an
-Original Message-
From: Gross, Christian
Sent: Dienstag, 8. Dezember 2020 15:18
To: [email protected]
Subject: RE: Cloudstack SAML auth [signed INVALID]
Hi Rohit
I captured a SAML response from our IDP and compared it with the one you pasted
in this issue:
https://github.com
: RE: Cloudstack SAML auth [signed INVALID]
Hi Rohit
Thanks for your answer.
This mapping/setting we have already configured and it is working, as long as
we do not activate encryption on the IDP.
I think, that we have something messed up with the keys/certs used for
encryption.
As far as I understand
ienstag, 8. Dezember 2020 11:24
To: [email protected]
Subject: Re: Cloudstack SAML auth
Hi Christian,
Please refer to the SAML docs:
http://docs.cloudstack.apache.org/en/latest/adminguide/accounts.html#using-a-saml-2-0-identity-provider-for-user-authentication
You need to configure what
From: Gross, Christian
Sent: Monday, December 07, 2020 19:34
To: [email protected]
Subject: Cloudstack SAML auth
Hi All
I'm trying to secure our Cloudstack<->Redhat SSO communication, but not very
successful.
As soon as I activate "Encrypt Assertions",
Hi All
I'm trying to secure our Cloudstack<->Redhat SSO communication, but not very
successful.
As soon as I activate "Encrypt Assertions", I only receive
531
Failed to find admin configured username attribute in the SAML
Response. Please ask your administrator to check SAML user attribute
na