SAML2和角色{urn:oasis:names:tc:SAML:2.0:metadata} SPSSODescriptor未找到

时间:2015-07-09 11:42:57

标签: single-sign-on saml-2.0

在创建新的服务提供商元数据时,我得到以下错误:

org opensaml saml2元数据提供程序MetadataProviderException:实体urn的元数据:com:saml:poc:tshah和role {urn:oasis:names:tc:SAML:2.0:metadata} SPSSODescriptor未找到

我有带应用程序的默认/模板SP元数据文件

Security-Config.xml文件结构如下

我已经按照以前的一些帖子提供了步骤。

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   

            <!-- SP (current application) Metadata configuration -->
            <bean class="org.springframework.security.saml.metadata.ExtendedMetadataDelegate">
                <constructor-arg>
                    <bean class="org.opensaml.saml2.metadata.provider.ResourceBackedMetadataProvider">
                        <constructor-arg>
                            <bean class="java.util.Timer"/>
                        </constructor-arg>
                        <constructor-arg>
                            <bean class="org.opensaml.util.resource.ClasspathResource">
                                <constructor-arg value="${spring.security.saml.sp.metadata.file.location}"/>
                            </bean>
                        </constructor-arg>
                        <property name="parserPool" ref="parserPool"/>
                    </bean>
                </constructor-arg>
                <constructor-arg>
                    <bean class="org.springframework.security.saml.metadata.ExtendedMetadata">
                        <property name="local" value="true"/>
                        <property name="alias" value="TestSAML"/>
                        <property name="securityProfile" value="metaiop"/>                  
                        <!-- <property name="sslHostnameVerification" value="allowAll"/>  -->                   
                        <property name="signMetadata" value="false"/>
                        <property name="signingKey" value="${spring.security.saml.java.keystore.cert.alias}"/>
                        <property name="encryptionKey" value="${spring.security.saml.java.keystore.cert.alias}"/> 
                        <property name="requireArtifactResolveSigned" value="false"/>
                        <property name="requireLogoutRequestSigned" value="false"/>
                        <property name="requireLogoutResponseSigned" value="false"/>
                        <property name="idpDiscoveryEnabled" value="false"/>                            
                    </bean>
                </constructor-arg>
            </bean>   

        </list>
    </constructor-arg>

    <!-- OPTIONAL used when one of the metadata files contains information about this service provider -->
    <property name="hostedSPName" value="urn:com:saml:poc:tshah"/>
    <!-- OPTIONAL property: can tell the system which IDP should be used for authenticating user by default. -->
    <!-- <property name="defaultIDP" value="http://localhost:8080/opensso"/> -->
</bean>

0 个答案:

没有答案