mace-opensaml-users - Re: [OpenSAML] client side auth
Subject: OpenSAML user discussion
List archive
- From: Brent Putman <>
- To:
- Subject: Re: [OpenSAML] client side auth
- Date: Sat, 20 Mar 2010 01:23:28 -0400
On 3/20/2010 12:53 AM, rangeli nepal wrote:
Well, correct, the browser can not do client TLS auth to the IdP using the SP's cert. When you are doing front-channel, note that the SP and IdP are not communicating directly, at the transport level. There are actually 2 legs of the transport there: SP to browser and then browser to IdP. So the SP can't present its cert to the IdP directly, and the vice versa. If what you are asking is: in front-channel binding, how can the IdP authenticate the SP's SAML protocol message - the answer there is usually that the SP signs the message and the IdP validates. In addition to the integrity property, the digital signature also conveys authentication of the signer. So that's usually how an SP authenticates itself to the IdP over a front-channel binding. That's basically using message-level security (vs. transport level, for example TLS). The same is also true in the reverse direction - the IdP signs the response and/or assertion it issues, and the SP is able to authenticate the message by validating the signature. --Brent
|
- client side auth, rangeli nepal, 03/19/2010
- Re: [OpenSAML] client side auth, Brent Putman, 03/19/2010
- Re: [OpenSAML] client side auth, rangeli nepal, 03/20/2010
- Re: [OpenSAML] client side auth, Brent Putman, 03/20/2010
- Re: [OpenSAML] client side auth, rangeli nepal, 03/20/2010
- Re: [OpenSAML] client side auth, Brent Putman, 03/19/2010
Archive powered by MHonArc 2.6.16.