Initial Project Commit

This commit is contained in:
Orlando M Guerreiro 2025-05-22 19:23:40 +01:00
commit a6dea9c888
2148 changed files with 173870 additions and 0 deletions

View file

@ -0,0 +1,56 @@
# ===================================================================
# This was my first implementation of SAML2. Using standard application.yml
# This was a SUCCESS. Then, I change it to be more dynamic
# Keep this has a reference
# ===================================================================
spring:
security:
saml2: # ADDED to support SAMLv2 authentication to IDP.
relyingparty:
registration:
mock-idp:
assertingparty:
entity-id: http://localhost:3000/saml/metadata
single-sign-on:
url: http://localhost:3000/saml/sso
single-logout:
url: http://localhost:3000/saml/slo
verification:
credentials:
- certificate-location: classpath:saml/idp-public.cert
want-authn-signed: false # Validate signature in entire message response (true-validates/false-doesn't validate)
want-assertion-signed: true # Validate signature in assertions message response (true-validates/false-doesn't validate)
signing:
credentials:
- private-key-location: classpath:saml/private.key
certificate-location: classpath:saml/public.cert
# ===================================================================
# This is the NEW WAY
# Custom Resilient configuration, that is loaded by saml2RelyingPartyRegistrationRepository.class
# and then, registered and configured in SecurityFilterChain
# ===================================================================
resilient:
security:
saml2: # ADDED to support SAMLv2 authentication to IDP.
enabled: true
relyingparty:
registration:
mock-idp:
assertingparty:
entity-id: http://localhost:3000/saml/metadata
single-sign-on:
url: http://localhost:3000/saml/sso
single-logout:
url: http://localhost:3000/saml/slo
verification:
credentials:
- certificate-location: classpath:saml/idp-public.cert
want-authn-signed: false # Validate signature in entire message response (true-validates/false-doesn't validate)
want-assertion-signed: true # Validate signature in assertions message response (true-validates/false-doesn't validate)
signing:
credentials:
- private-key-location: classpath:saml/private.key
certificate-location: classpath:saml/public.cert