Hi Fabrice,

In the SAML response sent after authentication, the encrypted data should have 
a unique attribute that should correspond to the user's username of an account 
in CloudStack. The global setting 'saml2.user.attribute' is default set to uid 
(I think, to make it work out of the box with a Ldap backed IdP server), change 
this attribute value to something else that is specific to the user attribute 
in your environment, restart management server and retry.


Regards.

________________________________
From: Fabrice Pollet <[email protected]>
Sent: 05 May 2017 12:13:55
To: Rohit Yadav; [email protected]; [email protected]
Subject: Re: Shibboleth and CloudStack


Hello,

I made some changes in my configuration. Instead of editing the 
/etc/cloudstack/management/idp-metadata.xml file from my SP to force SSO-CAS 
authentication (https://idp.etrs.terre.defense.gouv.fr/idp/Authn/ RemoteUser), 
I modified the /opt/shibboleth-idp/conf/handler.xml file of my IdP:


<!-- Login Handlers -->
<ph:LoginHandler xsi:type="ph:RemoteUser"> 
<ph:AuthenticationMethod>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</ph:AuthenticationMethod>
 
<ph:AuthenticationMethod>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</ph:AuthenticationMethod>
    </ph:LoginHandler>

This tells the IdP it can use that login mechanism (in this case CAS) when an 
SP asks for PasswordProtectedTransport.

Both SP and IdP server hosts have the same timezone/time settings. It seems 
that the IdP and SP servers know their metadata reciprocally, but I don't know 
how to verify if the SP decrypts those of the IdP.

Logs of the IdP in debug mode show that the authentication succeeded but I 
noticed some errors in debug mode (in red in the text):


12:50:43.820 - INFO [Shibboleth-Access:73] - 
20170504T105043Z|172.16.96.7|idp.etrs.terre.defense.gouv.fr:443|/profile/SAML2/Redirect/SSO|
12:50:43.820 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.IdPProfileHandlerManager:86] - 
shibboleth.HandlerManager: Looking up profile handler for request path: 
/SAML2/Redirect/SSO
12:50:43.820 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.IdPProfileHandlerManager:97] - 
shibboleth.HandlerManager: Located profile handler of the following type for 
the request path: 
edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler
12:50:43.821 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:339] - 
LoginContext key cookie was not present in request
12:50:43.821 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:188] - 
Incoming request does not contain a login context, processing as first leg of 
request
12:50:43.821 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:366] - 
Decoding message with decoder binding 
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect'
12:50:43.821 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:76] - 
Beginning to decode message from inbound transport of type: 
org.opensaml.ws.transport.http.HttpServletRequestAdapter
12:50:43.822 - DEBUG 
[org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder:90] - Decoded 
RelayState: null
12:50:43.822 - DEBUG 
[org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder:127] - Base64 
decoding and inflating SAML message
12:50:43.822 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:183] - 
Parsing message stream into DOM document
12:50:43.823 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:193] - 
Unmarshalling message DOM
12:50:43.823 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:205] - 
Message succesfully unmarshalled
12:50:43.823 - DEBUG 
[org.opensaml.saml2.binding.decoding.HTTPRedirectDeflateDecoder:105] - Decoded 
SAML message
12:50:43.824 - DEBUG 
[org.opensaml.saml2.binding.decoding.BaseSAML2MessageDecoder:112] - Extracting 
ID, issuer and issue instant from request
12:50:43.824 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:43.824 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.824 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata 
document does not contain an EntityDescriptor with the ID 
cloud.etrs.terre.defense.gouv.fr

...

12:50:43.827 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.828 - DEBUG [PROTOCOL_MESSAGE:113] -
<?xml version="1.0" encoding="UTF-8"?>
<saml2p:AuthnRequest
    
AssertionConsumerServiceURL="https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso";<https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso>
    
Destination="https://idp.etrs.terre.defense.gouv.fr/idp/profile/SAML2/Redirect/SSO";<https://idp.etrs.terre.defense.gouv.fr/idp/profile/SAML2/Redirect/SSO>
    ForceAuthn="false" ID="85qrvu7c1kmg1tsc0gqmk4a1u2k60qed"
    IsPassive="false" IssueInstant="2017-05-04T10:50:43.719Z"
    ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
    ProviderName="cloud.etrs.terre.defense.gouv.fr" Version="2.0" 
xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
    <saml2:Issuer 
xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">cloud.etrs.terre.defense.gouv.fr</saml2:Issuer>
    <saml2p:RequestedAuthnContext Comparison="exact">
        <saml:AuthnContextClassRef 
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>
    </saml2p:RequestedAuthnContext>
</saml2p:AuthnRequest>

12:50:43.828 - DEBUG 
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:128]
 - Looking up relying party configuration for cloud.etrs.terre.defense.gouv.fr
12:50:43.828 - DEBUG 
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:134]
 - No custom relying party configuration found for 
cloud.etrs.terre.defense.gouv.fr, looking up configuration based on metadata 
groups.
12:50:43.829 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:43.829 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.829 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata 
document does not contain an EntityDescriptor with the ID 
cloud.etrs.terre.defense.gouv.fr


12:50:43.831 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:43.831 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.831 - DEBUG 
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:157]
 - No custom or group-based relying party configuration found for 
cloud.etrs.terre.defense.gouv.fr. Using default relying party configuration.
12:50:43.831 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:130] - 
Evaluating security policy of type 
'edu.internet2.middleware.shibboleth.common.security.ShibbolethSecurityPolicy' 
for decoded message
12:50:43.832 - DEBUG [org.opensaml.util.storage.ReplayCache:92] - Attempting to 
acquire lock for replay cache check
12:50:43.832 - DEBUG [org.opensaml.util.storage.ReplayCache:94] - Lock acquired
12:50:43.832 - DEBUG [org.opensaml.util.storage.ReplayCache:105] - Message ID 
85qrvu7c1kmg1tsc0gqmk4a1u2k60qed was not a replay
12:50:43.832 - DEBUG [org.opensaml.util.storage.ReplayCache:132] - Writing 
message ID cloud.etrs.terre.defense.gouv.fr85qrvu7c1kmg1tsc0gqmk4a1u2k60qed to 
replay cache with expiration time 2017-05-04T12:55:43.832+02:00
12:50:43.832 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:308] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:43.833 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.833 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:250] - Metadata 
document did not contain a descriptor for entity 
cloud.etrs.terre.defense.gouv.fr
12:50:43.833 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:317] - Metadata 
document did not contain any role descriptors of type 
{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor for entity 
cloud.etrs.terre.defense.gouv.fr
12:50:43.833 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:286] - Metadata 
document does not contain a role of type 
{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor supporting protocol 
urn:oasis:names:tc:SAML:2.0:protocol for entity cloud.etrs.terre.defense.gouv.fr


