PHP Classes

File: web/SSO/SAML/saml2/sp/initSSO.php

Recommend this page to a friend!
  Classes of william amed   Raptor 2   web/SSO/SAML/saml2/sp/initSSO.php   Download  
File: web/SSO/SAML/saml2/sp/initSSO.php
Role: Example script
Content type: text/plain
Description: Example script
Class: Raptor 2
Framework that takes routes from annotations
Author: By
Last change:
Date: 8 years ago
Size: 6,318 bytes
 

Contents

Class file image Download
<?php

/**
 * WARNING:
 *
 * THIS FILE IS DEPRECATED AND WILL BE REMOVED IN FUTURE VERSIONS
 *
 * @deprecated
 */

require_once('../../_include.php');

$config = SimpleSAML_Configuration::getInstance();
$metadata = SimpleSAML_Metadata_MetaDataStorageHandler::getMetadataHandler();
$session = SimpleSAML_Session::getSessionFromRequest();

SimpleSAML_Logger::warning('The file saml2/sp/initSSO.php is deprecated and will be removed in future versions.');

SimpleSAML_Logger::info('SAML2.0 - SP.initSSO: Accessing SAML 2.0 SP initSSO script');

if (!
$config->getBoolean('enable.saml20-sp', TRUE))
    throw new
SimpleSAML_Error_Error('NOACCESS');

/*
 * Incomming URL parameters
 *
 * idpentityid optional The entityid of the wanted IdP to authenticate with. If not provided will use default.
 * spentityid optional The entityid of the SP config to use. If not provided will use default to host.
 * RelayState required Where to send the user back to after authentication.
 */

if (empty($_GET['RelayState'])) {
    throw new
SimpleSAML_Error_Error('NORELAYSTATE');
}
$returnTo = SimpleSAML_Utilities::checkURLAllowed($_GET['RelayState']);

$reachableIDPs = array();

try {

   
$idpentityid = isset($_GET['idpentityid']) ? $_GET['idpentityid'] : $config->getString('default-saml20-idp', NULL) ;
   
$spentityid = isset($_GET['spentityid']) ? $_GET['spentityid'] : $metadata->getMetaDataCurrentEntityID();

   
$isPassive = isset($_GET['IsPassive']) && ($_GET['IsPassive'] === 'true' || $_GET['IsPassive'] === '1');
   
$forceAuthn = isset($_GET['ForceAuthn']) && ($_GET['ForceAuthn'] === 'true' || $_GET['ForceAuthn'] === '1');

   
/* We are going to need the SP metadata to determine which IdP discovery service we should use.
       And for checking for scoping parameters. */
   
$spmetadata = $metadata->getMetaDataCurrent('saml20-sp-hosted');

   
$IDPList = array();

   
/* Configured idp overrides one given by Scope */
   
if($idpentityid === NULL && array_key_exists('idpentityid', $spmetadata)) {
       
$idpentityid = $spmetadata['idpentityid'];
    }

   
/* AuthId is set if we are on the sp side on a proxy/bridge */
   
$authid = isset($_GET['AuthId']) ? $_GET['AuthId'] : FALSE;
    if (
$authid) {
       
$authrequestcache = $session->getAuthnRequest('saml2', $authid);
       
$isPassive = $isPassive || $authrequestcache['IsPassive'];
       
$forceAuthn = $forceAuthn || $authrequestcache['ForceAuthn'];

       
/* keep the IDPList, it MUST be sent it to the next idp,
           we are only allowed to add idps */
       
if (isset($authrequestcache['IDPList']) && is_array($authrequestcache['IDPList'])) {
           
$IDPList = $authrequestcache['IDPList'];
        }
        if (
$idpentityid === NULL) {
           
/* only consider ProviderIDs we know ... */
   
           
$reachableIDPs = array_intersect($IDPList, array_keys($metadata->getList()));

            if (
sizeof($reachableIDPs) === 1) {
               
$idpentityid = array_shift($reachableIDPs);
            }
        }
    }
   

} catch (
Exception $exception) {
    throw new
SimpleSAML_Error_Error('METADATA', $exception);
}

/*
 * If no IdP can be resolved, send the user to the SAML 2.0 Discovery Service
 */
if ($idpentityid === NULL) {

