Git Product home page Git Product logo

kombit's Introduction

KOMBIT

KOMBIT Støttesystemer

Project Test Environment

The sample applications are externally available in the Project Test Environment.

Test Services

Context Handler

https://adgangsstyring.projekt-stoettesystemerne.dk/CHTestSigningService

Security Token Service

STS Test Stub

The STS test stub simulates processing requests and sending responses for a WS-Trust call which a user system (Anvendersystem) can send. The STS Test Stub will perform syntax and security validation of the received token request, and return a proper response.

The main URL of the STS test stub is:

https://adgangsstyring.projekt-stoettesystemerne.dk/STS

WSDL for the STS test stub can be downloaded here:

https://adgangsstyring.projekt-stoettesystemerne.dk/STS/kombit/sts/mex?wsdl

STS Test Signing Service

The STS test signing service can be called with a previously issued SAML assertion as input, and will reply with an updated version of the SAML assertion in which the following elements are updated:

  • Id
  • Timestamp
  • Signature

The STS test signing service is available here:

https://adgangsstyring.projekt-stoettesystemerne.dk/STSTestSigningService

Sample Applications

.Net Sample Applications

https://adgangsstyring.projekt-stoettesystemerne.dk/Consumer

Java STS Sample Applications

https://adgangsstyring.projekt-stoettesystemerne.dk/Consumer/ServiceConsumer

kombit's People

Contributors

ctthang avatar strandbygaard avatar

Stargazers

 avatar

Watchers

 avatar  avatar  avatar  avatar

kombit's Issues

Allow self signed certificates

As-is, the token signing certificate for an upstream IdP must be issued by a third party CA. The token signing certificate cannot be self signed.

Since the trust model ensures secure metadata exchange between upstream IdP and context handler, there's no need to enforce a trust model, where token signing certificate is issued by a third party trusted intermediary. The token signing certificate could just as well be self signed.

Using self signed certificates has some benefits:

  • Many municipalities already use self signed certificates, so they wouldn't have to make any changes.
  • It can reduce the frequency of certificate changes.
  • It costs less.

On the other hand, there's significant political value in requiring that DanID certificates are used.

Send UID as separate claim in addition to encoding in Subject

As-is, UID has to be encoded in the x509subjectname string in the SAML2 subject element. That means that (1) upstream IdP has to use string concatenation to create the x509subjectname including the mandatory uid, and (2) downstream user system must parse the text string to get the uid.

It would simplify configuration of the upstream IdP, if it could simply send a claim with the UID value.

On the other hand, it would mean sending redundant information in the token, and the subject field really is meant to send the user's unique id.

Option to send JFR as individual claims instead of encoding in OIO BPP

Currently, JFR have to be sent from upstream IdP to context handler encoded in an OIO BPP xml structure.

It could simplify configuration of upstream IdP if JFR could be sent as individual claims instead of being encoded in OIO BPP. Then it wouldn't be necessary to configure a custom claims transformation to generate the OIO BPP xml from JFR values on the upstream IdP.

This feature is mostly relevant to municipalities, that don't use dynamic data restrictions, and where the data restrictions are statically configured on context handler.

Deactive SSO and keep Context Handler stateless

SSO is a problem with SAML2 scoping to upstream IdP, because the upstream IdP will only send JFR for the US the user is logging in to. When the user then get's SSO to another US, then the original token from upstream IdP will not contain JFR for the second US.

Effectively that means, that if context handler uses SSO, the the token from upstream IdP must contain all JFR.

Since the user normally has SSO with upstream IdP (e.g. municipality or NemLog-In) disabling SSO would have limited impact on the end users.

On the positive side, disabling SSO on context handler would make it possible to use scoping upstream IdP, and would reduce the memory pressure of CH, which would increase the performance. This would be most noticeable with STSI-680 because of its requirement to keep bootstrap token in memory.

Option to include data restrictions with JFR in OIO-BPP from upstream IdP

As-is, data restrictions (DA) have to be sent as individual claims from upstream stream IdP. That means that the namespace of DA have global scope, and different types have to be used for each DA in each role mapping. E.g. the type of a KLE DA must be different between two role mappings.

If DA are included as part of OIO-BPP sent from upstream IdP to CH, then DA can be implicitly scoped for the JFR in the same privilege group. That means the same type can be used for a KLE DA regardless of which role mapping the DA is being used in.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.