12:50:43.836 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:308] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:43.836 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.836 - INFO 
[org.opensaml.common.binding.security.SAMLProtocolMessageXMLSignatureSecurityPolicyRule:100]
 - SAML protocol message was not signed, skipping XML signature processing
12:50:43.837 - DEBUG 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:64]
 - Evaluating simple signature rule of type: 
org.opensaml.saml2.binding.security.SAML2HTTPRedirectDeflateSignatureRule
12:50:43.837 - DEBUG 
[org.opensaml.saml2.binding.security.SAML2HTTPRedirectDeflateSignatureRule:64] 
- Constructing signed content string from URL query string 
SAMLRequest=jVPLjtowFN33KyLvyatQphYJooxGHWnaQSTTRXeufWEsEjvc66R8fp0ENCxaptv4%2BDx8ThbLU10FHSBpazKWhDELwEirtNln7KV8mNyxZf5hQaKu0oavWvdqtnBsgVywIgJ0%2Ft7aGmprwAKw0xJetk8Ze3WuIR5FsrKtCsEhhQ4QIVSwA0MQ7m3bhTv0AA3GRaLRS2nrWhiV9WIFWRbcexlthBu8XRi1am7x%2BeOoQbvTFUTF6ttTGm1BaQTpoqJ4ZsGDRQlDjoztREXAgsf7jN3Njti1c5kc6n3iSMb7Y32YiqRND5%2FiIyiPoo0g0h283SNq4dGQE8ZlLI2T%2BSSeTeJpmcR8FvPpx3CefP7Jgg1aZ6WtvmgzvmuLhltBmrgRNRB3kvdWeRrG%2FNcIIv61LDeTzXNRDgSdVoDfPTpj7z0pC35c%2Bkz7Pn3DhvjY4G3t5myU5WPhfEiI1wy3CcRlEix%2Fz%2BUiupbILws7jwvUUJFfloOTC9a2bgRq6jPBSUh3dsivUevKy29hd2X3v93ehEkue2r%2FuV%2FAb4uqb9QvClSJwlBj0Y1x%2FuonP0f9R7i34%2Bu%2FK%2F8D&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256&Signature=svf6JoGtWy5nIQaE%2Fm6qjHAvV%2FJHU7l1KrXF8RftV3cxLhlh3tr8vyk0Dmb2ShPUu81KBx8mKpv6bmcIhOdi%2FkZ7gZIcTwYnFDnn2vT%2B9keBgA6LTWejAPHFG6Q4AtltYlpeDElaX9JgA1FNqhNLIA1zhM9m5Ycblb4Ld5VlYYdGZeCfMd3Jsjcri14ASenAz8vF5%2BmZC6f1QCiAqwvf1Vo5qPUormcKG174S8LVYa5U%2FyfwC60d5y6Ajba5OvuaB7M%2F
 vI0FVpfsX 
sXuR5NYw7Bcj8v49kSJw1CIU%2Fyzyd2UWJ6miXkQHnPtxrJjP8RCpGnERyrNZKzhukpr%2BOQ91%2B641Ujwv1%2FTT8SG1E91GZeJQBFMhc5wGglhuw4%2BRcY69rN1utX1cOH7YNFBjMiA27O5tq2FHp%2FOEg0ERdQniy%2FSUN6WLMGMXCZOCVesv3UAFfjhKbPaSDoOLNjNHuh6a%2FWpGF%2BXmYdLFY5m0Ic%2Bm3qSgnXe21u1frMAChloSwALR9xjoUzbAhCncDG8%2BQVuy%2Fpz4cwIXmCEHWeQ9dOUhv0eH4L73Iew3pqHfpsAJwqZW44QK9J1M5FFV3L4jqure1FnkiPuFemD5iaRmcYupjytnDurvq1M3ANkOT9sZw0g1WTrKlVJ8W%2F9LWlpOiB8mNRQOgKQV4ioe3gIdiUjfQQ%3D
12:50:43.837 - DEBUG 
[org.opensaml.saml2.binding.security.SAML2HTTPRedirectDeflateSignatureRule:71] 
- Constructed signed content string for HTTP-Redirect DEFLATE 
SAMLRequest=jVPLjtowFN33KyLvyatQphYJooxGHWnaQSTTRXeufWEsEjvc66R8fp0ENCxaptv4%2BDx8ThbLU10FHSBpazKWhDELwEirtNln7KV8mNyxZf5hQaKu0oavWvdqtnBsgVywIgJ0%2Ft7aGmprwAKw0xJetk8Ze3WuIR5FsrKtCsEhhQ4QIVSwA0MQ7m3bhTv0AA3GRaLRS2nrWhiV9WIFWRbcexlthBu8XRi1am7x%2BeOoQbvTFUTF6ttTGm1BaQTpoqJ4ZsGDRQlDjoztREXAgsf7jN3Njti1c5kc6n3iSMb7Y32YiqRND5%2FiIyiPoo0g0h283SNq4dGQE8ZlLI2T%2BSSeTeJpmcR8FvPpx3CefP7Jgg1aZ6WtvmgzvmuLhltBmrgRNRB3kvdWeRrG%2FNcIIv61LDeTzXNRDgSdVoDfPTpj7z0pC35c%2Bkz7Pn3DhvjY4G3t5myU5WPhfEiI1wy3CcRlEix%2Fz%2BUiupbILws7jwvUUJFfloOTC9a2bgRq6jPBSUh3dsivUevKy29hd2X3v93ehEkue2r%2FuV%2FAb4uqb9QvClSJwlBj0Y1x%2FuonP0f9R7i34%2Bu%2FK%2F8D&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha256
12:50:43.837 - DEBUG 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:126]
 - Attempting to validate SAML protocol message simple signature using context 
issuer: cloud.etrs.terre.defense.gouv.fr
12:50:43.837 - DEBUG [org.opensaml.security.MetadataCredentialResolver:167] - 
Forcing on-demand metadata provider refresh if necessary
12:50:43.838 - DEBUG [org.opensaml.security.MetadataCredentialResolver:215] - 
Attempting to retrieve credentials from cache using index: 
[cloud.etrs.terre.defense.gouv.fr,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:2.0:protocol,SIGNING]
12:50:43.838 - DEBUG [org.opensaml.security.MetadataCredentialResolver:223] - 
Retrieved credentials from cache using index: 
[cloud.etrs.terre.defense.gouv.fr,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:2.0:protocol,SIGNING]
12:50:43.838 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74]
 - Registry located evaluable criteria class 
org.opensaml.xml.security.credential.criteria.EvaluableEntityIDCredentialCriteria
 for criteria class org.opensaml.xml.security.criteria.EntityIDCriteria
12:50:43.839 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74]
 - Registry located evaluable criteria class 
org.opensaml.xml.security.credential.criteria.EvaluableUsageCredentialCriteria 
for criteria class org.opensaml.xml.security.criteria.UsageCriteria
12:50:43.839 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74]
 - Registry located evaluable criteria class 
org.opensaml.xml.security.credential.criteria.EvaluableKeyAlgorithmCredentialCriteria
 for criteria class org.opensaml.xml.security.criteria.KeyAlgorithmCriteria
12:50:43.839 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:105]
 - Registry could not locate evaluable criteria for criteria class 
org.opensaml.security.MetadataCriteria
12:50:43.839 - DEBUG 
[org.opensaml.xml.signature.impl.ExplicitKeySignatureTrustEngine:159] - 
Attempting to verify signature using trusted credentials
12:50:43.839 - DEBUG [org.opensaml.xml.security.SigningUtil:241] - Verifying 
signature over input using public key of type RSA and JCA algorithm ID 
SHA256withRSA
12:50:43.842 - DEBUG 
[org.opensaml.xml.signature.impl.ExplicitKeySignatureTrustEngine:164] - 
Successfully verified signature using resolved trusted credential
12:50:43.842 - DEBUG 
[org.opensaml.xml.signature.impl.ChainingSignatureTrustEngine:81] - Signature 
was trusted by chain member: 
org.opensaml.xml.signature.impl.ExplicitKeySignatureTrustEngine
12:50:43.842 - DEBUG 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:192]
 - Simple signature validation (with no request-derived credentials) was 
successful
12:50:43.842 - INFO 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:130]
 - Validation of request simple signature succeeded
12:50:43.842 - INFO 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:132]
 - Authentication via request simple signature succeeded for context issuer 
entity ID cloud.etrs.terre.defense.gouv.fr
12:50:43.842 - DEBUG 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:64]
 - Evaluating simple signature rule of type: 
org.opensaml.saml2.binding.security.SAML2HTTPPostSimpleSignRule
12:50:43.843 - DEBUG 
[org.opensaml.common.binding.security.BaseSAMLSimpleSignatureSecurityPolicyRule:81]
 - Rule can not handle this request, skipping processing
12:50:43.843 - DEBUG [org.opensaml.ws.message.decoder.BaseMessageDecoder:85] - 
Successfully decoded message.
12:50:43.843 - DEBUG 
[org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:191] - Checking 
SAML message intended destination endpoint against receiver endpoint
12:50:43.843 - DEBUG 
[org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:210] - Intended 
message destination endpoint: 
https://idp.etrs.terre.defense.gouv.fr/idp/profile/SAML2/Redirect/SSO
12:50:43.843 - DEBUG 
[org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:211] - Actual 
message receiver endpoint: 
https://idp.etrs.terre.defense.gouv.fr/idp/profile/SAML2/Redirect/SSO
12:50:43.844 - DEBUG 
[org.opensaml.common.binding.decoding.BaseSAMLMessageDecoder:219] - SAML 
message intended destination endpoint matched recipient endpoint
12:50:43.844 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:387] - 
Decoded request from relying party 'cloud.etrs.terre.defense.gouv.fr'
12:50:43.844 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:43.844 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.844 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata 
document does not contain an EntityDescriptor with the ID 
cloud.etrs.terre.defense.gouv.fr


12:50:43.849 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:43.850 - DEBUG 
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:157]
 - No custom or group-based relying party configuration found for 
cloud.etrs.terre.defense.gouv.fr. Using default relying party configuration.
12:50:43.850 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:226] - 
Creating login context and transferring control to authentication engine
12:50:43.850 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:181] - Storing 
LoginContext to StorageService partition loginContexts, key 
21082a8599b5ba28281416cfd7468ad128b893acaf51f88303c5fadd9ee0f77b
12:50:43.851 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:240] - 
Redirecting user to authentication engine at 
https://idp.etrs.terre.defense.gouv.fr:443/idp/AuthnEngine
12:50:43.855 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:209] - 
Processing incoming request
12:50:43.856 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:240] - 
Beginning user authentication process.
12:50:43.856 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:283] - 
Filtering configured LoginHandlers: 
{urn:oasis:names:tc:SAML:2.0:ac:classes:PreviousSession=edu.internet2.middleware.shibboleth.idp.authn.provider.PreviousSessionLoginHandler@4fd79d84,
 
urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified=edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler@54a66e0f,
 
