xcompass

shibd log

Jun 28th, 2021
21
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.70 KB | None | 0 0
  1. 2021-06-25 23:24:18 DEBUG Shibboleth.Listener [374] [default]: dispatching message (default/Login::run::SAML2SI)
  2. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [374] [default]: SQLPrepare succeeded. SQL: INSERT INTO strings VALUES (?,?,{ts '2021-06-25 23:34:18'},1,?)
  3. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [374] [default]: SQLBindParam succeeded (context = RelayState)
  4. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [374] [default]: SQLBindParam succeeded (key = 7d3ac1aec1f68a11955ced785944a188465f3b1d0eb63ce4de28a000f728b90c)
  5. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [374] [default]: SQLBindParam succeeded (value = https://elearning.xxxxx.ca/auth/shibboleth/index.php?errorcode=4)
  6. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [374] [default]: SQLExecute of insert succeeded
  7. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageEncoder.SAML2Redirect [374] [default]: validating input
  8. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageEncoder.SAML2 [374] [default]: tracking request (_307a407529c4eaa99a4d3a35998586cb) against RelayState token (ss:db:7d3ac1aec1f68a11955ced785944a188465f3b1d0eb63ce4de28a000f728b90c)
  9. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageEncoder.SAML2Redirect [374] [default]: marshalling, deflating, base64-encoding the message
  10. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageEncoder.SAML2Redirect [374] [default]: marshalled message:
  11. <samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" AssertionConsumerServiceURL="https://elearning.xxxxx.ca/Shibboleth.sso/SAML2/POST" Destination="https://xxxxx.ca/simplesaml/saml2/idp/SSOService.php" ID="_307a407529c4eaa99a4d3a35998586cb" IssueInstant="2021-06-25T23:24:18Z" ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Version="2.0"><saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">https://xxxxx.mdlprod.lms.it.ubc.ca</saml:Issuer><samlp:NameIDPolicy AllowCreate="1"/></samlp:AuthnRequest>
  12. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageEncoder.SAML2Redirect [374] [default]: signing the message
  13. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageEncoder.SAML2Redirect [374] [default]: message encoded, sending redirect to client
  14. 2021-06-25 23:24:18 DEBUG Shibboleth.Listener [1985] [default]: dispatching message (default/SAML2/POST)
  15. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageDecoder.SAML2POST [1985] [default]: validating input
  16. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageDecoder.SAML2POST [1985] [default]: decoded SAML message:
  17. <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_6b952a2ad5a985fff62c94db06b6af223e945fe60c" Version="2.0" IssueInstant="2021-06-25T23:24:18Z" Destination="https://elearning.xxxxx.ca/Shibboleth.sso/SAML2/POST" InResponseTo="_307a407529c4eaa99a4d3a35998586cb"><saml:Issuer>https://xxxxx.ca/simplesaml/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  18. <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
  19. <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  20. <ds:Reference URI="#_6b952a2ad5a985fff62c94db06b6af223e945fe60c"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>TRX/UgU/JiKaocysJVN6kGhrIwMaMOGpTk2u583nj7Q=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
  21. <ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_f7da37653cdd7811a24b21c05178f387da5a94e055" Version="2.0" IssueInstant="2021-06-25T23:24:18Z"><saml:Issuer>https://xxxxx.ca/simplesaml/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  22. <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
