Created
April 10, 2016 23:24
-
-
Save mefarazath/6404e8f0aa4426251a12fc48588d5ddd to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[2016-04-11 04:51:54,066] DEBUG {org.wso2.carbon.identity.authenticator.mutualssl.MutualSSLAuthenticator} - Server is not picking up the client certificate. Mutual SSL authentication is notdone | |
[2016-04-11 04:52:00,071] DEBUG {org.wso2.carbon.identity.authenticator.mutualssl.MutualSSLAuthenticator} - Server is not picking up the client certificate. Mutual SSL authentication is notdone | |
[2016-04-11 04:52:01,093] DEBUG {org.wso2.carbon.identity.sso.saml.servlet.SAMLSSOProviderServlet} - Query string : SAMLRequest=nZNPb9pAEMXv%2FRSrvYONgyq6wo4oKCpS2rrg5NDbsh7DJvvH3VkT8u27tiGiVYpQr%2BOZN29%2Fbzy9PWhF9uBQWpPS0TCmBIywpTTblD4Ud4MJvc0%2BTJFrVbNZ43dmBb8aQE9miOB8GJtbg40Gtwa3lwIeVvcp3XlfsyhSVnC1s%2BjZJJ7EkXd8D6Em%2FetQWB3trIbhE9aULIKiNNx3Ltph%2FGP603h8E7UeEC0ld9YJ6LyktOIKgZLlIqWmttWmrnUYKbeVlhtrtvJ5w7nlpRQbxZ93T5pD2405R5R7SKl3TVfABpYGPTc%2BpUk8%2BjiIx4NRXCQ3LElYHLiMxz8pyZ31Vlj1WZqeUOMMsxwlMsM1IPOCrWdf71kyjNmmb0L2pSjyQf59XVDyeCKdtKQDe4OsY3tZqj7updkxic6wu16An8Ki2V8hTKNzxV4%2Fqdm3ILFc5FZJ8UpmStmXuQPu34iFDDT3l5e2FVkOqq6V1e3T0YPxlKzzVv9Hw5WsJLiU9tvPiSTXIonePB8vE8ruNsJZejh4Mre65k5iSx0OXPj%2F2tIvYefKcxWorqA6k7s6hIttgolWOpTbM32xrmzvDkR4WeG4wdo638f2rp%2Bs%2F%2FYvINkp8fO%2FOfsN&access_token=75e38a543f9e60f46005514dc9984df9 | |
[2016-04-11 04:52:01,094] DEBUG {org.wso2.carbon.identity.sso.saml.util.SAMLSSOUtil} - Request message <?xml version="1.0" encoding="UTF-8"?> | |
<samlp:AuthnRequest AssertionConsumerServiceURL="http://localhost:8080/travelocity.com/home.jsp" Destination="https://localhost:9443/samlsso" ForceAuthn="false" ID="npofbppmlhodgfmibongikbaaoadicblakhjmaee" IsPassive="true" IssueInstant="2016-04-10T23:22:01.044Z" ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Version="2.0" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"><samlp:Issuer xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion">travelocity.com</samlp:Issuer><saml2p:NameIDPolicy AllowCreate="true" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" SPNameQualifier="Issuer" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"/><saml2p:RequestedAuthnContext Comparison="exact" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"><saml:AuthnContextClassRef xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef></saml2p:RequestedAuthnContext></samlp:AuthnRequest> | |
[2016-04-11 04:52:01,097] DEBUG {org.wso2.carbon.identity.sso.saml.validators.SPInitSSOAuthnRequestValidator} - Authentication Request Validation is successful.. | |
[2016-04-11 04:52:01,098] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - retrieving authentication request from cache.. | |
[2016-04-11 04:52:01,098] DEBUG {org.wso2.carbon.identity.application.authentication.framework.util.FrameworkUtils} - | |
Inbound Request parameters: | |
SAMLRequest={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} | |
access_token={75e38a543f9e60f46005514dc9984df9} | |
commonAuthCallerPath={/samlsso} | |
forceAuth={false} | |
passiveAuth={true} | |
relyingParty={travelocity.com} | |
tenantDomain={carbon.super} | |
[2016-04-11 04:52:01,098] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Initializing the flow | |
[2016-04-11 04:52:01,098] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Framework contextId: 91ef8f5e-96c9-4e6c-8e33-3ca4c50487ab | |
[2016-04-11 04:52:01,098] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Starting an authentication flow | |
