.entryPoint || ''; } - // sha1 or sha256 + // sha1, sha256, or sha512 if (!options.signatureAlgorithm) { options.signatureAlgorithm = 'sha1'; } @@ -114,6 +114,10 @@ SAML.prototype.signRequest = function (samlMessage) { samlMessage.SigAlg = 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256'; signer = crypto.createSign('RSA-SHA256'); break; + case 'sha512': + samlMessage.SigAlg = 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha512'; + signer = crypto.createSign('RSA-SHA512'); + break; default: samlMessage.SigAlg = 'http://www.w3.org/2000/09/xmldsig#rsa-sha1'; signer = crypto.createSign('RSA-SHA1'); @@ -157,7 +161,7 @@ SAML.prototype.generateAuthorizeRequest = function (req, isPassive, callback) { '@IssueInstant': instant, '@ProtocolBinding': 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', '@AssertionConsumerServiceURL': self.getCallbackUrl(req), - '@Destination': self.options.entryPoint, + '@Destination': self.options.entryPoint, 'saml:Issuer' : { '@xmlns:saml' : 'urn:oasis:names:tc:SAML:2.0:assertion', '#text': self.options.issuer @@ -371,7 +375,7 @@ SAML.prototype.getAuthorizeForm = function (req, callback) { .replace(/"/g, '"') .replace(/</g, '<') .replace(/>/g, '>') - // Add other replacements here for HTML only + // Add other replacements here for HTML only // Or for XML, only if the named entities are defined in its DTD. .replace(/\r\n/g, preserveCR) // Must be before the next replacement. .replace(/[\r\n]/g, preserveCR); @@ -552,21 +556,18 @@ SAML.prototype.validatePostResponse = function (container, callback) { if (!self.options.decryptionPvk) throw new Error('No decryption key for encrypted SAML response'); - var encryptedDatas = xpath( encryptedAssertions[0], "./*[local-name()='EncryptedData']"); - if (encryptedDatas.length != 1) - throw new Error('Invalid signature'); - var encryptedDataXml = encryptedDatas[0].toString(); + var encryptedAssertionXml = encryptedAssertions[0].toString(); var xmlencOptions = { key: self.options.decryptionPvk }; - return Q.ninvoke(xmlenc, 'decrypt', encryptedDataXml, xmlencOptions) + return Q.ninvoke(xmlenc, 'decrypt', encryptedAssertionXml, xmlencOptions) .then(function(decryptedXml) { var decryptedDoc = new xmldom.DOMParser().parseFromString(decryptedXml); var decryptedAssertions = xpath(decryptedDoc, "/*[local-name()='Assertion']"); if (decryptedAssertions.length != 1) throw new Error('Invalid EncryptedAssertion content'); - if (self.options.cert && - !validSignature && + if (self.options.cert && + !validSignature && !self.validateSignature(decryptedXml, decryptedAssertions[0], self.options.cert)) throw new Error('Invalid signature'); @@ -574,7 +575,7 @@ SAML.prototype.validatePostResponse = function (container, callback) { }); } - // If there's no assertion, fall back on xml2js response parsing for the status & + // If there's no assertion, fall back on xml2js response parsing for the status & // LogoutResponse code. var parserConfig = { @@ -708,7 +709,7 @@ SAML.prototype.processValidlySignedAssertion = function(xml, inResponseTo, callb } } } - + // Test to see that if we have a SubjectConfirmation InResponseTo that it matches // the 'InResponseTo' attribute set in the Response if (self.options.validateInResponseTo) { @@ -916,13 +917,13 @@ SAML.prototype.generateServiceProviderMetadata = function( decryptionCert ) { } } }, - '#list' : [ + 'EncryptionMethod' : [ // this should be the set that the xmlenc library supports - { 'EncryptionMethod': { '@Algorithm': 'http://www.w3.org/2001/04/xmlenc#aes256-cbc' } }, - { 'EncryptionMethod': { '@Algorithm': 'http://www.w3.org/2001/04/xmlenc#aes128-cbc' } }, - { 'EncryptionMethod': { '@Algorithm': 'http://www.w3.org/2001/04/xmlenc#tripledes-cbc' } }, + { '@Algorithm': 'http://www.w3.org/2001/04/xmlenc#aes256-cbc' }, + { '@Algorithm': 'http://www.w3.org/2001/04/xmlenc#aes128-cbc' }, + { '@Algorithm': 'http://www.w3.org/2001/04/xmlenc#tripledes-cbc' } ] - }; + } } if (this.options.logoutCallbackUrl) { diff --git a/package.json b/package.json index ea1cfea02..fd42c1d52 100644 --- a/package.json +++ b/package.json @@ -1,6 +1,6 @@ { "name": "passport-saml", - "version": "0.14.0", + "version": "0.16.1", "licenses": [ { "type": "MIT", @@ -31,23 +31,22 @@ "main": "./lib/passport-saml", "dependencies": { "passport-strategy": "*", - "q": "1.1.x", + "q": "^1.5.0", + "xml-crypto": "^0.9.0", + "xml-encryption": "~0.10", "xml2js": "0.4.x", - "xml-crypto": "0.8.x", - "xmldom": "0.1.x", - "xmlbuilder": "2.5.x", - "xml-encryption": "~0.7" + "xmlbuilder": "^8.2.2", + "xmldom": "0.1.x" }, "devDependencies": { - "body-parser": "1.9.x", - "ejs": "1.0.x", + "body-parser": "^1.17.1", "express": "4.x", "jshint": "*", "mocha": "*", + "passport": "0.3.x", "request": "*", "should": "*", - "sinon": "^1.10.2", - "passport": "0.3.x" + "sinon": "^2.1.0" }, "engines": { "node": ">= 0.8.0" diff --git a/test/samlTests.js b/test/samlTests.js index 9a6ae158c..98e01b136 100644 --- a/test/samlTests.js +++ b/test/samlTests.js @@ -45,7 +45,7 @@ describe('SAML.js', function() { // NOTE: This test only tests existence of the assertion, not the correctness it('calls callback with saml request object', function(done) { saml.getAuthorizeUrl(req, function(err, target) { - url.parse(target, true).query.should.have.property('SAMLRequest'); + should(url.parse(target, true).query).have.property('SAMLRequest'); done(); }); }); diff --git a/test/tests.js b/test/tests.js index 4e5202951..9ee27aa94 100644 --- a/test/tests.js +++ b/test/tests.js @@ -29,6 +29,20 @@ describe( 'passport-saml /', function() { expectedNameIDStartsWith: 'ben', mockDate: '2014-05-27T23:29:35.426Z' }, + { name: 'Okta -- valid encrypted response should succeed', + samlResponse: { + SAMLResponse: '<?xml version="1.0" encoding="UTF-8"?><saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="https://64f4094f.ngrok.io/sso/saml/callback" ID="id195238933970448223940497" InResponseTo="_c60537dad34fa4ecb613" IssueInstant="2016-08-19T01:13:38.139Z" Version="2.0"><saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">http://www.okta.com/exk7xdi6axPfombzx0h7</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI="#id195238933970448223940497"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>zt7xnrL0uVkzk3u4xdKxUGFmluKjc8yyC9fojrx5qCo=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>eFes3TPB/eQeQPmPpObP4P3QZIJDc1cW02NT8reTJu0oedICNo/NBDxOk1bh81I39Lv/t1dE3Fwk0kgI3EK0WK4QZlIfvZB+NJOJTceoBRzmMtAxr9qYNEiGIlYxgpKPChoy8t3rYLWvBeZIsjJ8/bbdnuxcHV7mzoxY24wmaqnqq14nPI1AgIHcSgMTa/YjhRpZ2eSJ6MOE1M/40r/uoEIOX5c0UhHMFo8wbiv4+oi2O+dO9WakpC7V9puFzU49Qz0dzl1WhR0bZxTmSar6YF65s0fNCRz+HbykXwxVx8Z4M51EBG7SLuiPTUIN1MYTWeuhfYz1/Osf/pj1lqKbVA==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIDoDCCAoigAwIBAgIGAVaZ04POMA0GCSqGSIb3DQEBBQUAMIGQMQswCQYDVQQGEwJVUzETMBEG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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2p:Status xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:EncryptedAssertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="_9e8fd2ce4ad0212c98e7091ca8765fb4" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"/><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:RetrievalMethod Type="http://www.w3.org/2001/04/xmlenc#EncryptedKey" URI="#_2aea7a651dbb687902c483432ed85780"/></ds:KeyInfo><xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData></xenc:EncryptedData><xenc:EncryptedKey xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="_2aea7a651dbb687902c483432ed85780"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><ds:DigestMethod xmlns:ds="http://www.w3.org/2000/09/xmldsig#" Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/></xenc:EncryptionMethod><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:X509Data><ds:X509Certificate>MIIEsDCCApigAwIBAgIBADANBgkqhkiG9w0BAQUFADATMREwDwYDVQQDEwgxMC4wLjEuNDAeFw0x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</ds:X509Certificate></ds:X509Data></ds:KeyInfo><xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData><xenc:ReferenceList><xenc:DataReference URI="#_9e8fd2ce4ad0212c98e7091ca8765fb4"/></xenc:ReferenceList></xenc:EncryptedKey></saml2:EncryptedAssertion></saml2p:Response>', + RelayState: '', + }, + config: { + entryPoint: 'https://frontapp.oktapreview.com/app/frontdev584714_front_1/exk7xdi6axPfombzx0h7/sso/saml', + cert: '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', + decryptionPvk: fs.readFileSync(__dirname + '/static/testshib encryption pvk.pem') + }, + expectedStatusCode: 200, + expectedNameIDStartsWith: 'xavier', + mockDate: '2016-08-19T01:15:32.681Z' + }, { name: 'Onelogin -- invalid cert (from Okta case) should fail', samlResponse: { SAMLResponse: 'PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0\r\nYzpTQU1MOjIuMDphc3NlcnRpb24iIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6\r\nbmFtZXM6dGM6U0FNTDoyLjA6cHJvdG9jb2wiIElEPSJSNjg5YjA3MzNiY2Nj\r\nYTIyYTEzN2UzNjU0ODMwMzEyMzMyOTQwYjFiZSIgVmVyc2lvbj0iMi4wIiBJ\r\nc3N1ZUluc3RhbnQ9IjIwMTQtMDUtMjhUMDA6MTY6MDhaIiBEZXN0aW5hdGlv\r\nbj0ie3JlY2lwaWVudH0iIEluUmVzcG9uc2VUbz0iX2E2ZmM0NmJlODRlMWUz\r\nY2YzYzUwIj48c2FtbDpJc3N1ZXI+aHR0cHM6Ly9hcHAub25lbG9naW4uY29t\r\nL3NhbWwvbWV0YWRhdGEvMzcxNzU1PC9zYW1sOklzc3Vlcj48c2FtbHA6U3Rh\r\ndHVzPjxzYW1scDpTdGF0dXNDb2RlIFZhbHVlPSJ1cm46b2FzaXM6bmFtZXM6\r\ndGM6U0FNTDoyLjA6c3RhdHVzOlN1Y2Nlc3MiLz48L3NhbWxwOlN0YXR1cz48\r\nc2FtbDpBc3NlcnRpb24geG1sbnM6eHM9Imh0dHA6Ly93d3cudzMub3JnLzIw\r\nMDEvWE1MU2NoZW1hIiB4bWxuczp4c2k9Imh0dHA6Ly93d3cudzMub3JnLzIw\r\nMDEvWE1MU2NoZW1hLWluc3RhbmNlIiBWZXJzaW9uPSIyLjAiIElEPSJwZngz\r\nYjYzYzdiZS1mZTg2LTYyZmQtOGNiNS0xNmFiNjI3M2VmYWEiIElzc3VlSW5z\r\ndGFudD0iMjAxNC0wNS0yOFQwMDoxNjowOFoiPjxzYW1sOklzc3Vlcj5odHRw\r\nczovL2FwcC5vbmVsb2dpbi5jb20vc2FtbC9tZXRhZGF0YS8zNzE3NTU8L3Nh\r\nbWw6SXNzdWVyPjxkczpTaWduYXR1cmUgeG1sbnM6ZHM9Imh0dHA6Ly93d3cu\r\ndzMub3JnLzIwMDAvMDkveG1sZHNpZyMiPjxkczpTaWduZWRJbmZvPjxkczpD\r\nYW5vbmljYWxpemF0aW9uTWV0aG9kIEFsZ29yaXRobT0iaHR0cDovL3d3dy53\r\nMy5vcmcvMjAwMS8xMC94bWwtZXhjLWMxNG4jIi8+PGRzOlNpZ25hdHVyZU1l\r\ndGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1s\r\nZHNpZyNyc2Etc2hhMSIvPjxkczpSZWZlcmVuY2UgVVJJPSIjcGZ4M2I2M2M3\r\nYmUtZmU4Ni02MmZkLThjYjUtMTZhYjYyNzNlZmFhIj48ZHM6VHJhbnNmb3Jt\r\ncz48ZHM6VHJhbnNmb3JtIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcv\r\nMjAwMC8wOS94bWxkc2lnI2VudmVsb3BlZC1zaWduYXR1cmUiLz48ZHM6VHJh\r\nbnNmb3JtIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS8xMC94\r\nbWwtZXhjLWMxNG4jIi8+PC9kczpUcmFuc2Zvcm1zPjxkczpEaWdlc3RNZXRo\r\nb2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRz\r\naWcjc2hhMSIvPjxkczpEaWdlc3RWYWx1ZT5EQ25QVFFZQmIxaEtzcGJlNmZn\r\nMVUzcTh4bjQ9PC9kczpEaWdlc3RWYWx1ZT48L2RzOlJlZmVyZW5jZT48L2Rz\r\nOlNpZ25lZEluZm8+PGRzOlNpZ25hdHVyZVZhbHVlPmUwK2FGb21BMCtKQVkw\r\nZjl0S3F6SXVxSVZTU3c3TGlGVXNuZUVES1BCV2RpVHoxc01kZ3IvMnkxZTkr\r\ncmphUzJtUm1DaS92U1FMWTN6VFl6MGhwNm5KTlUxOStUV29YbzlrSFF5V1Q0\r\nS2tlUUw0WHMvZ1ovQW9LQzIwaUhWS3RwUHBzMElRME1sL3FSb291U2l0dDZT\r\nZi9XRHoyTFYvcFdjSDJoeDV0djN4U3czNmhLMk5RYzdxdzdyMW1FWG52Y2pY\r\nUmVZbzhyclZmN1hIR0d4Tm9SSUVJQ1VJaTExMHV2c1dlbVNYZjBaMGR5YjBG\r\nVllPV3VTc1FNRGx6TnBoZUFEQmlmRk80VVRmU0VoRlp2bjhrVkNHWlVJd3Ji\r\nT2haMmQvK1lFdGd5dVRnK3F0c2xnZnk0ZHdkNFR2RWNmdVJ6UVRhemVlZnBy\r\nU0Z5aVFja0FYT2pjdz09PC9kczpTaWduYXR1cmVWYWx1ZT48ZHM6S2V5SW5m\r\nbz48ZHM6WDUwOURhdGE+PGRzOlg1MDlDZXJ0aWZpY2F0ZT5NSUlFRnpDQ0F2\r\nK2dBd0lCQWdJVUZKc1VqUE03QW1Xdk50RXZVTFNIbFRUTWlMUXdEUVlKS29a\r\nSWh2Y05BUUVGQlFBd1dERUxNQWtHQTFVRUJoTUNWVk14RVRBUEJnTlZCQW9N\r\nQ0ZOMVluTndZV05sTVJVd0V3WURWUVFMREF4UGJtVk1iMmRwYmlCSlpGQXhI\r\nekFkQmdOVkJBTU1Gazl1WlV4dloybHVJRUZqWTI5MWJuUWdOREl6TkRrd0ho\r\nY05NVFF3TlRFek1UZ3dOakV5V2hjTk1Ua3dOVEUwTVRnd05qRXlXakJZTVFz\r\nd0NRWURWUVFHRXdKVlV6RVJNQThHQTFVRUNnd0lVM1ZpYzNCaFkyVXhGVEFU\r\nQmdOVkJBc01ERTl1WlV4dloybHVJRWxrVURFZk1CMEdBMVVFQXd3V1QyNWxU\r\nRzluYVc0Z1FXTmpiM1Z1ZENBME1qTTBPVENDQVNJd0RRWUpLb1pJaHZjTkFR\r\nRUJCUUFEZ2dFUEFEQ0NBUW9DZ2dFQkFLckF6SmRZOUZ6Rkx0NWJsQXJKZlB6\r\nZ2k4N0VuRkdsVGZjVjVUMVRVRHdMQmxEa1kvMFpHS25NT3BmM0Q3aWUyQzRw\r\nUEZPSW1Pb2djTTVrcERETDdxeFRYWjFld1hWeWpCZE11MjlORzJDNk56V2VR\r\nVFVNVWppMDFFY0hrQzhvK1B0czhBTmlOT1ljanhFZXloRXl6SktnRWl6YmxZ\r\nek1NS3pkck9FVDZRdXFXbzNDODNLKzUrNWRzakRuMW9vS0dSd2ozSHZnc1lj\r\nRnJRbDlOb2pnUUZqb29id3NpRS83QStPSmhMcEJjeS9uU1Znbm9KYU1mck8r\r\nSnNudWtaUHp0Ym50THZPbDU2K1ZyYTBOOG41TkFZaGFTYXlQaXYvYXloalZn\r\namZYZDF0ak1WVE9pRGtuVU93aXpadUoxWTNRSDk0dlV0QmdwMFdCcEJTcy94\r\nTXlUczhDQXdFQUFhT0IyRENCMVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFV\r\nZERnUVdCQlJRTzRXcE01Zld3eGliNDlXVHVKa2ZZRGJ4T0RDQmxRWURWUjBq\r\nQklHTk1JR0tnQlJRTzRXcE01Zld3eGliNDlXVHVKa2ZZRGJ4T0tGY3BGb3dX\r\nREVMTUFrR0ExVUVCaE1DVlZNeEVUQVBCZ05WQkFvTUNGTjFZbk53WVdObE1S\r\nVXdFd1lEVlFRTERBeFBibVZNYjJkcGJpQkpaRkF4SHpBZEJnTlZCQU1NRms5\r\ndVpVeHZaMmx1SUVGalkyOTFiblFnTkRJek5EbUNGQlNiRkl6ek93SmxyemJS\r\nTDFDMGg1VTB6SWkwTUE0R0ExVWREd0VCL3dRRUF3SUhnREFOQmdrcWhraUc5\r\ndzBCQVFVRkFBT0NBUUVBQ2REQUFvYVpGQ0VZNXBtZndiS3VLclh0TzVpRThs\r\nV3RpQ1BqQ1pFVXVUNmJYUk5jcXJkbnVWL0VBZlg5V1FvWGphbFBpMGVNNzh6\r\nS21idlJHU1RVSHdXdzQ5UkhqRmZlSlVLdkhOZU5uRmdUWERqRVBOaE12aDY5\r\na0htNDUzbEZSbUIra2s2eWp0WFJaYVFFd1M4VXVvMk90K2tyZ05ibDZvVEJa\r\nSjBBSEgxTXRaRUNEbG9tczFLbTd6c0s4d0FpNWk4VFZJS2tWcjViMlZsaHJM\r\nZ0ZNdnpaNVZpQXhJTUdCNnc0N3lZNFFHUUIvNVE4eWE5aEJzOXZrbit3dWJB\r\nK3lyNGoxNEpYWjdibFZLRFNUWXZhNjVFYStQcUh5cnArV25tbmJ3Mk9iUzdp\r\nV2V4aVR5MWpEM0cwUjJhdkRCRmpNOEZqNURiZnVmc0UxYjBVMTBSVHRnPT08\r\nL2RzOlg1MDlDZXJ0aWZpY2F0ZT48L2RzOlg1MDlEYXRhPjwvZHM6S2V5SW5m\r\nbz48L2RzOlNpZ25hdHVyZT48c2FtbDpTdWJqZWN0PjxzYW1sOk5hbWVJRCBG\r\nb3JtYXQ9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDpuYW1laWQtZm9y\r\nbWF0OnRyYW5zaWVudCI+cGxvZXJAc3Vic3BhY2Vzdy5jb208L3NhbWw6TmFt\r\nZUlEPjxzYW1sOlN1YmplY3RDb25maXJtYXRpb24gTWV0aG9kPSJ1cm46b2Fz\r\naXM6bmFtZXM6dGM6U0FNTDoyLjA6Y206YmVhcmVyIj48c2FtbDpTdWJqZWN0\r\nQ29uZmlybWF0aW9uRGF0YSBOb3RPbk9yQWZ0ZXI9IjIwMTQtMDUtMjhUMDA6\r\nMTk6MDhaIiBSZWNpcGllbnQ9IntyZWNpcGllbnR9IiBJblJlc3BvbnNlVG89\r\nIl9hNmZjNDZiZTg0ZTFlM2NmM2M1MCIvPjwvc2FtbDpTdWJqZWN0Q29uZmly\r\nbWF0aW9uPjwvc2FtbDpTdWJqZWN0PjxzYW1sOkNvbmRpdGlvbnMgTm90QmVm\r\nb3JlPSIyMDE0LTA1LTI4VDAwOjEzOjA4WiIgTm90T25PckFmdGVyPSIyMDE0\r\nLTA1LTI4VDAwOjE5OjA4WiI+PHNhbWw6QXVkaWVuY2VSZXN0cmljdGlvbj48\r\nc2FtbDpBdWRpZW5jZT57YXVkaWVuY2V9PC9zYW1sOkF1ZGllbmNlPjwvc2Ft\r\nbDpBdWRpZW5jZVJlc3RyaWN0aW9uPjwvc2FtbDpDb25kaXRpb25zPjxzYW1s\r\nOkF1dGhuU3RhdGVtZW50IEF1dGhuSW5zdGFudD0iMjAxNC0wNS0yOFQwMDox\r\nNjowN1oiIFNlc3Npb25Ob3RPbk9yQWZ0ZXI9IjIwMTQtMDUtMjlUMDA6MTY6\r\nMDhaIiBTZXNzaW9uSW5kZXg9Il8zMGE0YWY1MC1jODJiLTAxMzEtZjhiNS03\r\nODJiY2I1NmZjYWEiPjxzYW1sOkF1dGhuQ29udGV4dD48c2FtbDpBdXRobkNv\r\nbnRleHRDbGFzc1JlZj51cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YWM6\r\nY2xhc3NlczpQYXNzd29yZFByb3RlY3RlZFRyYW5zcG9ydDwvc2FtbDpBdXRo\r\nbkNvbnRleHRDbGFzc1JlZj48L3NhbWw6QXV0aG5Db250ZXh0Pjwvc2FtbDpB\r\ndXRoblN0YXRlbWVudD48L3NhbWw6QXNzZXJ0aW9uPjwvc2FtbHA6UmVzcG9u\r\nc2U+Cgo=\r\n' @@ -165,7 +179,7 @@ describe( 'passport-saml /', function() { should.exist(passedRequest); passedRequest.url.should.eql('/login'); passedRequest.method.should.eql('POST'); - passedRequest.body.should.eql(check.samlResponse); + should(passedRequest.body).match(check.samlResponse); } else { should.not.exist(passedRequest); } @@ -193,52 +207,52 @@ describe( 'passport-saml /', function() { { name: "Empty Config", config: {}, result: { - 'samlp:AuthnRequest': - { '$': + 'samlp:AuthnRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Version: '2.0', ProtocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', AssertionConsumerServiceURL: 'http://localhost:3033/login', Destination: 'https://wwwexampleIdp.com/saml'}, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'onelogin_saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], - 'samlp:NameIDPolicy': - [ { '$': + 'samlp:NameIDPolicy': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Format: 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress', AllowCreate: 'true' } } ], - 'samlp:RequestedAuthnContext': - [ { '$': + 'samlp:RequestedAuthnContext': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Comparison: 'exact' }, - 'saml:AuthnContextClassRef': + 'saml:AuthnContextClassRef': [ { _: 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ] } ] } } }, { name: "Empty Config w/ HTTP-POST binding", config: { authnRequestBinding: 'HTTP-POST' }, result: { - 'samlp:AuthnRequest': - { '$': + 'samlp:AuthnRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Version: '2.0', ProtocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', AssertionConsumerServiceURL: 'http://localhost:3033/login', Destination: 'https://wwwexampleIdp.com/saml'}, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'onelogin_saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], - 'samlp:NameIDPolicy': - [ { '$': + 'samlp:NameIDPolicy': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Format: 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress', AllowCreate: 'true' } } ], - 'samlp:RequestedAuthnContext': - [ { '$': + 'samlp:RequestedAuthnContext': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Comparison: 'exact' }, - 'saml:AuthnContextClassRef': + 'saml:AuthnContextClassRef': [ { _: 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ] } ] } } }, @@ -250,9 +264,9 @@ describe( 'passport-saml /', function() { attributeConsumingServiceIndex: 123, forceAuthn: false }, - result: { - 'samlp:AuthnRequest': - { '$': + result: { + 'samlp:AuthnRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Version: '2.0', ProtocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', @@ -260,19 +274,19 @@ describe( 'passport-saml /', function() { AttributeConsumingServiceIndex: '123', Destination: 'https://wwwexampleIdp.com/saml', IsPassive: 'true'}, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'http://exampleSp.com/saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], - 'samlp:NameIDPolicy': - [ { '$': + 'samlp:NameIDPolicy': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Format: 'alternateIdentifier', AllowCreate: 'true' } } ], - 'samlp:RequestedAuthnContext': - [ { '$': + 'samlp:RequestedAuthnContext': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Comparison: 'exact' }, - 'saml:AuthnContextClassRef': + 'saml:AuthnContextClassRef': [ { _: 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ] } ] } } }, @@ -284,9 +298,9 @@ describe( 'passport-saml /', function() { attributeConsumingServiceIndex: 123, skipRequestCompression: true }, - result: { - 'samlp:AuthnRequest': - { '$': + result: { + 'samlp:AuthnRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Version: '2.0', ProtocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', @@ -294,19 +308,19 @@ describe( 'passport-saml /', function() { AttributeConsumingServiceIndex: '123', Destination: 'https://wwwexampleIdp.com/saml', IsPassive: 'true' }, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'http://exampleSp.com/saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], - 'samlp:NameIDPolicy': - [ { '$': + 'samlp:NameIDPolicy': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Format: 'alternateIdentifier', AllowCreate: 'true' } } ], - 'samlp:RequestedAuthnContext': - [ { '$': + 'samlp:RequestedAuthnContext': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Comparison: 'exact' }, - 'saml:AuthnContextClassRef': + 'saml:AuthnContextClassRef': [ { _: 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ] } ] } } }, @@ -320,9 +334,9 @@ describe( 'passport-saml /', function() { disableRequestedAuthnContext: true, forceAuthn: true }, - result: { - 'samlp:AuthnRequest': - { '$': + result: { + 'samlp:AuthnRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Version: '2.0', ProtocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', @@ -331,11 +345,11 @@ describe( 'passport-saml /', function() { Destination: 'https://wwwexampleIdp.com/saml', IsPassive: 'true', ForceAuthn: 'true' }, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'http://exampleSp.com/saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], - 'samlp:NameIDPolicy': - [ { '$': + 'samlp:NameIDPolicy': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Format: 'alternateIdentifier', AllowCreate: 'true' } } ] } } @@ -348,9 +362,9 @@ describe( 'passport-saml /', function() { attributeConsumingServiceIndex: 123, authnContext: 'myAuthnContext' }, - result: { - 'samlp:AuthnRequest': - { '$': + result: { + 'samlp:AuthnRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Version: '2.0', ProtocolBinding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST', @@ -358,19 +372,19 @@ describe( 'passport-saml /', function() { AttributeConsumingServiceIndex: '123', Destination: 'https://wwwexampleIdp.com/saml', IsPassive: 'true'}, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'http://exampleSp.com/saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], - 'samlp:NameIDPolicy': - [ { '$': + 'samlp:NameIDPolicy': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Format: 'alternateIdentifier', AllowCreate: 'true' } } ], - 'samlp:RequestedAuthnContext': - [ { '$': + 'samlp:RequestedAuthnContext': + [ { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', Comparison: 'exact' }, - 'saml:AuthnContextClassRef': + 'saml:AuthnContextClassRef': [ { _: 