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport=edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler@54a66e0f}
12:50:43.857 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:288] - 
Filtering possible login handlers by requested authentication methods: 
[urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport]
12:50:43.857 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:296] - 
Filtering out login handler for authentication 
urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified, it does not provide a 
requested authentication method
12:50:43.857 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:332] - 
Filtering out previous session login handler because there is no existing IdP 
session
12:50:43.857 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:464] - 
Selecting appropriate login handler from filtered set 
{urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport=edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler@54a66e0f}
12:50:43.857 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:497] - 
Authenticating user with login handler of type 
edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler
12:50:43.857 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserLoginHandler:66]
 - Redirecting to 
https://idp.etrs.terre.defense.gouv.fr:443/idp/Authn/RemoteUser
12:50:52.152 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserAuthServlet:73]
 - Remote user identified as fabrice.pollet returning control back to 
authentication engine
12:50:52.153 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:144] - 
Returning control to authentication engine
12:50:52.153 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:209] - 
Processing incoming request
12:50:52.153 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:514] - 
Completing user authentication process
12:50:52.153 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:585] - 
Validating authentication was performed successfully
12:50:52.154 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:696] - 
Updating session information for principal fabrice.pollet
12:50:52.154 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:700] - 
Creating shibboleth session for principal fabrice.pollet
12:50:52.154 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:815] - 
Adding IdP session cookie to HTTP response
12:50:52.155 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:715] - 
Recording authentication and service information in Shibboleth session for 
principal: fabrice.pollet
12:50:52.155 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:560] - User 
fabrice.pollet authenticated with method 
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
12:50:52.155 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:161] - 
Returning control to profile handler
12:50:52.155 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.authn.AuthenticationEngine:177] - 
Redirecting user to profile handler at 
https://idp.etrs.terre.defense.gouv.fr:443/idp/profile/SAML2/Redirect/SSO
12:50:52.160 - INFO [Shibboleth-Access:73] - 
20170504T105052Z|172.16.96.7|idp.etrs.terre.defense.gouv.fr:443|/profile/SAML2/Redirect/SSO|
12:50:52.160 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.IdPProfileHandlerManager:86] - 
shibboleth.HandlerManager: Looking up profile handler for request path: 
/SAML2/Redirect/SSO
12:50:52.160 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.IdPProfileHandlerManager:97] - 
shibboleth.HandlerManager: Located profile handler of the following type for 
the request path: 
edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler
12:50:52.160 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:588] - 
Unbinding LoginContext
12:50:52.160 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:614] - Expiring 
LoginContext cookie
12:50:52.160 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.util.HttpServletHelper:625] - Removed 
LoginContext, with key 
21082a8599b5ba28281416cfd7468ad128b893acaf51f88303c5fadd9ee0f77b, from 
StorageService partition loginContexts
12:50:52.161 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:172] - 
Incoming request contains a login context and indicates principal was 
authenticated, processing second leg of request
12:50:52.161 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr
12:50:52.161 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of cloud.etrs.terre.defense.gouv.fr
12:50:52.161 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:167] - Metadata 
document does not contain an EntityDescriptor with the ID 
cloud.etrs.terre.defense.gouv.fr
12:50:52.161 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
cloud.etrs.terre.defense.gouv.fr


12:50:52.169 - DEBUG 
[edu.internet2.middleware.shibboleth.common.relyingparty.provider.SAMLMDRelyingPartyConfigurationManager:157]
 - No custom or group-based relying party configuration found for 
cloud.etrs.terre.defense.gouv.fr. Using default relying party configuration.
12:50:52.169 - DEBUG 
[org.opensaml.saml2.metadata.provider.ChainingMetadataProvider:253] - Checking 
child metadata provider for entity descriptor with entity ID: 
https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth
12:50:52.170 - DEBUG 
[org.opensaml.saml2.metadata.provider.AbstractMetadataProvider:520] - Searching 
for entity descriptor with an entity ID of 
https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth
12:50:52.170 - DEBUG 
[org.opensaml.saml2.binding.AuthnResponseEndpointSelector:99] - Filtering peer 
endpoints.  Supported peer endpoint bindings: 
[urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign, 
urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST, 
urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact]
12:50:52.171 - DEBUG 
[org.opensaml.saml2.binding.AuthnResponseEndpointSelector:114] - Removing 
endpoint https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso 
because its binding urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect is not 
supported
12:50:52.171 - DEBUG 
[org.opensaml.saml2.binding.AuthnResponseEndpointSelector:69] - Selecting 
endpoint by ACS URL 
'https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso' and 
protocol binding 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST' for request 
'85qrvu7c1kmg1tsc0gqmk4a1u2k60qed' from entity 
'cloud.etrs.terre.defense.gouv.fr'
12:50:52.171 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:478]
 - Resolving attributes for principal 'fabrice.pollet' for SAML request from 
relying party 'cloud.etrs.terre.defense.gouv.fr'
12:50:52.171 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:119]
 - shibboleth.AttributeResolver resolving attributes for principal 
fabrice.pollet
12:50:52.171 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:275]
 - Specific attributes for principal fabrice.pollet were not requested, 
resolving all attributes.
12:50:52.172 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:314]
 - Resolving attribute uid for principal fabrice.pollet
12:50:52.172 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:354]
 - Resolving data connector myLDAP for principal fabrice.pollet
12:50:52.173 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.dataConnector.LdapDataConnector:308]
 - Search filter: (uid=fabrice.pollet)