[2016-04-11 04:52:01,099] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - commonAuthId cookie is available with the value: 500306ba-1706-4e13-a784-cef3bb94d4bf | |
[2016-04-11 04:52:01,100] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} - Cache Key not found for Random Password Container | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.cache.SessionContextCache} - Context ID : 500306ba-1706-4e13-a784-cef3bb94d4bf :: idleSessionTimeOut : 900000, currentTime : 1460330521101, lastAccessedTime : 1460325301854681339 | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.cache.SessionContextCache} - Found a valid session corresponding to the key : 500306ba-1706-4e13-a784-cef3bb94d4bf | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Service Provider is: travelocity.com | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - A previously authenticated sequence found for the SP: travelocity.com | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Already authenticated by username: alice | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Authenticated user tenant domain: carbon.super | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultRequestCoordinator} - Outbound Query String: access_token=75e38a543f9e60f46005514dc9984df9&commonAuthCallerPath=%2Fsamlsso&forceAuth=false&passiveAuth=true&tenantDomain=carbon.super&sessionDataKey=91ef8f5e-96c9-4e6c-8e33-3ca4c50487ab&relyingParty=travelocity.com&type=samlsso&sp=travelocity.com&isSaaSApp=false | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - In authentication flow | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - Starting the sequence | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - Force Authenticate : false | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - Re-Authenticate : false | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - Passive Authenticate : true | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - Executing the Request Path Authentication... | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - Executing OAuthRequestPathAuthenticator | |
[2016-04-11 04:52:01,101] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - OAuthRequestPathAuthenticator can handle the request | |
[2016-04-11 04:52:01,102] DEBUG {org.wso2.carbon.identity.oauth2.validators.TokenValidationHandler} - Access Token Info object was added back to the cache. | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.authenticator.requestpath.oauth.OAuthRequestPathAuthenticator} - Authenticated user alice | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - OAuthRequestPathAuthenticator.authenticate() returned: SUCCESS_COMPLETED | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - Authenticated User: alice | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - Authenticated User Tenant Domain: carbon.super | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.sequence.impl.DefaultRequestPathBasedSequenceHandler} - Handling Post Authentication tasks | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.common.util.IdentityApplicationManagementUtil} - JWT Header :{"typ":"JWT", "alg":"none"} | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.common.util.IdentityApplicationManagementUtil} - JWT Body :{"iss":"wso2","exp":14603305211043000,"iat":1460330521104,"idps":[{"idp":"LOCAL","authenticator":"OAuthRequestPathAuthenticator"}]} | |
[2016-04-11 04:52:01,104] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler} - Executing claim handler. isFederatedClaims = false and remote claims = [] | |
[2016-04-11 04:52:01,112] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler} - Returning claims from claim handler = [] | |