  23. <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  24. <ds:Reference URI="#_f7da37653cdd7811a24b21c05178f387da5a94e055"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>qwONoohahcgWpHK5WECIL5f9MtZjUwbLka68ol7yyN0=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
  25. <ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIERDCCAqwCCQCNIapZe2OZAzANBgkqhkiG9w0BAQsFADBkMQswCQYDVQQGEwJDQTEZMBcGA1UECAwQQnJpdGlzaCBDb2x1bWJpYTESMBAGA1UEBwwJVmFuY291dmVyMRAwDgYDVQQKDAdVQkMgQ1BEMRQwEgYDVQQDDAsqLnViY2NwZC5jYTAeFw0yMDExMjcyMDIxMDFaFw0zMDExMjcyMDIxMDFaMGQxCzAJBgNVBAYTAkNBMRkwFwYDVQQIDBBCcml0aXNoIENvbHVtYmlhMRIwEAYDVQQHDAlWYW5jb3V2ZXIxEDAOBgNVBAoMB1VCQyBDUEQxFDASBgNVBAMMCyoudWJjY3BkLmNhMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAl6uNDQCYRT0yfJeWRkxh6ydlRTyIq1EffvZaaBV7G/HGyJzM/T5EnBGVsW2h2ft8/wWM+2EHFgSYJOC3RwCbS1oLa8IfzzaTrDNsu6luOWh3ufTCzxZhqthp7IZWrh2+F3XTfD42vYWPbf2/xWSdJpQG50ljUzFd/KzOjYltdYio54iprt5DaFxQVJOzwAM7+ZTwG/IJIWvih+yoOLplUGmbkCN+jedrbhG5tXm//AghBiIT+mtdnPf3W5v+ORFcqWOb33qElpLH6hjxhi+uIrDIuzjMn+pUoA4/VseRVP58K+/W79aZLvBVVN/lzZQsM0SiY76ceaF2vDRD8CNEq4vyjdM1+fFKi3hwMgSJik6weLJ1V1ht+nHNHCV1A6tkFRXH+pEF5zt9Mp4fXE8M4Fvv8l0clG0hngrX7mPn+VNRg7Mhtj4t/CfyXiDJNwZegPBwgnHrtrehEfSsh7AKzdiesaXH6eG7tarUufky/qY8/BvtYfvOU24VmFZVvTbzAgMBAAEwDQYJKoZIhvcNAQELBQADggGBAGhJbSjXC1GseaPuem5eSteXlE+tuM7rBxWbgoneXzXzsabFWBYrravJ3o2tV1qy2qKqnrxktB9H5B4ZLM1JaNP34h2SvQa7qmkmPM5mSjDgAIYlIzLWOHwQKtTjKDUEC5CbAhA3NIcLCfoz1djy3PN/6Wxop1NFH8ssADMDOUAXuR9pDYKA8UbTipMCrLvjMmXp8ZcDA5JEbKLMDJgZnB6CEPH8w1qq/OJnss7SvhpsqdQlhdbTz/FTTb1APVD8DjmDavRkHVmjmUwkWtVEBSnbE4UDuDbY9yvOyLOGQ+JUOgQMm0aZqfOFuZOhTZ5/m/Y26engn4LuzszQHkJP5FevxsCDhOU2Q3+0lYGzAlBcY6+CYMANP0hRDHa2w1Zy5kZI5M6fwnaP+HNoCkmnUvVal9W0KFRYw4ijjCnpf/AT5witTTyD1JYwrda9LQ/bJ7WFrra/5IaffqMSztzjvvnJgY3wd1e4/64Q6zM/HUnDq2OI+a2sQ+cxJGuUd8kYng==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="https://xxxxx.mdlprod.xxxxx.ca" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_620c50258e571144e2e1841fcb782402b4d0fe7baa</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2021-06-25T23:29:18Z" Recipient="https://elearning.xxxxx.ca/Shibboleth.sso/SAML2/POST" InResponseTo="_307a407529c4eaa99a4d3a35998586cb"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2021-06-25T23:23:48Z" NotOnOrAfter="2021-06-25T23:29:18Z"><saml:AudienceRestriction><saml:Audience>https://xxxxx.mdlprod.xxxxx.ca</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2021-06-25T23:24:18Z" SessionNotOnOrAfter="2021-06-26T07:24:18Z" SessionIndex="_eaaee5bb54b298ee36b7cca968a707fc4310c53f2d"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">66575</saml:AttributeValue></saml:Attribute><saml:Attribute Name="name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">username@xxxx.ca</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">username@xxxx.ca</saml:AttributeValue></saml:Attribute><saml:Attribute Name="first_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">Lausername</saml:AttributeValue></saml:Attribute><saml:Attribute Name="last_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">O’Lee</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
  26. 2021-06-25 23:24:18 DEBUG XMLTooling.Signature [1985] [default]: unmarshalling ds:Signature
  27. 2021-06-25 23:24:18 DEBUG XMLTooling.Signature [1985] [default]: unmarshalling ds:Signature
  28. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageDecoder.SAML2 [1985] [default]: extracting issuer from SAML 2.0 protocol message
  29. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageDecoder.SAML2 [1985] [default]: message from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  30. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageDecoder.SAML2 [1985] [default]: searching metadata for message issuer...
