Replies: 2 comments 2 replies
-
@SkunSHD Your question is duplicate at least all of these:
See also e.g.:
source: #863 (comment) It seems that you posted auth response as-is without any modifications. Doing so might open up some attack vectors see this: #816 (comment) TL;DR; you are using |
Beta Was this translation helpful? Give feedback.
-
Hmm I've just stumbled into this issue myself as I'm trying to use this module for SAML with JumpCloud as the IdP. @SkunSHD were you able to resolve this issue? From my preliminary glance, it doesn't look like response level signature is enforced as part of JumpCloud IdP (you can see in the above screenshot as well that there is only an option to check |
Beta Was this translation helpful? Give feedback.
-
Why the signature can't be found?
I've checked the code during execution and saw that signatures was empty:
passport-saml/src/node-saml/saml.ts
Lines 710 to 712 in 6ba76ba
Because an ID from Response didn't match URI from Reference
an excerpt from it:
Content ofxpathSigQuery variable:
const xpathSigQuery = './/*[local-name(.)='Signature' and namespace-uri(.)='http://www.w3.org/2000/09/xmldsig#' and descendant::*[local-name(.)='Reference' and @URI='#K0WO32GJF96P5SJBU9I5V0YI53OBOCIUSG6G4RX9']]'
Content of fullXml argument:
passport-saml config:
app.js
routes.js
package.json
I use jumploud as an idP
Beta Was this translation helpful? Give feedback.
All reactions