12:50:52.190 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:336]
 - Resolved attribute uid containing 1 values
12:50:52.190 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:314]
 - Resolving attribute email for principal fabrice.pollet
12:50:52.190 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:336]
 - Resolved attribute email containing 1 values
12:50:52.190 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:314]
 - Resolving attribute transientId for principal fabrice.pollet
12:50:52.191 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.attributeDefinition.TransientIdAttributeDefinition:97]
 - Building transient ID for request 85qrvu7c1kmg1tsc0gqmk4a1u2k60qed; outbound 
message issuer: https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth, inbound 
message issuer: cloud.etrs.terre.defense.gouv.fr, principal identifer: 
fabrice.pollet
12:50:52.191 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.attributeDefinition.TransientIdAttributeDefinition:115]
 - Created transient ID _fa7d6de2b4e946248d8f52c948470df6 for request 
85qrvu7c1kmg1tsc0gqmk4a1u2k60qed
12:50:52.191 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:336]
 - Resolved attribute transientId containing 1 values
12:50:52.191 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:314]
 - Resolving attribute eduPersonScopedAffiliation for principal fabrice.pollet
12:50:52.191 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:336]
 - Resolved attribute eduPersonScopedAffiliation containing 1 values
12:50:52.191 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:473]
 - Attribute uid has 1 values after post-processing
12:50:52.192 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:473]
 - Attribute email has 1 values after post-processing
12:50:52.192 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:473]
 - Attribute transientId has 1 values after post-processing
12:50:52.192 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:473]
 - Attribute eduPersonScopedAffiliation has 1 values after post-processing
12:50:52.192 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.resolver.provider.ShibbolethAttributeResolver:137]
 - shibboleth.AttributeResolver resolved, for principal fabrice.pollet, the 
attributes: [uid, email, transientId, eduPersonScopedAffiliation]
12:50:52.192 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:71]
 - shibboleth.AttributeFilterEngine filtering 4 attributes for principal 
fabrice.pollet
12:50:52.193 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:130]
 - Evaluating if filter policy releaseToAllRenaterSps is active for principal 
fabrice.pollet
12:50:52.193 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.match.saml.AbstractEntityGroupMatchFunctor:77]
 - Entity descriptor does not have a parent object, unable to check if entity 
is in group https://federation.renater.fr/
12:50:52.193 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:134]
 - Filter policy releaseToAllRenaterSps is not active for principal 
fabrice.pollet
12:50:52.193 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:130]
 - Evaluating if filter policy releaseToCocoEduGainSp is active for principal 
fabrice.pollet
12:50:52.193 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.match.saml.AbstractEntityGroupMatchFunctor:77]
 - Entity descriptor does not have a parent object, unable to check if entity 
is in group https://federation.renater.fr/edugain/
12:50:52.193 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.match.saml.AbstractEntityAttributeMatchFunctor:175]
 - Descriptor for cloud.etrs.terre.defense.gouv.fr does not contain any 
EntityAttributes
12:50:52.194 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:134]
 - Filter policy releaseToCocoEduGainSp is not active for principal 
fabrice.pollet
12:50:52.194 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:130]
 - Evaluating if filter policy releaseTransientIdToAnyone is active for 
principal fabrice.pollet
12:50:52.194 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:139]
 - Filter policy releaseTransientIdToAnyone is active for principal 
fabrice.pollet
12:50:52.194 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:163]
 - Processing permit value rule for attribute transientId for principal 
fabrice.pollet
12:50:52.194 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:130]
 - Evaluating if filter policy releaseUidAndEmailToAnyone is active for 
principal fabrice.pollet
12:50:52.194 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:139]
 - Filter policy releaseUidAndEmailToAnyone is active for principal 
fabrice.pollet
12:50:52.195 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:163]
 - Processing permit value rule for attribute uid for principal fabrice.pollet
12:50:52.195 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:163]
 - Processing permit value rule for attribute email for principal fabrice.pollet
12:50:52.195 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:130]
 - Evaluating if filter policy cloud.etrs.terre.defense.gouv.fr is active for 
principal fabrice.pollet
12:50:52.195 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:139]
 - Filter policy cloud.etrs.terre.defense.gouv.fr is active for principal 
fabrice.pollet
12:50:52.195 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:163]
 - Processing permit value rule for attribute uid for principal fabrice.pollet
12:50:52.196 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:130]
 - Evaluating if filter policy e5.onthehub.com is active for principal 
fabrice.pollet
12:50:52.196 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:134]
 - Filter policy e5.onthehub.com is not active for principal fabrice.pollet
12:50:52.196 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:109]
 - Attribute uid has 1 values after filtering
12:50:52.196 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:109]
 - Attribute email has 1 values after filtering
12:50:52.196 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:109]
 - Attribute transientId has 1 values after filtering
12:50:52.196 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:106]
 - Removing attribute from return set, no more values: 
eduPersonScopedAffiliation
12:50:52.197 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.filtering.provider.ShibbolethAttributeFilteringEngine:114]
 - Filtered attributes for principal fabrice.pollet.  The following attributes 
remain: [uid, email, transientId]
12:50:52.197 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:505]
 - Creating attribute statement in response to SAML request 
'85qrvu7c1kmg1tsc0gqmk4a1u2k60qed' from relying party 
'cloud.etrs.terre.defense.gouv.fr'
12:50:52.197 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.provider.ShibbolethSAML2AttributeAuthority:247]
 - Encoded attribute uid with encoder of type 
edu.internet2.middleware.shibboleth.common.attribute.encoding.provider.SAML2StringAttributeEncoder
12:50:52.197 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.provider.ShibbolethSAML2AttributeAuthority:247]
 - Encoded attribute email with encoder of type 
edu.internet2.middleware.shibboleth.common.attribute.encoding.provider.SAML2StringAttributeEncoder
12:50:52.198 - DEBUG 
[edu.internet2.middleware.shibboleth.common.attribute.provider.ShibbolethSAML2AttributeAuthority:263]
 - Attribute transientId was not encoded (filtered by query, or no 
SAML2AttributeEncoder attached).
12:50:52.198 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:527]
 - Filtering out potential name identifier attributes which can not be encoded 
by 
edu.internet2.middleware.shibboleth.common.attribute.encoding.SAML2NameIDEncoder
12:50:52.198 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:546]
 - Removing attribute uid, it can not be encoded via 
edu.internet2.middleware.shibboleth.common.attribute.encoding.SAML2NameIDEncoder
12:50:52.198 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:546]
 - Removing attribute email, it can not be encoded via 
edu.internet2.middleware.shibboleth.common.attribute.encoding.SAML2NameIDEncoder
12:50:52.198 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:541]
 - Retaining attribute transientId which may be encoded to via 
edu.internet2.middleware.shibboleth.common.attribute.encoding.SAML2NameIDEncoder
12:50:52.199 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:566]
 - Filtering out potential name identifier attributes which do not support one 
of the following formats: 
[urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, 
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, 
urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
12:50:52.199 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:585]
 - Retaining attribute transientId which may be encoded as a name identifier of 
format urn:oasis:names:tc:SAML:2.0:nameid-format:transient
12:50:52.199 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:690]
 - Selecting attribute to be encoded as a name identifier by encoder of type 
edu.internet2.middleware.shibboleth.common.attribute.encoding.SAML2NameIDEncoder
12:50:52.199 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:717]
 - Selecting the first attribute that can be encoded in to a name identifier
12:50:52.199 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:501]
 - Name identifier for relying party 'cloud.etrs.terre.defense.gouv.fr' will be 
built from attribute 'transientId'
12:50:52.199 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:868]
 - Using attribute 'transientId' supporting NameID format 
'urn:oasis:names:tc:SAML:2.0:nameid-format:transient' to create the NameID for 
relying party 'cloud.etrs.terre.defense.gouv.fr'
12:50:52.200 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:572]
 - Determining if SAML assertion to relying party 
'cloud.etrs.terre.defense.gouv.fr' should be signed
12:50:52.200 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:653]
 - IdP relying party configuration 'default' indicates to sign assertions: true
12:50:52.200 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:583]
 - Determining signing credntial for assertion to relying party 
'cloud.etrs.terre.defense.gouv.fr'
12:50:52.200 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:599]
 - Signing assertion to relying party cloud.etrs.terre.defense.gouv.fr
12:50:52.200 - DEBUG [org.opensaml.common.SAMLObjectHelper:56] - Examing signed 
object for content references with exclusive canonicalization transform
12:50:52.201 - DEBUG [org.opensaml.common.SAMLObjectHelper:70] - Saw exclusive 
transform, declaring non-visible namespaces on signed object
12:50:52.201 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:100] 
- Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature
12:50:52.201 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:103] 
- Creating XMLSignature object
12:50:52.202 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:113] 
- Adding content to XMLSignature.
12:50:52.202 - DEBUG [org.opensaml.common.impl.SAMLObjectContentReference:173] 
- Adding list of inclusive namespaces for signature exclusive canonicalization 
transform
12:50:52.202 - DEBUG [org.opensaml.xml.signature.impl.SignatureMarshaller:118] 
- Creating Signature DOM element
12:50:52.203 - DEBUG [org.opensaml.xml.signature.Signer:76] - Computing 
signature over XMLSignature object
12:50:52.214 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:274]
 - Attempting to encrypt assertion to relying party 
'cloud.etrs.terre.defense.gouv.fr'
12:50:52.218 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.AbstractSAML2ProfileHandler:279]
 - Assertion to be encrypted is:
<?xml version="1.0" encoding="UTF-8"?>
<saml2:Assertion ID="_3dcfe0e7bc0bd318d70314e0c6b38e0f"
    IssueInstant="2017-05-04T10:50:52.198Z" Version="2.0"
    xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" 
xmlns:xs="http://www.w3.org/2001/XMLSchema";<http://www.w3.org/2001/XMLSchema>>
    <saml2:Issuer 
Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth</saml2:Issuer>
    <ds:Signature 
xmlns:ds="http://www.w3.org/2000/09/xmldsig#";<http://www.w3.org/2000/09/xmldsig#>>
        <ds:SignedInfo>
            <ds:CanonicalizationMethod 
Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#";<http://www.w3.org/2001/10/xml-exc-c14n#>/>
            <ds:SignatureMethod 
Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1";<http://www.w3.org/2000/09/xmldsig#rsa-sha1>/>
            <ds:Reference URI="#_3dcfe0e7bc0bd318d70314e0c6b38e0f">
                <ds:Transforms>
                    <ds:Transform 
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature";<http://www.w3.org/2000/09/xmldsig#enveloped-signature>/>
                    <ds:Transform 
Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#";<http://www.w3.org/2001/10/xml-exc-c14n#>>
                        <ec:InclusiveNamespaces PrefixList="xs" 
xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#";<http://www.w3.org/2001/10/xml-exc-c14n#>/>
                    </ds:Transform>
                </ds:Transforms>
                <ds:DigestMethod 
Algorithm="http://www.w3.org/2000/09/xmldsig#sha1";<http://www.w3.org/2000/09/xmldsig#sha1>/>
                <ds:DigestValue>YgpD3KMsgxt8+cXzdw1OP36tOws=</ds:DigestValue>
            </ds:Reference>
        </ds:SignedInfo>
        
<ds:SignatureValue>Xs6CVhcA+bKej3xKo145EucCv6yRVbWsFvueVVSxIuYR/vKmdbx92c1f7HOiFrFwQ9wVRodd4OmgrHFoIXZITBPAVPs7k9XInnbBicUPmJoJBnxoY5hraCQdNlVSGr1upplJ3XCDvWWxvamNoDdr4t/Zpw6jkwPriV7fbHvyOt3+2idKhQQGXKvyMmQ921RnLtVaBoP/rlQFZOkZ1LBgHtTWPhdf4Z4CIEBoOuRF/+lPTkSvkl5MnGcHCtV32QCiuu6fy0lfmG3nk0crDjNUjVUP1xTFc7UJtje4wB06DHSj+xgfov5Et6JPx2GhSgxlHMfaLTyn/boCDb9I4HZB2A==</ds:SignatureValue>
        <ds:KeyInfo>
            <ds:X509Data>
                
