04 Dec, 2013

4 commits


21 Nov, 2013

1 commit


20 Nov, 2013

1 commit

  • For SAML logins the LoginServlet should detect the authentication session
    from the query string rather than using any existing cookies, that way we
    can make sure that the SAML authentication flow will stay on the server
    that stores the necessary request data to finish the SAML.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@7351 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     

19 Nov, 2013

1 commit


13 Nov, 2013

4 commits

  • SP Adapter is now invoked when the IdP Proxy sends the proxied SAML
    request.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@7280 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • New extension point for IdPAdapter that makes it possible to modify the
    SAML response before it's sent out.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@7278 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • The SLO code has been adjusted to cope with situations of having different
    sets of supported SLO bindings, and also handle the case when there is no
    "appropriate" binding for the current SLO process.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@7274 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • The SP initiated SLO process has been modified to only try to send SLO
    request with the SP the session is currently associated with.
    Also made a small adjustment to the code so failing to invalidate the local
    session no longer results in a logout error.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@7271 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     

08 Nov, 2013

1 commit


11 Oct, 2013

2 commits


08 Oct, 2013

1 commit


04 Oct, 2013

1 commit


03 Oct, 2013

3 commits


02 Oct, 2013

2 commits


25 Sep, 2013

2 commits


15 Sep, 2013

1 commit


04 Sep, 2013

1 commit


31 Aug, 2013

1 commit


19 Aug, 2013

1 commit


17 Aug, 2013

1 commit


15 Aug, 2013

3 commits

  • * Removing obsolete code
    * Moving lockhart to console
    * Separating out configurator and upgrade tool from openam-core
    * Moving LDIF files to their correct location
    * Removing unnecessary files
    * Fixing component builds after removing openam-locale
    * Updates based on review comments
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6286 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • * Moving resources to their correct locations
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6285 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • * Use commons-lang 2 consistently, and remove commons-lang3
    * Remove JMQ/JMS dependencies
    * Removing backport-util-concurrent
    * Aligning license headers
    * Moving amadmtools to openam-core for now (it may be extracted in the
    future, when all the CLI tools have their own modules)
    * Consolidating POMs
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6284 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     

12 Aug, 2013

1 commit


08 Aug, 2013

1 commit

  • This merge also includes changes for:
    * short reports were always generated when clicking on an actionlink, even
    though the report isn't actually displayed.
    
    * Implementation of OPENAM-1630
    SAML2 metadata signatures are now compliant with the specification.
    Within this change two new realm level option has been introduced:
    metadataSigningKey
    metadataSigningKeyPass
    These will tell OpenAM which private key to use for signing the SAML2
    metadata. In case the SAML entity is remote, OpenAM will try to maintain
    the original XML signature (if present), otherwise it will be signed with
    the configured key.
    
    * Fixing minor bug with configurator in case the system is already upgraded.
    The problem was that the request for upgrade.htm resulted in a redirect
    which has been automatically followed, so the final response code was 200,
    and that confused the configurator.
    
    * Fix for OPENAM-2710
    
    * Fix for OPENAM-2064
    Dashboard service has been extracted to a separate LDIF file and the schema
    is now available for all supported data store types.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6187 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     

07 Aug, 2013

1 commit


06 Aug, 2013

1 commit


04 Aug, 2013

1 commit

  • Adding extra null check to handle the case when the original AuthnRequest
    did not contain a NameIDPolicy element.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6122 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     

28 Jul, 2013

3 commits

  • Updated the property XML, so Local Site Properties button no longer throws
    error.
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6034 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • git-svn-id: https://svn.forgerock.org/openam/trunk@6028 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     
  • The solution involved following changes:
    * changed the way the login URL is being saved for forwarded request, now
    we only save the forwarded request parameters, hence the originally used
    parameters (like SAMLRequest) are no longer saved
    * changed the SAML redirectAuthentication implementation to include some
    extra request parameters for the goto URL, this way we can ensure that we
    can send back a SAML error response to the SP even when the AuthnRequest is
    no longer available.
    * In case the AuthnRequest is not available (by any means) now we send back
    a SAML error response to the SP instead of showing an HTTP-500
    
    git-svn-id: https://svn.forgerock.org/openam/trunk@6027 0f4defcf-c51a-4c67-9f44-6fb5eba73c5d
    peter.major
     

22 Jul, 2013

1 commit