| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869 | = SAML 2.0 Refreshable MetadataThis guide provides instructions on setting up this SAML 2.0 Login & Logout sample application.It uses https://simplesamlphp.org/[SimpleSAMLphp] as its asserting party.The sample application uses Spring Boot and the `spring-security-saml2-service-provider`module which is new in Spring Security 5.2.The https://docs.spring.io/spring-security/reference/servlet/saml2/logout.html[SAML 2.0 Logout feature] is new in Spring Security 5.6.== Run the Sample=== Install DockerThis sample requires Docker to run a local IdP.As an alternative, you can point the sample at your own IdP by changing the `application.yml` here:[source,java]----saml2:  ap.metadata: {your-idp-metadata-endpoint}----=== Start up the Sample Boot Application``` ./gradlew :servlet:spring-boot:java:saml2:refreshable-metadata:bootRun```=== Open a Browserhttp://localhost:8080/You will be redirected to the SimpleSAMLPHP instance.=== Type in your credentials```User: user1Password: user1pass```== Goals=== SAML 2.0 Login`saml2Login()` provides a very simple implementation of a Service Provider that can receive a SAML 2.0 Response via the HTTP-POST and HTTP-REDIRECT bindings against the https://developer.okta.com/docs/guides/build-sso-integration/saml2/main/[Okta SAML 2.0 IDP] reference implementation.The following features are implemented in the MVP:1. Receive and validate a SAML 2.0 Response containing an assertion, and create a corresponding authentication in Spring Security2. Send a SAML 2.0 AuthNRequest to an Identity Provider3. Provide a framework for components used in SAML 2.0 authentication that can be swapped by configuration4. Work against the Okta SAML 2.0 IDP reference implementation=== SAML 2.0 Single Logout`saml2Logout()` supports RP- and AP-initiated SAML 2.0 Single Logout via the HTTP-POST and HTTP-REDIRECT bindings against the https://developer.okta.com/docs/guides/build-sso-integration/saml2/main/[Okta SAML 2.0 IDP] reference implementation.On this sample, the SAML 2.0 Logout is using the HTTP-POST binding.You can refer to the https://docs.spring.io/spring-security/reference/servlet/saml2/logout.html[reference documentation] for more details about the RP- and AP-initiated SAML 2.0 Logout.=== Refreshable Asserting Party MetadataThe application uses a custom implementation of `RelyingPartyRegistrationRepository` to achieve Asserting Party Metadata refresh feature.This particular implementation relies on an OpenSAML component that refreshes the metadata.
 |