Guest User

Untitled

a guest
Feb 7th, 2018
93
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.14 KB | None | 0 0
  1. 1) curl -v -k http://localhost:8000/service_provider/login
  2. 2) Extracting the SAML message from the response:
  3. curl --user username:password -v -k https://localhost:9443/samlsso?SAMLRequest=<ENCODED_REQUEST>
  4.  
  5. 1.Get login form
  6.  
  7. Request
  8. curl -v http://localhost:8000/service_provider/login
  9.  
  10. Response
  11. Extract SAMLRequest and SSOAuthSessionID (if RelayState presents extract it too)
  12.  
  13. 2.Send saml request to IDP using extracted valuses in step1(In browser this will happen through redirection)
  14.  
  15. Request
  16. Endpoint : https://<is_host>:9443/samlsso
  17. Verb :post
  18. Content-Type:application/x-www-form-urlencoded
  19. Parameters:[
  20. SAMLRequest:<value from previous step>,
  21. SSOAuthSessionID:<value from previous step>,
  22. RelayState :<value from previous step>]
  23.  
  24. Response
  25. This will give IS login page.Extract sessionDataKey from that.
  26.  
  27. 3. Login by providing user name password
  28.  
  29. Reqeust
  30. Endpoint:https://<is_host>:9443/commonauth
  31. Content-Type:application/x-www-form-urlencoded
  32. Verb :post
  33. Parameters: [tocommonauth:true,username:xxxx,password:xxx,sessionDataKey:<extracted from previous step>]
  34.  
  35. Response
  36. Extract SAML response
  37.  
  38. 5.Post the saml resposne to ACS url of service provider
Add Comment
Please, Sign In to add comment