<ds:X509Certificate>MIIDZTCCAk2gAwIBAgIUJ8+wj9VvvaWkYWc7Lv9ZrozEz5wwDQYJKoZIhvcNAQEFBQAwKTEnMCUG
A1UEAwweaWRwLmV0cnMudGVycmUuZGVmZW5zZS5nb3V2LmZyMB4XDTE1MDYwNDEyNDMzM1oXDTM1
MDYwNDEyNDMzM1owKTEnMCUGA1UEAwweaWRwLmV0cnMudGVycmUuZGVmZW5zZS5nb3V2LmZyMIIB
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAncSOI7ZLCUW1YAQxsXx9sGUhIETkAQD0rW31
036RsUcxJKHvSfvHLz9t95F0OmCw4K+gVFFobxoOzwWrfNkQKNLmWJjfqVWe7euL5S6a5CLdzvos
DCIaP63/9JAlAlAPvVQ3JYH08FcLQL2zcbxshZJBvsAQrSOOnkytXndkmpjlvPZNn3HbofiSA2CD
DfNjIgFq1AS0nGJyuHSDD+Foi2TsU8ejirYVZPxn8wacxpt9GtIuY/tleYTjdH41kskaXqRGoN0X
7aC2Xea357hf950lEbacTOxztYITIJFZVkQjjea+YdGU9fsjrAkxuAyXX5yHD9SU8t9Px1Y/jwVW
xwIDAQABo4GEMIGBMB0GA1UdDgQWBBRV5pi3YXYkaI4CLWcEtD2SiRteWTBgBgNVHREEWTBXgh5p
ZHAuZXRycy50ZXJyZS5kZWZlbnNlLmdvdXYuZnKGNWh0dHBzOi8vaWRwLmV0cnMudGVycmUuZGVm
ZW5zZS5nb3V2LmZyL2lkcC9zaGliYm9sZXRoMA0GCSqGSIb3DQEBBQUAA4IBAQB7c5PZS50wlcNU
HGNv0QbHmFIEl2qSVW5p+y4lZX3QBEy+dyKw9qaTFGDD+qLfa9QKo6s31uLocW7aGmG2ok6U0XjT
7fCKIR8YljugdZfetCw5BiHRIaDzVhj8ozZPmb0OxlTecpJ/gQ3wik7Qo9ZPU/wLObyVcxGBeIiQ
xXhCTu0Gqvl2UUV1Jwo4OEt5Vb6oBjN7HMDjCSaG+Q/uQK0g4lfhJr2ZvpDrAy+f5ZJcccgz4uPJ
k0hqdydB6gHGIbSYVt1X89vWWYYigdavCrEx/mzNsCIdNuvFCFWQxDTr62aRd9Ib9VdrTc4GL7w+
Gi7Ne++PRgzXlaUPwIb+uQ6Z</ds:X509Certificate>
            </ds:X509Data>
        </ds:KeyInfo>
    </ds:Signature>
    <saml2:Subject>
        <saml2:NameID
            Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient" 
NameQualifier="https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth";<https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth>>_fa7d6de2b4e946248d8f52c948470df6</saml2:NameID>
        <saml2:SubjectConfirmation 
Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
            <saml2:SubjectConfirmationData Address="172.16.96.7"
                InResponseTo="85qrvu7c1kmg1tsc0gqmk4a1u2k60qed"
                NotOnOrAfter="2017-05-04T10:55:52.198Z" 
Recipient="https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso";<https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso>/>
        </saml2:SubjectConfirmation>
    </saml2:Subject>
    <saml2:Conditions NotBefore="2017-05-04T10:50:52.198Z" 
NotOnOrAfter="2017-05-04T10:55:52.198Z">
        <saml2:AudienceRestriction>
            <saml2:Audience>cloud.etrs.terre.defense.gouv.fr</saml2:Audience>
        </saml2:AudienceRestriction>
    </saml2:Conditions>
    <saml2:AuthnStatement AuthnInstant="2017-05-04T10:50:52.155Z" 
SessionIndex="_a61ad6be527397b4b7bdc9064a0b4957">
        <saml2:SubjectLocality Address="172.16.96.7"/>
        <saml2:AuthnContext>
            
<saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef>
        </saml2:AuthnContext>
    </saml2:AuthnStatement>
    <saml2:AttributeStatement>
        <saml2:Attribute FriendlyName="uid"
            Name="urn:oid:0.9.2342.19200300.100.1.1" 
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
            <saml2:AttributeValue
                
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";<http://www.w3.org/2001/XMLSchema-instance>
 xsi:type="xs:string">fabrice.pollet</saml2:AttributeValue>
        </saml2:Attribute>
        <saml2:Attribute FriendlyName="mail"
            Name="urn:oid:0.9.2342.19200300.100.1.3" 
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
            <saml2:AttributeValue
                
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";<http://www.w3.org/2001/XMLSchema-instance>
 
xsi:type="xs:string">[email protected]<mailto:[email protected]></saml2:AttributeValue>
        </saml2:Attribute>
    </saml2:AttributeStatement>
</saml2:Assertion>

12:50:52.221 - DEBUG [org.opensaml.security.MetadataCredentialResolver:167] - 
Forcing on-demand metadata provider refresh if necessary
12:50:52.221 - DEBUG [org.opensaml.security.MetadataCredentialResolver:215] - 
Attempting to retrieve credentials from cache using index: 
[cloud.etrs.terre.defense.gouv.fr,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:2.0:protocol,ENCRYPTION]
12:50:52.222 - DEBUG [org.opensaml.security.MetadataCredentialResolver:223] - 
Retrieved credentials from cache using index: 
[cloud.etrs.terre.defense.gouv.fr,{urn:oasis:names:tc:SAML:2.0:metadata}SPSSODescriptor,urn:oasis:names:tc:SAML:2.0:protocol,ENCRYPTION]
12:50:52.222 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74]
 - Registry located evaluable criteria class 
org.opensaml.xml.security.credential.criteria.EvaluableEntityIDCredentialCriteria
 for criteria class org.opensaml.xml.security.criteria.EntityIDCriteria
12:50:52.222 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74]
 - Registry located evaluable criteria class 
org.opensaml.xml.security.credential.criteria.EvaluableKeyAlgorithmCredentialCriteria
 for criteria class org.opensaml.xml.security.criteria.KeyAlgorithmCriteria
12:50:52.222 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:74]
 - Registry located evaluable criteria class 
org.opensaml.xml.security.credential.criteria.EvaluableUsageCredentialCriteria 
for criteria class org.opensaml.xml.security.criteria.UsageCriteria
12:50:52.222 - DEBUG 
[org.opensaml.xml.security.credential.criteria.EvaluableCredentialCriteriaRegistry:105]
 - Registry could not locate evaluable criteria for criteria class 
org.opensaml.security.MetadataCriteria
12:50:52.223 - DEBUG [org.opensaml.xml.security.SecurityHelper:292] - Unable to 
determine length in bits of specified Key instance
12:50:52.223 - DEBUG [org.opensaml.xml.encryption.Encrypter:645] - Generating 
random symmetric data encryption key from algorithm URI: 
http://www.w3.org/2001/04/xmlenc#aes128-cbc
12:50:52.223 - DEBUG [org.opensaml.xml.encryption.Encrypter:429] - Encrypting 
XMLObject using algorithm URI http://www.w3.org/2001/04/xmlenc#aes128-cbc with 
content mode false
12:50:52.225 - DEBUG [org.opensaml.xml.encryption.Encrypter:330] - Encrypting 
encryption key with algorithm: http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p
12:50:52.234 - DEBUG [org.opensaml.xml.encryption.Encrypter:291] - Dynamically 
generating KeyInfo from Credential for EncryptedKey using generator: 
org.opensaml.xml.security.x509.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator
12:50:52.235 - DEBUG [org.opensaml.saml2.encryption.Encrypter:423] - Placing 
EncryptedKey elements inline inside EncryptedData
12:50:52.235 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.saml2.SSOProfileHandler:331] - 
secondarily indexing user session by name identifier
12:50:52.237 - DEBUG 
[edu.internet2.middleware.shibboleth.idp.profile.AbstractSAMLProfileHandler:796]
 - Encoding response to SAML request 85qrvu7c1kmg1tsc0gqmk4a1u2k60qed from 
relying party cloud.etrs.terre.defense.gouv.fr
12:50:52.237 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:49] - 
Beginning encode message to outbound transport of type: 
org.opensaml.ws.transport.http.HttpServletResponseAdapter
12:50:52.237 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:124] 
- Invoking Velocity template to create POST body
12:50:52.238 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:158] 
- Encoding action url of 
'https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso' with 
encoded value 
'https&#x3a;&#x2f;&#x2f;cloud.etrs.terre.defense.gouv.fr&#x2f;client&#x2f;api&#x3f;command&#x3d;samlSso'
12:50:52.238 - DEBUG [org.opensaml.saml2.binding.encoding.HTTPPostEncoder:162] 
- Marshalling and Base64 encoding SAML message
12:50:52.240 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:97] - 
Marshalling message
12:50:52.260 - DEBUG [PROTOCOL_MESSAGE:74] -
<?xml version="1.0" encoding="UTF-8"?>
<saml2p:Response
    
Destination="https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso";<https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso>
    ID="_f554e0c08f61f5c6d18529e5b2f16884"
    InResponseTo="85qrvu7c1kmg1tsc0gqmk4a1u2k60qed"
    IssueInstant="2017-05-04T10:50:52.198Z" Version="2.0" 
xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
    <saml2:Issuer
        Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" 
xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth</saml2:Issuer>
    <saml2p:Status>
        <saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
    </saml2p:Status>
    <saml2:EncryptedAssertion 
xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
        <xenc:EncryptedData Id="_3ad94c1af74ab0a0a43cda26ce51a8ff"
            
