Created
January 21, 2020 10:38
-
-
Save truongnmt/362e3ccc5c3049a952e0ad54a3c7b2d1 to your computer and use it in GitHub Desktop.
saml response
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<samlp:Response | |
ID="_a2aec7e7-1843-443c-9af3-da94e69d5113" | |
Version="2.0" | |
IssueInstant="2020-01-21T06:59:36.653Z" | |
Destination="https://localhost:4447/acs" | |
InResponseTo="_9ecd6234ec0396a49a33a8a2ae0a9f8d2acc1b2a" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> | |
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">https://sts.windows.net/xxxx-xxxx-xxxx/ | |
</Issuer> | |
<samlp:Status> | |
<samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/> | |
</samlp:Status> | |
<Assertion ID="_cc074cf4-34f6-464e-a198-6440bd998b00" IssueInstant="2020-01-21T06:59:36.638Z" Version="2.0" | |
xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> | |
<Issuer>https://sts.windows.net/xxxx-xxxx-xxxx/</Issuer> | |
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#"> | |
<SignedInfo> | |
<CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> | |
<SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/> | |
<Reference URI="#_cc074cf4-34f6-464e-a198-6440bd998b00"> | |
<Transforms> | |
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/> | |
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/> | |
</Transforms> | |
<DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/> | |
<DigestValue>HTSKMJlCtFcMrp6zsNiOtV4mrpP8sQi2IJHGqwjgqWU=</DigestValue> | |
</Reference> | |
</SignedInfo> | |
<SignatureValue> | |
Te0d/GEDA3mwrD6nAq8fLjj3iNIfxxxx-xxxx-xxxx== | |
</SignatureValue> | |
<KeyInfo> | |
<X509Data> | |
<X509Certificate> | |
MIIC8DCCAdigAwIBAgIQc5Zjxxxx-xxxx-xxxx | |
</X509Certificate> | |
</X509Data> | |
</KeyInfo> | |
</Signature> | |
<Subject> | |
<NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">truong@xxxx-xxxx-xxxx</NameID> | |
<SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"> | |
<SubjectConfirmationData InResponseTo="_9ecd6234ec0396a49a33a8a2ae0a9f8d2acc1b2a" | |
NotOnOrAfter="2020-01-21T07:59:36.450Z" Recipient="https://localhost:4447/acs"/> | |
</SubjectConfirmation> | |
</Subject> | |
<Conditions NotBefore="2020-01-21T06:54:36.450Z" NotOnOrAfter="2020-01-21T07:59:36.450Z"> | |
<AudienceRestriction> | |
<Audience>https://localhost:4447/saml/metadata</Audience> | |
</AudienceRestriction> | |
</Conditions> | |
<AttributeStatement> | |
<Attribute Name="http://schemas.microsoft.com/identity/claims/tenantid"> | |
<AttributeValue>xxxx-xxxx-xxxx</AttributeValue> | |
</Attribute> | |
<Attribute Name="http://schemas.microsoft.com/identity/claims/objectidentifier"> | |
<AttributeValue>xxxx-xxxx-xxxx</AttributeValue> | |
</Attribute> | |
<Attribute Name="http://schemas.microsoft.com/identity/claims/displayname"> | |
<AttributeValue>Truong</AttributeValue> | |
</Attribute> | |
<Attribute Name="http://schemas.microsoft.com/identity/claims/identityprovider"> | |
<AttributeValue>https://sts.windows.net/xxxx-xxxx-xxxx/</AttributeValue> | |
</Attribute> | |
<Attribute Name="http://schemas.microsoft.com/claims/authnmethodsreferences"> | |
<AttributeValue>http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password</AttributeValue> | |
<AttributeValue>http://schemas.microsoft.com/claims/multipleauthn</AttributeValue> | |
</Attribute> | |
<Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"> | |
<AttributeValue>truong@xxxx-xxxx-xxxx</AttributeValue> | |
</Attribute> | |
</AttributeStatement> | |
<AuthnStatement AuthnInstant="2020-01-17T09:06:03.241Z" SessionIndex="_cc074cf4-34f6-464e-a198-6440bd998b00"> | |
<AuthnContext> | |
<AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</AuthnContextClassRef> | |
</AuthnContext> | |
</AuthnStatement> | |
</Assertion> | |
</samlp:Response> |
You can install this plugin and do a SAML authentication. You can see the SAML message in the plugin console.
https://chrome.google.com/webstore/detail/saml-chrome-panel/paijfdbeoenhembfhkhllainmocckace
I use the same way to capture this SAML file. Hope it helps.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
how to create this file can you please assist me?