PHP Classes

File: web/SSO/modules/saml/www/sp/saml1-acs.php

Recommend this page to a friend!
  Classes of william amed   Raptor 2   web/SSO/modules/saml/www/sp/saml1-acs.php   Download  
File: web/SSO/modules/saml/www/sp/saml1-acs.php
Role: Example script
Content type: text/plain
Description: Example script
Class: Raptor 2
Framework that takes routes from annotations
Author: By
Last change:
Date: 8 years ago
Size: 2,870 bytes
 

Contents

Class file image Download
<?php

if (!array_key_exists('SAMLResponse', $_REQUEST) && !array_key_exists('SAMLart', $_REQUEST)) {
    throw new
SimpleSAML_Error_BadRequest('Missing SAMLResponse or SAMLart parameter.');
}

if (!
array_key_exists('TARGET', $_REQUEST)) {
    throw new
SimpleSAML_Error_BadRequest('Missing TARGET parameter.');
}

$sourceId = $_SERVER['PATH_INFO'];
$end = strpos($sourceId, '/', 1);
if (
$end === FALSE) {
   
$end = strlen($sourceId);
}
$sourceId = substr($sourceId, 1, $end - 1);

$source = SimpleSAML_Auth_Source::getById($sourceId, 'sspmod_saml_Auth_Source_SP');

SimpleSAML_Logger::debug('Received SAML1 response');

$target = (string)$_REQUEST['TARGET'];

if (
preg_match('@^https?://@i', $target)) {
   
/* Unsolicited response. */
   
$state = array(
       
'saml:sp:isUnsolicited' => TRUE,
       
'saml:sp:AuthId' => $sourceId,
       
'saml:sp:RelayState' => SimpleSAML_Utilities::checkURLAllowed($target),
    );
} else {
   
$stateID = $_REQUEST['TARGET'];

   
// sanitize the input
   
$sid = SimpleSAML_Utilities::parseStateID($stateID);
    if (!
is_null($sid['url'])) {
       
SimpleSAML_Utilities::checkURLAllowed($sid['url']);
    }

   
$state = SimpleSAML_Auth_State::loadState($stateID, 'saml:sp:sso');

   
/* Check that the authentication source is correct. */
   
assert('array_key_exists("saml:sp:AuthId", $state)');
    if (
$state['saml:sp:AuthId'] !== $sourceId) {
        throw new
SimpleSAML_Error_Exception('The authentication source id in the URL does not match the authentication source which sent the request.');
    }

   
assert('isset($state["saml:idp"])');
}

$spMetadata = $source->getMetadata();

if (
array_key_exists('SAMLart', $_REQUEST)) {
    if (!isset(
$state['saml:idp'])) {
       
/* Unsolicited response. */
       
throw new SimpleSAML_Error_Exception('IdP initiated authentication not supported with the SAML 1.1 SAMLart protocol.');
    }
   
$idpMetadata = $source->getIdPMetadata($state['saml:idp']);

   
$responseXML = SimpleSAML_Bindings_Shib13_Artifact::receive($spMetadata, $idpMetadata);
   
$isValidated = TRUE; /* Artifact binding validated with ssl certificate. */
} elseif (array_key_exists('SAMLResponse', $_REQUEST)) {
   
$responseXML = $_REQUEST['SAMLResponse'];
   
$responseXML = base64_decode($responseXML);
   
$isValidated = FALSE; /* Must check signature on response. */
} else {
   
assert('FALSE');
}

$response = new SimpleSAML_XML_Shib13_AuthnResponse();
$response->setXML($responseXML);

$response->setMessageValidated($isValidated);
$response->validate();

$responseIssuer = $response->getIssuer();
$attributes = $response->getAttributes();

if (isset(
$state['saml:idp']) && $responseIssuer !== $state['saml:idp']) {
    throw new
SimpleSAML_Error_Exception('The issuer of the response wasn\'t the destination of the request.');
}

$logoutState = array(
   
'saml:logout:Type' => 'saml1'
   
);
$state['LogoutState'] = $logoutState;

$source->handleResponse($state, $responseIssuer, $attributes);
assert('FALSE');

?>