Type="http://www.w3.org/2001/04/xmlenc#Element";<http://www.w3.org/2001/04/xmlenc#Element>
 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
            <xenc:EncryptionMethod
                
Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc";<http://www.w3.org/2001/04/xmlenc#aes128-cbc>
 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>/>
            <ds:KeyInfo 
xmlns:ds="http://www.w3.org/2000/09/xmldsig#";<http://www.w3.org/2000/09/xmldsig#>>
                <xenc:EncryptedKey
                    Id="_549b0b744e7bdde94d3f44a410a115c2" 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                    <xenc:EncryptionMethod
                        
Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p";<http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p>
 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                        <ds:DigestMethod
                            
Algorithm="http://www.w3.org/2000/09/xmldsig#sha1";<http://www.w3.org/2000/09/xmldsig#sha1>
 
xmlns:ds="http://www.w3.org/2000/09/xmldsig#";<http://www.w3.org/2000/09/xmldsig#>/>
                    </xenc:EncryptionMethod>
                    <ds:KeyInfo>
                        <ds:X509Data>
                            
<ds:X509Certificate>MIIErzCCApcCBgFbR6o7sTANBgkqhkiG9w0BAQsFADAbMRkwFwYDVQQDExBBcGFjaGVDbG91ZFN0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</ds:X509Certificate>
                        </ds:X509Data>
                    </ds:KeyInfo>
                    <xenc:CipherData 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                        
<xenc:CipherValue>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</xenc:CipherValue>
                    </xenc:CipherData>
                </xenc:EncryptedKey>
            </ds:KeyInfo>
            <xenc:CipherData 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                
<xenc:CipherValue>yRzRwLLs5rSBH+9HwhIen/a1PsIvaqV7xZTeTG+pAOE/GVVxTNRY5eFYTr+VVc0LYQTjECP5obr275MWUHLEOGdDy5/IUNuLS6Q3hgVn6pmhs3QkgzZ6R1mX6c1+RceSjGZRieXps0HoDKCMq8wVgb7LBebP8zjCTPaS3TMK4JsYOaDTPWwrjfI7RybI6itPzczNnwQ21Hkv+mXZXR5hkaVlrRGg99dKwGlpb07uMJTOAgju9vX/0BNC7hcQKD4yp2hhuSUzEo97EVcI5JYvW0y2U/JJu8O0FKvuDxhjRLPhZqJm7HzRyEOVEp9yi3E3oWg9krtFphqbZcWPrBw1MUDcAP4xWyYcKmBDXthhXp2Z78XTpQKwtn8vB/sML/4YFVXyADRBTi0pcgFUKW9CEV2lONnRqt1YPPnXEK4tUvJDaNzyDTjs+jLOIMN5BDK87f/bZw8fzCyPGA2a36X0xAZouw9Vz6YHLvO4GYBLuOLVafCYQC2ViykCjwCZJck4WoUDUVNwVbMpuXGEt5KuuvHYtuRSO8ZC5SPAI7vaGZuPwQmLDHvYNtaltr/eI96xwcQPnoadr/eWWyz3f5zeuQ3mJ7zEoow1tRqrmKAPWBLRiAoPehL1GJie7DDe+r1GpaWcCiyRncUebm8pchnRlsi503nXfr+i92K12i1dCueneLSWAsVYiU9njzaxFqOeUpxFPG0Cd246iznzMOg7sZjaucdix5VWi6I5rADuv48fRMv5BpAT9dloQ/iQiERgX+7GfKNkvSgZ/QW3C7tQ55ZO32glXzODkGXxsw4sB2oawMQlSaJOvYtcMhmPDRA9lLZRUXDH35xLhivuRsHgE6o+7Hv7kuF6adevlEGFtF8EON4MiOgy3FPQYw7UatKnqyXjFvbrr3cFfAXSmVShqEc5a5x3xaVD3+C81jJjA2/NlZKS5FdmLHcCsRCooQPzRKexac
 sPcR95XZ4 
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
 sxJ2I7Nji 
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
 ypPNCrZMU 
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
 9UBytP6ak 
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
 /EpdQ6ZR9 
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
 CVLzAiHds 
CJNoY5QvH1RjJY/x0bV8p6OskEPhkkUH8mM59jXHPUafEm/PqMApDrt0tCGN33p6oS95dqfHgx780VS0+QLq/kwLcxwJhLZn1+ptA/NZgl2gUhXHt5IoFwfoSnOa5B5V5jQ/9mXsGXbFty6MNBoQiJcSTYzAB2KFjhgiUY4SHwf4k+FGBZxPWLQSJRlBcPvw1VWOj1UZYDbtTR3bqUj1AJzoRsFAqvnQxqGHpCI/BHzcQySXWpEbR+/cgh9BSj5Ld8ruX51n2+1FKvtDJq/Vy6XJ0Jw3u138gdmfX45KqumPd+Kw4ubp7jv+o3BHtxLsouLCjBL0JKk4Ms+8AFqAW/46I=</xenc:CipherValue>
            </xenc:CipherData>
        </xenc:EncryptedData>
    </saml2:EncryptedAssertion>
</saml2p:Response>

12:50:52.262 - DEBUG [org.opensaml.ws.message.encoder.BaseMessageEncoder:56] - 
Successfully encoded message.
12:50:52.262 - INFO [Shibboleth-Audit:1028] - 
20170504T105052Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|85qrvu7c1kmg1tsc0gqmk4a1u2k60qed|cloud.etrs.terre.defense.gouv.fr|urn:mace:shibboleth:2.0:profiles:saml2:sso|https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_f554e0c08f61f5c6d18529e5b2f16884|fabrice.pollet|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|uid,email,transientId,|_fa7d6de2b4e946248d8f52c948470df6||



At the CloudStack SP the authentication failed:


2017-05-04 15:01:27,164 DEBUG [c.c.a.ApiServlet] (catalina-exec-8:ctx-70e81e62) 
(logid:2f838354) ===START===  172.16.96.7 -- POST  command=samlSso
2017-05-04 15:01:27,164 DEBUG [c.c.a.ApiServlet] (catalina-exec-8:ctx-70e81e62) 
(logid:2f838354) Session cookie is marked secure!
2017-05-04 15:01:27,219 DEBUG [o.a.c.a.c.SAML2LoginAPIAuthenticatorCmd] 
(catalina-exec-8:ctx-70e81e62) (logid:2f838354) Received SAMLResponse in 
response to id=vf4gl2406lrritgfmqqif535ssf7f2ns
2017-05-04 15:01:27,222 DEBUG [c.c.a.ApiServlet] (catalina-exec-8:ctx-70e81e62) 
(logid:2f838354) Authentication failure: <?xml version="1.0" 
encoding="UTF-8"?><loginresponse 
cloud-stack-version="4.9.2.0"><errorcode>531</errorcode><errortext>Failed to 
find admin configured username attribute in the SAML Response. Please ask your 
administrator to check SAML user attribute name.</errortext></loginresponse>
2017-05-04 15:01:27,222 DEBUG [c.c.a.ApiServlet] (catalina-exec-8:ctx-70e81e62) 
(logid:2f838354) ===END===  172.16.96.7 -- POST  command=samlSso


Thank you again for your help.


Le 03/05/2017 11:17, Rohit Yadav a écrit :

Hi Fabrice,


Ensure that both SP and IdP server hosts have the same timezone/time settings. 
Consider setting up NTP on them etc.


Next, another reason it failed to log into CloudStack (even though I can see 
successful authentication at the IdP side) is that SP (cloudstack mgmt server) 
has incorrect IdP metadata or certificates to verify and decrypt the encrypted 
tokens in the saml2 response. Please verify this as well.


Regards.

[email protected]<mailto:[email protected]>
www.shapeblue.com<http://www.shapeblue.com>
@shapeblue




________________________________
From: Fabrice Pollet 
<[email protected]><mailto:[email protected]>
Sent: 02 May 2017 17:44:58
To: Rohit Yadav; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: Re: Shibboleth and CloudStack

Hello,

Thank you very much for your answer.

Maybe I misunderstood because in my current configuration, CloudStack refers to 
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword without any 
modification and that corresponds to the native authentication of my IdP.

I wanted CloudStack to return to 
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/RemoteUser which corresponds 
to my SSO-CAS.

So I followed your hack but by modifying in 
/etc/cloudstack/management/idp-metadata.xml 
https://idp.etrs.terre.defense.gouv.fr/idp/profile/SAML2/Redirect/SSO by 
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/RemoteUser.

This time CloudStack redirects well towards my SSO-CAS it is a progress. 
Unfortunately, authentication does not succeed.

