single-sign-onsamlsaml-2.0adfscomponent-space

What is the correct format for SAML 2.0 Assertions?


We have a customer trying to use ADFS to SSO on to our web application. We are using the ComponentSpace SAML 2.0 library. The assertion being sent to us looks like:

<Assertion ID="_b8a24809-ab6b-4acd-ad6a-8bcb97bb1889" IssueInstant="2012-05-24T13:30:33.917Z" Version="2.0" xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
    <Issuer>http://example.com/adfs/services/trust</Issuer>
    <Subject>
        <NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">mail@example.com</NameID>
        <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
            <SubjectConfirmationData NotOnOrAfter="2012-05-24T13:35:33.920Z" Recipient="https://example.com/default.aspx" />
        </SubjectConfirmation>
    </Subject>
    <Conditions NotBefore="2012-05-24T13:30:33.907Z" NotOnOrAfter="2012-05-24T14:30:33.907Z">
        <AudienceRestriction>
            <Audience>https://example.com</Audience>
        </AudienceRestriction>
    </Conditions>
    <AttributeStatement>
        <Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress">
            <AttributeValue>mail@example.com</AttributeValue>
        </Attribute>
    </AttributeStatement>
    <AuthnStatement AuthnInstant="2012-05-24T13:30:33.756Z" SessionIndex="_b8a24809-ab6b-4acd-ad6a-8bcb97bb1889">
        <AuthnContext>
                <AuthnContextClassRef>urn:federation:authentication:windows</AuthnContextClassRef>
        </AuthnContext>
    </AuthnStatement>
</Assertion>

The ComponentSpace library is pulling the full SamlResponse from the HTTP post but it reports no Assertions (ie samlResponse.GetAssertions().Count == 0). If I use the ComponentSpace examples it works but I notice all of the elements I build with the ComponentSpace library are prefixed with "saml:" (as I believe it should be).

Should the ComponentSpace library be able to find the Assertion without the saml: prefix or is there a way to configure ADFS to send it correctly?


Solution

  • It turns out that the above XML is valid (ADFS adds the namespace to the overall XML but not each element). The problem was that the ComponentSpace library has different methods for getting Signed or Encrypted Assertions and I was just calling the generic GetAssertions. ADFS was generating signed assertions and I needed to call the other function.

    Here is the code we ended up with:

    IList<EncryptedAssertion> encryptedAssertions = samlResponse.GetEncryptedAssertions();
    if (encryptedAssertions.Count > 0 && x509Certificate != null) {
    
        // Decrypt the assertion
        EncryptedAssertion encryptedAssertion = encryptedAssertions[0];
        XmlElement decryptedElement = encryptedAssertion.DecryptToXml(x509Certificate, null);
        LogMessage("Decrypted assertion: " + decryptedElement.OuterXml);
    
        // Then verify the signature.
        VerifySignature(x509Certificate, decryptedElement);
        samlAssertion = new SAMLAssertion(decryptedElement);
    } else {
    
        if (samlResponse.GetSignedAssertions().Count > 0) {
            // Get the signed assertion and verify the signature.
            XmlElement signedAssertionElement = samlResponse.GetSignedAssertions()[0];
            LogMessage("Signed assertion: " + signedAssertionElement.OuterXml);
    
            VerifySignature(x509Certificate, signedAssertionElement);
            samlAssertion = new SAMLAssertion(signedAssertionElement);
        } else {
            // Assertion is not encrypted or signed.
            if (samlResponse.GetAssertions().Count > 0) {
                samlAssertion = samlResponse.GetAssertions()[0];
                LogMessage("Assertion: " + samlAssertion.ToXml().OuterXml);
            } else {
                LogFatalError("No assertions in response");
            }
        }
    }