  31. 2021-06-25 23:24:18 DEBUG OpenSAML.MessageDecoder.SAML2 [1985] [default]: no request/response correlation cookie found
  32. 2021-06-25 23:24:18 DEBUG OpenSAML.SecurityPolicyRule.MessageFlow [1985] [default]: evaluating message flow policy (correlation off, replay checking on, expiration 60)
  33. 2021-06-25 23:24:18 DEBUG OpenSAML.SecurityPolicyRule.MessageFlow [1985] [default]: ignoring InResponseTo, correlation checking is disabled
  34. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: SQL: SELECT version FROM strings WHERE context='MessageFlow' AND id='_6b952a2ad5a985fff62c94db06b6af223e945fe60c' AND expires > {ts '2021-06-25 23:24:18'}
  35. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: search returned no data (t=strings, c=MessageFlow, k=_6b952a2ad5a985fff62c94db06b6af223e945fe60c)
  36. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: SQLPrepare succeeded. SQL: INSERT INTO strings VALUES (?,?,{ts '2021-06-25 23:28:18'},1,?)
  37. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (context = MessageFlow)
  38. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (key = _6b952a2ad5a985fff62c94db06b6af223e945fe60c)
  39. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (value = x)
  40. 2021-06-25 23:24:18 DEBUG XMLTooling.StorageService [1985] [default]: SQLExecute of insert succeeded
  41. 2021-06-25 23:24:18 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [1985] [default]: validating signature profile
  42. 2021-06-25 23:24:18 DEBUG XMLTooling.TrustEngine.ExplicitKey [1985] [default]: attempting to validate signature with the peer's credentials
  43. 2021-06-25 23:24:18 DEBUG XMLTooling.TrustEngine.ExplicitKey [1985] [default]: signature validated with credential
  44. 2021-06-25 23:24:18 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [1985] [default]: signature verified against message issuer
  45. 2021-06-25 23:24:18 DEBUG Shibboleth.SSO.SAML2 [1985] [default]: processing message against SAML 2.0 SSO profile
  46. 2021-06-25 23:24:18 DEBUG Shibboleth.SSO.SAML2 [1985] [default]: extracting issuer from SAML 2.0 assertion
  47. 2021-06-25 23:24:18 DEBUG OpenSAML.SecurityPolicyRule.MessageFlow [1985] [default]: evaluating message flow policy (correlation off, replay checking on, expiration 60)
  48. 2021-06-25 23:24:18 DEBUG OpenSAML.SecurityPolicyRule.MessageFlow [1985] [default]: ignoring InResponseTo, correlation checking is disabled
  49. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQL: SELECT version FROM strings WHERE context='MessageFlow' AND id='_f7da37653cdd7811a24b21c05178f387da5a94e055' AND expires > {ts '2021-06-25 23:24:19'}
  50. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: search returned no data (t=strings, c=MessageFlow, k=_f7da37653cdd7811a24b21c05178f387da5a94e055)
  51. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLPrepare succeeded. SQL: INSERT INTO strings VALUES (?,?,{ts '2021-06-25 23:28:18'},1,?)
  52. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (context = MessageFlow)
  53. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (key = _f7da37653cdd7811a24b21c05178f387da5a94e055)
  54. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (value = x)
  55. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLExecute of insert succeeded
  56. 2021-06-25 23:24:19 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [1985] [default]: validating signature profile
  57. 2021-06-25 23:24:19 DEBUG XMLTooling.TrustEngine.ExplicitKey [1985] [default]: attempting to validate signature with the peer's credentials
  58. 2021-06-25 23:24:19 DEBUG XMLTooling.TrustEngine.ExplicitKey [1985] [default]: signature validated with credential
  59. 2021-06-25 23:24:19 DEBUG OpenSAML.SecurityPolicyRule.XMLSigning [1985] [default]: signature verified against message issuer
  60. 2021-06-25 23:24:19 DEBUG OpenSAML.SecurityPolicyRule.BearerConfirmation [1985] [default]: ignoring InResponseTo, correlation checking is disabled
  61. 2021-06-25 23:24:19 DEBUG OpenSAML.SecurityPolicyRule.BearerConfirmation [1985] [default]: assertion satisfied bearer confirmation requirements
  62. 2021-06-25 23:24:19 DEBUG Shibboleth.SSO.SAML2 [1985] [default]: SSO profile processing completed successfully
  63. 2021-06-25 23:24:19 DEBUG Shibboleth.SSO.SAML2 [1985] [default]: extracting pushed attributes...
