I've got a site acting as an Identity Provider (IdP) for Single Sign on and another 2 service providers that authenticate against it using SAML 2. At the moment, both service providers use the same certificate to validate the SAML response from the IdP.

I've now got a 3rd Service Provider joining shortly and I wondered whether I should really be issuing separate certificates to each party so that we could potentially revoke their access, if required, without affecting the other Service Providers? What approach have others taken and why?

I'm using SimpleSamlPHP as the IdP.

有帮助吗?

解决方案 2

The problem with this is that the certificate information is in the IDP metadata that is sent to the SP and the metadata normally only allows for one certificate for one task (can be different tasks e.g. for signing and encryption).

Coming back the other way e.g. signing the SP Authn request, all the SP's can have different cetificates or they can share.

Some products e.g. ADFS 2.0 before Rollup 3 do not allow SP to share certificates.

其他提示

As I understand, what you want is to be able to revoke SSO access for one SP but not all.

I would think this should not be done by revoking certificates but rather by removing the metadata from SimpleSamlPHP.

许可以下: CC-BY-SA归因
不隶属于 StackOverflow
scroll top