Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1) curl -v -k http://localhost:8000/service_provider/login
- 2) Extracting the SAML message from the response:
- curl --user username:password -v -k https://localhost:9443/samlsso?SAMLRequest=<ENCODED_REQUEST>
- 1.Get login form
- Request
- curl -v http://localhost:8000/service_provider/login
- Response
- Extract SAMLRequest and SSOAuthSessionID (if RelayState presents extract it too)
- 2.Send saml request to IDP using extracted valuses in step1(In browser this will happen through redirection)
- Request
- Endpoint : https://<is_host>:9443/samlsso
- Verb :post
- Content-Type:application/x-www-form-urlencoded
- Parameters:[
- SAMLRequest:<value from previous step>,
- SSOAuthSessionID:<value from previous step>,
- RelayState :<value from previous step>]
- Response
- This will give IS login page.Extract sessionDataKey from that.
- 3. Login by providing user name password
- Reqeust
- Endpoint:https://<is_host>:9443/commonauth
- Content-Type:application/x-www-form-urlencoded
- Verb :post
- Parameters: [tocommonauth:true,username:xxxx,password:xxx,sessionDataKey:<extracted from previous step>]
- Response
- Extract SAML response
- 5.Post the saml resposne to ACS url of service provider
Add Comment
Please, Sign In to add comment