  64. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeExtractor.XML [1985] [default]: unable to extract attributes, unknown XML object type: samlp:Response
  65. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeExtractor.XML [1985] [default]: skipping NameID with format (urn:oasis:names:tc:SAML:2.0:nameid-format:transient)
  66. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeExtractor.XML [1985] [default]: unable to extract attributes, unknown XML object type: saml:AuthnStatement
  67. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeDecoder.String [1985] [default]: decoding SimpleAttribute (uid) from SAML 2 Attribute (uid) with 1 value(s)
  68. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeDecoder.String [1985] [default]: decoding SimpleAttribute (name) from SAML 2 Attribute (name) with 1 value(s)
  69. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeDecoder.String [1985] [default]: decoding SimpleAttribute (mail) from SAML 2 Attribute (mail) with 1 value(s)
  70. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeDecoder.String [1985] [default]: decoding SimpleAttribute (first_name) from SAML 2 Attribute (first_name) with 1 value(s)
  71. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeDecoder.String [1985] [default]: decoding SimpleAttribute (last_name) from SAML 2 Attribute (last_name) with 1 value(s)
  72. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeFilter [1985] [default]: filtering 5 attribute(s) from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  73. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeFilter [1985] [default]: applying filtering rule(s) for attribute (last_name) from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  74. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeFilter [1985] [default]: applying filtering rule(s) for attribute (first_name) from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  75. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeFilter [1985] [default]: applying filtering rule(s) for attribute (mail) from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  76. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeFilter [1985] [default]: applying filtering rule(s) for attribute (name) from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  77. 2021-06-25 23:24:19 DEBUG Shibboleth.AttributeFilter [1985] [default]: applying filtering rule(s) for attribute (uid) from (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php)
  78. 2021-06-25 23:24:19 DEBUG Shibboleth.SessionCache [1985] [default]: creating new session
  79. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQL: SELECT version,CASE version WHEN 0 THEN null ELSE value END FROM texts WHERE context='Logout' AND id='_620c50258e571144e2e1841fcb782402b4d0fe7baa' AND expires > {ts '2021-06-25 23:24:19'}
  80. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: search returned no data (t=texts, c=Logout, k=_620c50258e571144e2e1841fcb782402b4d0fe7baa)
  81. 2021-06-25 23:24:19 DEBUG Shibboleth.SessionCache [1985] [default]: storing new session...
  82. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLPrepare succeeded. SQL: INSERT INTO texts VALUES (?,?,{ts '2021-06-26 01:24:19'},1,?)
