Skip to content

Commit 2e4daf9

Browse files
committed
Merge pull request #19 from benmccann/callback-url
Fix the callback URL in the sample project
2 parents 37490d6 + 15a5eb8 commit 2e4daf9

2 files changed

Lines changed: 9 additions & 12 deletions

File tree

README.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -36,20 +36,17 @@ You can now run the web app sample which depends on this code:
3636
What needs to be configured
3737
----------------------------
3838

39-
In the example above, SAML settings are divided into two parts, the application specific (const_assertion_consumer_service_url, const_issuer, const_name_identifier_format)
40-
and the user/account specific (idp_sso_target_url, x509certificate). You'll need to add your own code here to identify the user or user origin (e.g. by subdomain, ip_address etc.).
39+
In the example above, SAML settings are divided into two parts, the application specific (`const_assertion_consumer_service_url`, `const_issuer`, `const_name_identifier_format`)
40+
and the user/account specific (`idp_sso_target_url`, `x509certificate`). You'll need to add your own code here to identify the user or user origin (e.g. by subdomain, ip_address etc.).
4141

4242
The following information needs to be available on the account:
4343

44-
appSettings.setAssertionConsumerServiceUrl
45-
The URL at which the SAML assertion should be received. In this example "http://localhost:3000/saml/consume" would be correct.
44+
`appSettings.setAssertionConsumerServiceUrl`: The URL at which the SAML assertion should be received.
4645

47-
appSettings.setIssuer
48-
The name of your application. Some identity providers might need this to establish the identity of the service provider requesting the login.
46+
`appSettings.setIssuer`: The name of your application. Some identity providers might need this to establish the identity of the service provider requesting the login.
4947

50-
accSettings.setIdpSsoTargetUrl
51-
The URL to which the authentication request should be sent. This would be on the identity provider.
48+
`accSettings.setIdpSsoTargetUrl`: The URL to which the authentication request should be sent. This would be on the identity provider.
5249

53-
accountSettings.setCertificate
54-
The x509 certificate fingerprint.
55-
This is provided from the identity provider when setting up the relationship, for this version the certificate must be 1024-bit.
50+
`accountSettings.setCertificate`: The x509 certificate fingerprint. This is provided from the identity provider when setting up the relationship, for this version the certificate must be 1024-bit.
51+
52+
In OneLogin, for this sample project, you'll want to set the SAML Consumer URL to "http://localhost:8080" and the SAML Audience and SAML Recipient to "http://localhost:8080/consume.jsp"

sample/src/main/webapp/index.jsp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
AppSettings appSettings = new AppSettings();
1313
1414
// set the URL of the consume.jsp (or similar) file for this app. The SAML Response will be posted to this URL
15-
appSettings.setAssertionConsumerServiceUrl("http://localhost:3000/saml/consume.jsp");
15+
appSettings.setAssertionConsumerServiceUrl("http://localhost:8080/consume.jsp");
1616
1717
// set the issuer of the authentication request. This would usually be the URL of the issuing web application
1818
appSettings.setIssuer("https://www.mywebapp.com");

0 commit comments

Comments
 (0)