'myAuthnContext', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ] } ] } } } @@ -393,7 +407,7 @@ describe( 'passport-saml /', function() { }) ); - app.get( '/login', + app.get( '/login', passport.authenticate( "saml", { samlFallback: 'login-request', session: false } ), function(req, res) { res.status(200).send("200 OK"); @@ -458,16 +472,16 @@ describe( 'passport-saml /', function() { describe( 'saml.js / ', function() { it( 'generateLogoutRequest', function( done ) { - var expectedRequest = { - 'samlp:LogoutRequest': - { '$': + var expectedRequest = { + 'samlp:LogoutRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion', //ID: '_85ba0a112df1ffb57805', Version: '2.0', //IssueInstant: '2014-05-29T03:32:23Z', Destination: 'foo' }, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'onelogin_saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], 'saml:NameID': [ { _: 'bar', '$': { Format: 'foo' } } ] } }; @@ -488,16 +502,16 @@ describe( 'passport-saml /', function() { }); it( 'generateLogoutRequest adds the NameQualifier and SPNameQualifier to the saml request', function( done ) { - var expectedRequest = { - 'samlp:LogoutRequest': - { '$': + var expectedRequest = { + 'samlp:LogoutRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion', //ID: '_85ba0a112df1ffb57805', Version: '2.0', //IssueInstant: '2014-05-29T03:32:23Z', Destination: 'foo' }, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'onelogin_saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], 'saml:NameID': [ { _: 'bar', '$': { Format: 'foo', @@ -522,9 +536,9 @@ describe( 'passport-saml /', function() { }); it( 'generateLogoutResponse', function( done ) { - var expectedResponse = { - 'samlp:LogoutResponse': - { '$': + var expectedResponse = { + 'samlp:LogoutResponse': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion', //ID: '_d11b3c5e085b2417f4aa', @@ -546,21 +560,21 @@ describe( 'passport-saml /', function() { }); it( 'generateLogoutRequest', function( done ) { - var expectedRequest = { - 'samlp:LogoutRequest': - { '$': + var expectedRequest = { + 'samlp:LogoutRequest': + { '$': { 'xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol', 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion', //ID: '_85ba0a112df1ffb57805', Version: '2.0', //IssueInstant: '2014-05-29T03:32:23Z', Destination: 'foo' }, - 'saml:Issuer': + 'saml:Issuer': [ { _: 'onelogin_saml', '$': { 'xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion' } } ], 'saml:NameID': [ { _: 'bar', '$': { Format: 'foo' } } ], - 'saml2p:SessionIndex': - [ { _: 'session-id', + 'saml2p:SessionIndex': + [ { _: 'session-id', '$': { 'xmlns:saml2p': 'urn:oasis:names:tc:SAML:2.0:protocol' } } ] } }; var samlObj = new SAML( { entryPoint: "foo" } ); @@ -722,7 +736,7 @@ describe( 'passport-saml /', function() { }); it('accept response with an attributeStatement element without attributeValue', function(done) { - var container = { + var container = { SAMLResponse : fs.readFileSync( __dirname + '/static/response-with-uncomplete-attribute.xml' ).toString('base64')