  83. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (context = _5f2106d378fe00eb5877e78c6d35b975)
  84. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (key = session)
  85. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (value = <wddxPacket version="1.0" lowercase="no"><header/><data><struct name="_5f2106d378fe00eb5877e78c6d35b975"><var name="version"><number>1</number></var><var name="application_id"><string>default</string></var><var name="expires"><string>2021-06-26T01:24:18Z</string></var><var name="client_addr"><struct><var name="4"><string>137.82.124.22</string></var></struct></var><var name="entity_id"><string>https://xxxxx.ca/simplesaml/saml2/idp/metadata.php</string></var><var name="protocol"><string>urn:oasis:names:tc:SAML:2.0:protocol</string></var><var name="authn_instant"><string>2021-06-25T23:24:18Z</string></var><var name="session_index"><string>_eaaee5bb54b298ee36b7cca968a707fc4310c53f2d</string></var><var name="authncontext_class"><string>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</string></var><var name="nameid"><string>&lt;saml:NameID xmlns:saml=&quot;urn:oasis:names:tc:SAML:2.0:assertion&quot; Format=&quot;urn:oasis:names:tc:SAML:2.0:nameid-format:transient&quot; SPNameQualifier=&quot;https://xxxxx.mdlprod.xxxxx.ca&quot;&gt;_620c50258e571144e2e1841fcb782402b4d0fe7baa&lt;/saml:NameID&gt;</string></var><var name="attributes"><array length="5"><struct><var name="last_name"><array length="1"><string>O’Lee</string></array></var></struct><struct><var name="first_name"><array length="1"><string>Lausername</string></array></var></struct><struct><var name="mail"><array length="1"><string>username@xxxxx.ca</string></array></var></struct><struct><var name="name"><array length="1"><string>username@xxxxx.ca</string></array></var></struct><struct><var name="uid"><array length="1"><string>66575</string></array></var></struct></array></var></struct></data></wddxPacket>)
  86. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLExecute of insert succeeded
  87. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQL: SELECT version,expires,CASE version WHEN 0 THEN null ELSE value END FROM texts WHERE context='NameID' AND id='_620c50258e571144e2e1841fcb782402b4d0fe7baa' AND expires > {ts '2021-06-25 23:24:19'}
  88. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: search returned no data (t=texts, c=NameID, k=_620c50258e571144e2e1841fcb782402b4d0fe7baa)
  89. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLPrepare succeeded. SQL: INSERT INTO texts VALUES (?,?,{ts '2021-06-26 01:24:18'},1,?)
  90. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (context = NameID)
  91. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (key = _620c50258e571144e2e1841fcb782402b4d0fe7baa)
  92. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLBindParam succeeded (value = <wddxPacket version="1.0" lowercase="no"><header/><data><struct><var name="_eaaee5bb54b298ee36b7cca968a707fc4310c53f2d"><struct><var name="_5f2106d378fe00eb5877e78c6d35b975"><null/></var></struct></var></struct></data></wddxPacket>)
  93. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQLExecute of insert succeeded
  94. 2021-06-25 23:24:19 INFO Shibboleth.SessionCache [1985] [default]: new session created: ID (_5f2106d378fe00eb5877e78c6d35b975) IdP (https://xxxxx.ca/simplesaml/saml2/idp/metadata.php) Protocol(urn:oasis:names:tc:SAML:2.0:protocol) Address (137.82.124.22)
  95. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQL: SELECT version,CASE version WHEN 0 THEN null ELSE value END FROM strings WHERE context='RelayState' AND id='7d3ac1aec1f68a11955ced785944a188465f3b1d0eb63ce4de28a000f728b90c' AND expires > {ts '2021-06-25 23:24:19'}
  96. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1985] [default]: SQL: DELETE FROM strings WHERE context='RelayState' AND id='7d3ac1aec1f68a11955ced785944a188465f3b1d0eb63ce4de28a000f728b90c'
  97. 2021-06-25 23:24:19 DEBUG Shibboleth.SSO.SAML2 [1985] [default]: ACS returning via redirect to: https://elearning.xxxxx.ca/auth/shibboleth/index.php?errorcode=4
  98. 2021-06-25 23:24:19 DEBUG Shibboleth.Listener [1591] [default]: dispatching message (find::StorageService::SessionCache)
  99. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1591] [default]: SQL: SELECT version,expires,CASE version WHEN 0 THEN null ELSE value END FROM texts WHERE context='_5f2106d378fe00eb5877e78c6d35b975' AND id='session' AND expires > {ts '2021-06-25 23:24:19'}
  100. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1591] [default]: SQL: UPDATE strings SET expires = {ts '2021-06-26 01:24:19'} WHERE context='_5f2106d378fe00eb5877e78c6d35b975' AND expires > {ts '2021-06-25 23:24:19'}
  101. 2021-06-25 23:24:19 DEBUG XMLTooling.StorageService [1591] [default]: SQL: UPDATE texts SET expires = {ts '2021-06-26 01:24:19'} WHERE context='_5f2106d378fe00eb5877e78c6d35b975' AND expires > {ts '2021-06-25 23:24:19'}
  102.  
Add Comment
Please, Sign In to add comment