   
SimpleSAML_Logger::info('SAML2.0 - SP.initSSO: No chosen or default IdP, go to SAML2disco');

   
/* Which IdP discovery service should we use? Can be set in SP metadata or in global configuration.
     * Falling back to builtin discovery service.
     */

   
if(array_key_exists('idpdisco.url', $spmetadata)) {
       
$discourl = $spmetadata['idpdisco.url'];
    } elseif(
$config->getString('idpdisco.url.saml20', NULL) !== NULL) {
       
$discourl = $config->getString('idpdisco.url.saml20');
    } else {
       
$discourl = SimpleSAML_Utilities::getBaseURL() . 'saml2/sp/idpdisco.php';
    }

   
$extDiscoveryStorage = $config->getString('idpdisco.extDiscoveryStorage', NULL);
    if (
$extDiscoveryStorage !== NULL) {
       
SimpleSAML_Utilities::redirectTrustedURL($extDiscoveryStorage, array(
           
'entityID' => $spentityid,
           
'return' => SimpleSAML_Utilities::addURLparameter($discourl, array(
               
'return' => SimpleSAML_Utilities::selfURL(),
               
'remember' => 'true',
               
'entityID' => $spentityid,
               
'returnIDParam' => 'idpentityid',
            )),
           
'returnIDParam' => 'idpentityid',
           
'isPassive' => 'true')
        );
    }

   
$discoparameters = array(
       
'entityID' => $spentityid,
       
'return' => SimpleSAML_Utilities::selfURL(),
       
'returnIDParam' => 'idpentityid');
       
   
$discoparameters['isPassive'] = $isPassive;
   
    if (
sizeof($reachableIDPs) > 0) {
       
$discoparameters['IDPList'] = $reachableIDPs;
    }

   
SimpleSAML_Utilities::redirectTrustedURL($discourl, $discoparameters);
}


/*
 * Create and send authentication request to the IdP.
 */
try {

   
$spMetadata = $metadata->getMetaDataConfig($spentityid, 'saml20-sp-hosted');
   
$idpMetadata = $metadata->getMetaDataConfig($idpentityid, 'saml20-idp-remote');

   
$ar = sspmod_saml_Message::buildAuthnRequest($spMetadata, $idpMetadata);

   
$assertionConsumerServiceURL = $metadata->getGenerated('AssertionConsumerService', 'saml20-sp-hosted');
   
$ar->setAssertionConsumerServiceURL($assertionConsumerServiceURL);
   
$ar->setRelayState($returnTo);

    if (
$isPassive) {
       
$ar->setIsPassive(TRUE);
    }
    if (
$forceAuthn) {
       
$ar->setForceAuthn(TRUE);
    }

    if(
array_key_exists('IDPList', $spmetadata)) {
       
$IDPList = array_unique(array_merge($IDPList, $spmetadata['IDPList']));
    }
   
    if (isset(
$_GET['IDPList']) && !empty($_GET['IDPList'])) {
       
$providers = $_GET['IDPList'];
        if (!
is_array($providers)) $providers = array($providers);
       
$IDPList = array_merge($IDPList, $providers);
    };
   
$ar->setIDPList($IDPList);

   
/* Save request information. */
   
$info = array();
   
$info['RelayState'] = $returnTo;
    if(
array_key_exists('OnError', $_REQUEST)) {
       
$info['OnError'] = SimpleSAML_Utilities::checkURLAllowed($_REQUEST['OnError']);
    }
   
$session->setData('SAML2:SP:SSO:Info', $ar->getId(), $info);

   
/* Select appropriate SSO endpoint */
   
if ($ar->getProtocolBinding() === SAML2_Const::BINDING_HOK_SSO) {
       
$dst = $idpMetadata->getDefaultEndpoint('SingleSignOnService', array(SAML2_Const::BINDING_HOK_SSO));
    } else {
       
$dst = $idpMetadata->getDefaultEndpoint('SingleSignOnService', array(SAML2_Const::BINDING_HTTP_REDIRECT, SAML2_Const::BINDING_HTTP_POST));
    }
   
$ar->setDestination($dst['Location']);

   
$b = SAML2_Binding::getBinding($dst['Binding']);
   
$b->send($ar);

} catch(
Exception $exception) {
    throw new
SimpleSAML_Error_Error('CREATEREQUEST', $exception);
}