[2016-04-11 04:52:01,112] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler} - UNFILTERED_IDP_CLAIM_VALUES map property set to [] | |
[2016-04-11 04:52:01,113] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler} - UNFILTERED_LOCAL_CLAIM_VALUES map property set to [http://wso2.org/claims/username:alice,http://wso2.org/claims/role:SP_role,Application/travelocity.com,Internal/everyone,http://wso2.org/claims/fullname:alice,http://wso2.org/claims/lastname:alice,] | |
[2016-04-11 04:52:01,113] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.claims.impl.DefaultClaimHandler} - UNFILTERED_SP_CLAIM_VALUES map property set to [http://wso2.org/claims/username:alice,http://wso2.org/claims/role:SP_role,Application/travelocity.com,Internal/everyone,http://wso2.org/claims/fullname:alice,http://wso2.org/claims/lastname:alice,] | |
[2016-04-11 04:52:01,113] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - Concluding the Authentication Flow | |
[2016-04-11 04:52:01,114] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} - Cache Key not found for Random Password Container | |
[2016-04-11 04:52:01,114] DEBUG {org.wso2.carbon.identity.application.authentication.framework.cache.SessionContextCache} - Context ID : 500306ba-1706-4e13-a784-cef3bb94d4bf :: idleSessionTimeOut : 900000, currentTime : 1460330521114, lastAccessedTime : 1460325301854681339 | |
[2016-04-11 04:52:01,114] DEBUG {org.wso2.carbon.identity.application.authentication.framework.cache.SessionContextCache} - Found a valid session corresponding to the key : 500306ba-1706-4e13-a784-cef3bb94d4bf | |
[2016-04-11 04:52:01,115] DEBUG {org.wso2.carbon.identity.application.authentication.framework.store.SessionDataPersistTask} - Session Data persisting Task is started to run | |
[2016-04-11 04:52:01,117] DEBUG {org.wso2.carbon.identity.application.authentication.framework.handler.request.impl.DefaultAuthenticationRequestHandler} - Sending response back to: /samlsso... | |
commonAuthAuthenticated: true | |
authenticatedUser: alice | |
authenticatedIdPs: eyJ0eXAiOiJKV1QiLCAiYWxnIjoibm9uZSJ9.eyJpc3MiOiJ3c28yIiwiZXhwIjoxNDYwMzMwNTIxMTA0MzAwMCwiaWF0IjoxNDYwMzMwNTIxMTA0LCJpZHBzIjpbeyJpZHAiOiJMT0NBTCIsImF1dGhlbnRpY2F0b3IiOiJPQXV0aFJlcXVlc3RQYXRoQXV0aGVudGljYXRvciJ9XX0=. | |
sessionDataKey: ec6b3bdf-34c6-41f2-ba29-bf9c6b5a956a | |
[2016-04-11 04:52:01,119] DEBUG {org.wso2.carbon.identity.sso.saml.servlet.SAMLSSOProviderServlet} - Query string : SAMLRequest=nZNPb9pAEMXv%2FRSrvYONgyq6wo4oKCpS2rrg5NDbsh7DJvvH3VkT8u27tiGiVYpQr%2BOZN29%2Fbzy9PWhF9uBQWpPS0TCmBIywpTTblD4Ud4MJvc0%2BTJFrVbNZ43dmBb8aQE9miOB8GJtbg40Gtwa3lwIeVvcp3XlfsyhSVnC1s%2BjZJJ7EkXd8D6Em%2FetQWB3trIbhE9aULIKiNNx3Ltph%2FGP603h8E7UeEC0ld9YJ6LyktOIKgZLlIqWmttWmrnUYKbeVlhtrtvJ5w7nlpRQbxZ93T5pD2405R5R7SKl3TVfABpYGPTc%2BpUk8%2BjiIx4NRXCQ3LElYHLiMxz8pyZ31Vlj1WZqeUOMMsxwlMsM1IPOCrWdf71kyjNmmb0L2pSjyQf59XVDyeCKdtKQDe4OsY3tZqj7updkxic6wu16An8Ki2V8hTKNzxV4%2Fqdm3ILFc5FZJ8UpmStmXuQPu34iFDDT3l5e2FVkOqq6V1e3T0YPxlKzzVv9Hw5WsJLiU9tvPiSTXIonePB8vE8ruNsJZejh4Mre65k5iSx0OXPj%2F2tIvYefKcxWorqA6k7s6hIttgolWOpTbM32xrmzvDkR4WeG4wdo638f2rp%2Bs%2F%2FYvINkp8fO%2FOfsN&access_token=75e38a543f9e60f46005514dc9984df9 | |
[2016-04-11 04:52:01,144] DEBUG {org.wso2.carbon.identity.application.authentication.framework.store.SessionDataPersistTask} - Session Data persisting Task is started to run | |
[2016-04-11 04:52:01,153] DEBUG {org.wso2.carbon.identity.sso.saml.builders.DefaultResponseBuilder} - Building SAML Response for the consumer 'http://localhost:8080/travelocity.com/home.jsp' | |
