Certificate file ldap-server.crt does not exist - shibboleth

when I tried Single Sign on to the wso2 API manager using the shibboleth IDP as the federated Identity provider,
a login error occurred as
ldap-server.crt doesn't exist.
Can you give me any Suggestions?

I am not much aware of Shibboleth IDP however i have used other SSO's and what i did was to import the certificates .crt in client-truststore.jks file.So have you tried importing the certificate ldap-server.crt in client-trustore.jks file .Hope this gives you an idea

Related

How do I ensure a SAML Assertion's Identity Provider with an embedded X509 Certificate is Legitimate?

I am trying to implement a SAML Service Provider in order to allow for SSO to a cloud-based application, this application can host multiple tenants or companies. Normally, the user enters an e-mail address (which acts as their User ID) and their password to log in (the tenant would be identified by a URL parameter).
The SAML assertion that is received has the X509 certificate embedded in the payload, which is used to validate the signature of the SAML. While the signature can be used to verify that the assertion is valid, there is concern that someone other than the Identity Provider can generate their own public/private keys, sign their own assertion with a correctly "guessed" valid tenant ID and user e-mail address, then potentially gain access to the application.
What is a mechanism or technique used to identify that an assertion and its embedded certificate came from a specific identity provider other than the information contained inside the SAML payload? While I have read that certificates could be downloaded from identity providers, there is concern that those certificates would expire or become revoked, and additionally, we would also have to store them on our side. There is a legitimate concern that these scenarios would cause downtime for users.
One other small question, as we require a tenant ID to determine which tenant is signing on a particular user account, is it common (or proper) to provide that identifier through the URI, such as in the URL path or as a parameter on our endpoint receiving the SAML assertion?
SAML Trust
When you implement your SAML SP, you will be asked to pre-configure the signing certificate of your target SAML IdP. Therefore, your SP will only trust any incoming assertions signed with that particular signing certificate.
SAML Configuration
Configuration of a SAML SP can be done by setting up all IdP parameters including signing certificate manually, or by specifying a metadata file which contains all IdP parameters, including the signing certificate.
You may download the metadata file from IdP and use it locally in your SAML SP, or specify the URL of the metadata file and let your SAML SP to download and use it.
You may refer to Azure AD's SAML metadata URL as an example:
https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml
Obviously, this URL should be TLS/SSL protected and its content should only be modified by the IdP.
SAML Signing Certificate Rotation
When a signing certificate is rotated, the trust between IdP and SP is lost. You will need to re-configure your SP to trust the new certificate directly or refreshing the metadata file.
If you choose to configure your SAML SP by specifying an IdP metadata URL, you may consider configuring your SAML SP library to download and refresh the metadata regularly from IdP.
In this way, your SAML SP will have a trusted way to validate the latest signing certificate even though the certificate might be changed.

Get Authorization fail in creating certificate of let's encrypt

I would like to create certificate of let's encrypt.
but I keep getting this error as image.
Can someone help me to give any idea for this?
Thank you.
As it is mentioned in a provided screenshot, the temporary token file, which Let's Encrypt is using to verify the domain name ownership, should be reachable from the net.
In this case, the request from Let's Encrypt servers to this temporary file fails because A record the domain cannot be found.
In other words, it is not possible to get Let's Encrypt certificate while DNS is not properly configured.
Here is the more detailed explanation of the authorization procedure - https://letsencrypt.org/how-it-works/

How to import SP self signed certificate to OpenAm tomcat server for digital signature validation?

I have an Enterprise App which is acting as SP(Service Provider) and an OpenAm app acting as IdP(Identity Provider).
In SP, I have created a self-signed certificate for digital signature to communicate with OpenAM for SSO.
SP digitally signs and initiates the request, but In OpenAm i am getting 'The SAML Request is invalid' error. I think this is because of the absence of certificate in OpenAM tomcat server.
I have already tried creating the Key Store and adding my Self Signed certificate to it.
Questions
How to import SP self-signed certificate in tomcat for digital signature validation?
How validation is happening in OpenAm?
Check yr openam config directory (eg ~/openam/openam). This directory contains the keystore file used by OpenAM.
keytool -list -keystore ~/openam13/openam/keystore.jks

CXF STS client throws Request does not contain Security header/Response message does not contain WS-Addressing properties [duplicate]

When adding an STS reference, I input the my windows azure federation metadata URL and it gives me the error in the title. It works if I create a new namespace, but a lot of stuff is configured on the current namespace, so I can't delete it.
So for anyone that would get this error, it's a simple fix.
You need a X.509 certificate configured as primary in your ACS namespace.
To do this you go under your acs configurations, in certificates and keys then you add a X.509 by uploading a .pfx file to the server and entering the password.
You might also need a symmetric key also set as primary depending on your configuration.

Why are there no WS-Security/WS-Policy declarations in the Amazon EC2 WSDL?

The AWS EC2 SOAP API documentation discusses securing the SOAP message using the WS-Security standard (specifically the X509 token profile).
However, the WSDL linked from the page doesn't have any WS-Security/WS-Policy declarations. What am I missing? Is the requirement to use X509 meant to be conveyed completely out-of-band through this documentation? That seems odd. I noticed that the WSDL was updated 2012-06-01 - is it possible that the WS-Security requirement has been relaxed?
You'll need to request a certificate for SOAP operations under your Amazon account. It will provide two files (private key and cert, both are PEM files).
Follow this link, login if needed and take a look into the "Access Credentials
" section. There's a "X.509 Certificates" tab, where you can download existing certificates or create a new one.

Resources