Here are the logs of the IdP at the time of the connection:


11:09:55.290 - INFO [Shibboleth-Access:73] - 
20170502T090955Z|172.16.96.7|idp.etrs.terre.defense.gouv.fr:443|/profile/SAML2/Redirect/SSO|
11:09:55.378 - DEBUG [PROTOCOL_MESSAGE:74] -
<?xml version="1.0" encoding="UTF-8"?>
<saml2p:Response
    
Destination="https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso";<https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso>
    ID="_3b1e03d6935882d3eb5d3f9242fb1426"
    InResponseTo="ni2j9u3i4d749ask9434jsgon0i9g7u2"
    IssueInstant="2017-05-02T09:09:55.320Z" Version="2.0" 
xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol">
    <saml2:Issuer
        Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" 
xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth</saml2:Issuer>
    <saml2p:Status>
        <saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
    </saml2p:Status>
    <saml2:EncryptedAssertion 
xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
        <xenc:EncryptedData Id="_61daeafb4f216c1e291b2130c8b56a35"
            
Type="http://www.w3.org/2001/04/xmlenc#Element";<http://www.w3.org/2001/04/xmlenc#Element>
 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
            <xenc:EncryptionMethod
                
Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc";<http://www.w3.org/2001/04/xmlenc#aes128-cbc>
 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>/>
            <ds:KeyInfo 
xmlns:ds="http://www.w3.org/2000/09/xmldsig#";<http://www.w3.org/2000/09/xmldsig#>>
                <xenc:EncryptedKey
                    Id="_bae1f2d4c0b08c4fa70aa7169117c880" 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                    <xenc:EncryptionMethod
                        
Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p";<http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p>
 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                        <ds:DigestMethod
                            
Algorithm="http://www.w3.org/2000/09/xmldsig#sha1";<http://www.w3.org/2000/09/xmldsig#sha1>
 
xmlns:ds="http://www.w3.org/2000/09/xmldsig#";<http://www.w3.org/2000/09/xmldsig#>/>
                    </xenc:EncryptionMethod>
                    <ds:KeyInfo>
                        <ds:X509Data>
                            
<ds:X509Certificate>MIIErzCCApcCBgFbR6o7sTANBgkqhkiG9w0BAQsFADAbMRkwFwYDVQQDExBBcGFjaGVDbG91ZFN0
YWNrMB4XDTE3MDQwNjA5MDYzMFoXDTIwMDQwNzA5MDYzMFowGzEZMBcGA1UEAxMQQXBhY2hlQ2xv
dWRTdGFjazCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALMN5Irps++bJ4S7SCATm3Ni
W+SYl75N/TbQXPHPrSWuZDRZOVVsgf6vCN/IAYsBUUD5Lej+aAhZra8SzI0RBtloIdx6xQHZTp3q
DbnvSW3pBIKb1m/KHpcvr6AFelUw82h13jYzp4QnPxragalY5g0do5UHeki+olHTgYu/TFiLAmrE
LxKFMOBKaZ+W4aYeootdCL1pXsFgRx/WXY2XS2e3wXxFXxRp9T35Mtuslz8eq8X5ipRyWiA+/1Q8
g3YjFengkP5w3xgSsTjF0HiBnP7g9OCu01M1M35vNxyoEvKgIT61Fm8VDuuxT9BWhKBKN5lZ1rSM
NCvsykdiSwXGo1NpKfG4iHeDUSZHsFIdwsthfK9Rs0VPCG+IcR93IYDGJOqX05tiI2WvN/T23W/T
kNPTDt8mZJh8HuiWAHij6OIb3DJxK2l2czxNq2OLJX27dHKQDf0LcNg9Cm8fzBLKkpyZlypuC1o2
60SY9XdkwLSbOhRkSWazFkW641EGv9QFUBs8AkPbos9DUVKA7ciHXPSIeiLEVdjbNMiuWJUmqF22
nefs99H7CvtMaSwSPGpMkYVljPGn+6M06EbNfxdd4quVVgnXOxXDJKV8E+1qCAT1nxQNkIZdoZZw
14RmoyCngV83eUf4mPjpux1IJhKJSOBnHFKCboMNcUgONSVRrRuLAgMBAAEwDQYJKoZIhvcNAQEL
BQADggIBABnJ2QT4s23RN0+v3F7H6ODuNcYMMl4JZN4VvDsAr2xBvRltMkmlcZgK5XRO47Gt1rdN
7fbm7xDsl0KblZ3PWHkBCuM0Zpw2nDx53AIkCk/lEw7sdAqAr1blgL56xTQLis43PLl7j4o+ZXFI
1Ny2eiyVRasffBQSlR4SoCN+mmXN4AygVxgR0zSlBKCV65CVX+5E8nKo1CrVzk4Pl3m6chKB+5J7
NvfvOvJAli1dsspjJd7SnyxJem4G0vC6t65Jzj+vFpBPsrj7VPa9YcrnDLOHy3Ljooad9agPkliY
JOvBRKkD8eoOMvoRSUg5f6VUAzO228UBcfS4OTZvkuKNyl2uYJ9pZFTEJ8zA+ikWZBUl4Ot6LYG3
smHsAxIpm7rubLVOF0GV8dhcMcDjDK5+7lLkaFRHTjZZeanISVBWbe3zc8P8gRdFZvi3CJalubPd
UQer2pUySILFJkfZx+5STf6cargpAEfnvWTvx1bRFqsh1NTOiWXJuL3QL3K9vPxhaIXgjmRFJVMb
y3Tt3ifMbqssaC7odRmKZx/bLyrgC6Uni+oJDkiDtyVD1oFtmnbQd8wZ6x25W+z6i0wtcDWLYoW0
HVpfDgXKwxuSNTdO1XYA48p98z6la+HXkhEML3EFU60+cxmvtfuu7JIOjSxWQw6dktxLKGZ+KPhB
2HWwtuca</ds:X509Certificate>
                        </ds:X509Data>
                    </ds:KeyInfo>
                    <xenc:CipherData 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                        
<xenc:CipherValue>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</xenc:CipherValue>
                    </xenc:CipherData>
                </xenc:EncryptedKey>
            </ds:KeyInfo>
            <xenc:CipherData 
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#";<http://www.w3.org/2001/04/xmlenc#>>
                
<xenc:CipherValue>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
 cnoeNIoQL c5IAM4PuCFk FhOQYVAI+ 
dmIxc5F74uDctiONoNX6zVyp3OSZHiNoN/WrSkA7OsefciO+DaU1XLc87CSqvR8eOG41VjSlxpzkHBjUOiOtz52BKlFtuDLlKFX/5W6XQYNHp69PhYjuXd6vryvNWSPVgoVDJ5R10s+W2JvnQXlgD0MVlgJQs905+yi1fugYYYuA2P0NIEu3/Ky4U4CLxmGM3NIAkTWpjpFhHxv8il3x4TLPs2BB49gV1FOF3E5oXYg37bY1k0aeJA/DDxm2QXLP31Q4jdOAwdL5o6gIbeHV2g4WEUeMHg3zMfuL3jcJi/JA7A6MJEDyYCC32Z42DfUYgocmIwlOTs6y2ujxKqAWfKYC9n6bu5Wxj2zU8dZlmA7Os1UYZZbz9ZaRFMp3aN31/x1dasSP2yCoLpcjgiWsQDTBOn596V9OXmK14Z6K/+Ba51dfT3UWc4vTSb603AB0yNV4Y4vclSFxM47qPb2kU2qtgZyEOVKDy6OekNVW+az8+IitTH/f2Fk+HgM4Ro6MrCLkjbwvriL3NZmIcTm3eV3cGDf752fmDI/wYXc8tMXMcNQQo+S8Gf76rLy9TffWX4DvIPQkG4o278c1RRwl58+O1arAcsAvhMNGiwzHDVhTCrzVWebifphXBzOjDN3cNm4I0HC/nmiuWprQy7IAkNatmQIRa5AevmmFYNd5rSvptyxVPBLcCCWxXcgB8nAosQp2nsTsE01UTfptvEPDPwc3BPbc8S4I2o5hhE5LCDquDmi3o5VbBmEGoOlt8pcpvtF99ogvSYo9nXPjt8XMwxWyfR52ch4XbGqLXrSiQejGBwhMeIj02wdiEZU3jI7VyCvidZIbAfSwIFb7M0zke/zNK0rYLMqiRM/T6IeBCBd+a+F6afyokHEDO7jQsCAsQ+AtQwfAgCeoZO9X7Tn1gDKBBLMoIhAcXJaVvwIdd52DliYffnK906NaT64M+KBKGLESDyJJJ2
 mJQd/E0mo svNUHOJ13bV cR5qPFT2v 
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
 jvFXR4VmU VYA0nJ4VJzy CWnArSZJp 
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
 623fOxs7y 1EsyVyV0DIV RWXQODN9J 
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
 dCjPREKkn XMqFO+KAq+w 2kePK+OMi 
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
 5gDaM7xmm A7HE91vLD4X CT6W5obbS 
C5t9COUSU88UubAzXX+DjFtRL/e0E94/nfpKiFDsRlWJJwKIFybBqezGksdmU21VEh/Z7vzNRvlmAAsz6vepof4cNL4PkHOhn8BSnFI6wDZahPj9WzIZ7ePeUkz5NpTdYfqX6VcHzANAgiygeLx8EaT9dCaOPj3PEGU/QkCcFKFcY1l8LGGUUW8Rudje0MRarcRh+ms51nwuoCAB5Gr+73GYb+2Ir3DYQme3ym0zGfsqTl8gR707/lvdxgVP3ShqSwvD6tr0rgd1r5pG8BESQbak9bFdq6cNZpTLVQ3/AsOd7FBdlWlPCE6I9eU70NNQy3iKxJljVb//5xrcjEDa9ulQc=</xenc:CipherValue>
            </xenc:CipherData>
        </xenc:EncryptedData>
    </saml2:EncryptedAssertion>
</saml2p:Response>

11:09:55.379 - INFO [Shibboleth-Audit:1028] - 
20170502T090955Z|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect|ni2j9u3i4d749ask9434jsgon0i9g7u2|cloud.etrs.terre.defense.gouv.fr|urn:mace:shibboleth:2.0:profiles:saml2:sso|https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth|urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST|_3b1e03d6935882d3eb5d3f9242fb1426|fabrice.pollet|urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|uid,email,transientId,|_9d5c99cfc524cd833e5e19406c95538e||


Here are the CloudStack logs:


2017-05-02 10:10:10,732 DEBUG [c.c.a.ApiServlet] 
(catalina-exec-20:ctx-52243a80) (logid:f3e20c3e) ===START===  172.16.96.7 -- 
GET  
command=samlSso&idpid=https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth&response=json
2017-05-02 10:10:10,732 DEBUG [c.c.a.ApiServlet] 
(catalina-exec-20:ctx-52243a80) (logid:f3e20c3e) Session cookie is marked 
secure!
2017-05-02 10:10:10,735 DEBUG [o.a.c.a.c.SAML2LoginAPIAuthenticatorCmd] 
(catalina-exec-20:ctx-52243a80) (logid:f3e20c3e) Sending SAMLRequest 
id=mdp1ikdn2elvck5uilfbs266ahop200v
2017-05-02 10:10:10,903 DEBUG [c.c.a.ApiServlet] 
(catalina-exec-20:ctx-52243a80) (logid:f3e20c3e) ===END===  172.16.96.7  -- GET 
 
command=samlSso&idpid=https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth&response=json

Here is the error in the browser: 
https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso :


<loginresponse 
cloud-stack-version="4.9.2.0"><errorcode>531</errorcode><errortext>Received 
SAML response for a SSO request that we may not have made or has expired, 
please try logging in again</errortext></loginresponse>

Thank you again for your time.


Le 28/04/2017 11:23, Rohit Yadav a écrit :

Hi Fabrice,


I looked at the IdP XML, with the SAML2 plugin enabled/configured in CloudStack 
when users click on login they will be redirected to 
https://idp.etrs.terre.defense.gouv.fr/idp/profile/SAML2/Redirect/SSO (with a 
saml token). After this, I'm not sure how your setup/IdP should behave on 
handling the redirection or use of the REMOTE_USER environment variable.


A sort of a hack you can try is to replace the SSO URL in your xml file (saved 
in /etc/cloudstack/management/) to 
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword and see if that 
works for you.


Regards.

[email protected]<mailto:[email protected]>
www.shapeblue.com<http://www.shapeblue.com>
@shapeblue




________________________________
From: Fabrice Pollet 
<[email protected]><mailto:[email protected]>
Sent: 27 April 2017 14:30:53
To: Rohit Yadav; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: Re: Shibboleth and CloudStack

I tried your solution to save the IdP metadata in file 
/etc/cloudstack/management/idp-metadata.xml and I found my IdP in the selection 
proposed by CloudStack. In any case it shows me the possibility of adding other 
IdP and that is very good.

However, I come back to the same situation. My Cloud refers to the native 
authentication of my IdP instead of the SSO-CAS.

I specify that my IdP has been working since 2015 with the Federation RENATER 
and that its external services are well redirected to our SSO-CAS.

Maybe a REMOTE_USER environment variable problem between the SP and the IdP?


Le 27/04/2017 09:10, Fabrice Pollet a écrit :
Hello,

The IdP metadata can also be read at this public URL 
https://idp.etrs.terre.defense.gouv.fr/idp/shibboleth.

The SP metadata is not public at the moment (see attached).

For me the redirection should be done towards 
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/RemoteUser (SSO-CAS) instead 
of https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword.

My IdP server has the SP metadata (the "backingFile" is filled automatically).

I will try your workaround.

I would like to inform you and thank you in advance.

Regards,

Le 26/04/2017 17:29, Rohit Yadav a écrit :

Hi Fabrice,


I could not open the URLs (they are not public) so cannot verify the XML 
metadata.


The IdP metadata http://idp.etrs.terre.defense.gouv.fr:8080/idp/shibboleth will 
include list of supported IDP server endpoints that support http-redirect 
(binding is set to urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect) based 
single-sign on. The current SAML2 plugin only supports and works with the 
Http-Redirect binding only.


If you can share the xml with me, I can verify the SSO URL. Likely, the URL 
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword must be one of 
the allowed SSO http-redirect based endpoints.


You may try this workaround -- assuming your IdP server has the SP metadata 
(i.e. the xml that you get from 
"http://cloud.etrs.terre.defense.gouv.fr:8080/client/api?command=getSPMetadata";)
 added/enabled; you can download and save the IdP metadata (make any URL 
modification that you want) to be file such as 'idp-metadata.xml' in 
/etc/cloudstack/management on the management server(s) and then in the global 
setting set the 'saml2.idp.metadata.url' to the value  'idp-metadata.xml' 
(without the quotes). Then, restart the mgmt server(s), it will read the 
metadata from this file location instead of the URL.


The SAML2 plugin also allows for multiple idps defined (for example, in case of 
a federation it will retrieve and list all the available SSO site, for example 
search for CAFe saml federation).


Regards.

________________________________
From: Fabrice Pollet 
<[email protected]><mailto:[email protected]>
Sent: 26 April 2017 17:31:46
To: [email protected]<mailto:[email protected]>
Subject: Shibboleth and CloudStack

Hello,

I'm trying to configure SAML2 SSO support to connect CloudStack 4.9.2.0
as a service provider (SP) to our own identity provider Shibboleth 2.4.4
(IdP - Authentication Service and Authorization based on XML).

I have completed the following CloudStack SAML2 settings:

saml2.append.idpdomain = false

saml2.default.idpid = néant

saml2.enabled = true

saml2.idp.metadata.url =
http://idp.etrs.terre.defense.gouv.fr:8080/idp/shibboleth
<http://idp.etrs.terre.defense.gouv.fr:8080/idp/shibboleth>

saml2.redirect.url = https://cloud.etrs.terre.defense.gouv.fr/client

saml2.sigalg = SHA256

saml2.sp.id = cloud.etrs.terre.defense.gouv.fr

saml2.sp.slo.url =
https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSlo
<https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSlo>

saml2.sp.sso.url =
https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso

saml2.user.attribute = uid


But the URL SSO-SAML2
https://cloud.etrs.terre.defense.gouv.fr/client/api?command=samlSso
returns me to the native authentication URL of our IdP
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword
instead of the SSO-CAS delegation URL
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/RemoteUser.


The meta data of my SP are listed in my IdP (from the configuration file
relying-party.xml):

<!-- Metadonnées de ETRS CloudStack -->

<metadata:MetadataProvider id="cloud.etrs.terre.defense.gouv.fr"
xsi:type="metadata:FileBackedHTTPMetadataProvider"

metadataURL="http://cloud.etrs.terre.defense.gouv.fr:8080/client/api?command=getSPMetadata";

backingFile="/opt/shibboleth-idp/metadata/main-sps-etrs-cloudstack-metadata.xml">

</metadata:MetadataProvider>

Thank you for your help.


--
IEF MINDEF POLLET Fabrice

TERRE/COMSIC/ETRS/DGF/BAF/ING-NEF/PFI-PEDA
COMSIC BP18 35998 RENNES 9 France

821 354 34 82 / 02 99 84 34 82
[email protected]<mailto:[email protected]> (Internet)
[email protected]<mailto:[email protected]> 
(Intradef)


[email protected]<mailto:[email protected]>
www.shapeblue.com<http://www.shapeblue.com>
@shapeblue




--
IEF MINDEF POLLET Fabrice

TERRE/COMSIC/ETRS/DGF/BAF/ING-NEF/PFI-PEDA
COMSIC BP18 35998 RENNES 9 France

821 354 34 82 / 02 99 84 34 82
[email protected]<mailto:[email protected]> (Internet)
[email protected]<mailto:[email protected]> 
(Intradef)

[email protected] 
www.shapeblue.com
53 Chandos Place, Covent Garden, London  WC2N 4HSUK
@shapeblue
  
 

Reply via email to