[2016-04-11 04:52:01,161] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} - Cache Key not found for Random Password Container | |
[2016-04-11 04:52:01,164] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} - Cache Key not found for Random Password Container | |
[2016-04-11 04:52:01,258] DEBUG {org.wso2.carbon.identity.sso.saml.processors.SPInitSSOAuthnRequestProcessor} - <?xml version="1.0" encoding="UTF-8"?> | |
<saml2p:Response Destination="http://localhost:8080/travelocity.com/home.jsp" ID="_f7b58e5ed74304b0d032285b1c880378" InResponseTo="npofbppmlhodgfmibongikbaaoadicblakhjmaee" IssueInstant="2016-04-10T23:22:01.161Z" Version="2.0" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"><saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">localhost</saml2:Issuer><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:Assertion ID="_ca7079d754d37b1ff30852829ce75570" IssueInstant="2016-04-10T23:22:01.163Z" Version="2.0" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"><saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">localhost</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI="#_ca7079d754d37b1ff30852829ce75570"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>MwtnogOOWhWQ5N48DEd5Mn8ssOQ=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>KJAHCZO16AyoHx1K1nvrfirg7PqEUVoDH2oE/GIOpzIafKF35Zc5qLzMG+SEC/DytTqFgZP3gem4JQmxCBi2dB9prh9xrCBQEhNYtNG0x+6bO4+J4+l2OzLVommoBMmcJQAdqx7h06Ky4jnWW+0GsLh6AMM2LdgbV0DvbcYi53w=</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2:Subject><saml2:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">alice</saml2:NameID><saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml2:SubjectConfirmationData InResponseTo="npofbppmlhodgfmibongikbaaoadicblakhjmaee" NotOnOrAfter="2016-04-10T23:27:01.161Z" Recipient="http://localhost:8080/travelocity.com/home.jsp"/></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore="2016-04-10T23:22:01.163Z" NotOnOrAfter="2016-04-10T23:27:01.161Z"><saml2:AudienceRestriction><saml2:Audience>travelocity.com</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant="2016-04-10T23:22:01.168Z" SessionIndex="01babc96-56fb-48c0-8e84-ddae3826cbc8"><saml2:AuthnContext><saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement></saml2:Assertion></saml2p:Response> | |
[2016-04-11 04:52:01,258] DEBUG {org.wso2.carbon.identity.sso.saml.processors.SPInitSSOAuthnRequestProcessor} - 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 | |
[2016-04-11 04:52:01,259] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} - Cache Key not found for Random Password Container | |
[2016-04-11 04:52:01,262] DEBUG {org.wso2.carbon.identity.sso.saml.servlet.SAMLSSOProviderServlet} - samlsso_response.html <!-- | |
Variables http://localhost:8080/travelocity.com/home.jsp, $response, $relayState and $additionalParams will be replaced by the corrosponding values | |
--> | |
<html> | |
<body> | |
<p>You are now redirected back to http://localhost:8080/travelocity.com/home.jsp | |
If the redirection fails, please click the post button.</p> | |
<form method='post' action='http://localhost:8080/travelocity.com/home.jsp'> | |
<p> | |
<!--$params--> | |
<input type='hidden' name='SAMLResponse' value='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'> | |
<!--$additionalParams--> | |
<button type='submit'>POST</button> | |
</p> | |
</form> | |
<script type='text/javascript'> | |
document.forms[0].submit(); | |
</script> | |
</body> | |
</html> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment