Skip to content

Commit 64ae055

Browse files
committed
Discourage the use of fingerprint on production environments
1 parent bb6967c commit 64ae055

File tree

2 files changed

+10
-2
lines changed

2 files changed

+10
-2
lines changed

README.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,8 @@ Key features:
6565

6666
In production, the **onelogin.saml2.strict** setting parameter MUST be set as **"true"**. Otherwise your environment is not secure and will be exposed to attacks.
6767

68+
In production also we highly recommend to register on the settings the IdP certificate instead of using the fingerprint method. The fingerprint, is a hash, so at the end is open to a collision attack that can end on a signature validation bypass. Other SAML toolkits deprecated that mechanism, we maintain it for compatibility and also to be used on test environment.
69+
6870
## Installation
6971
### Hosting
7072
#### Github
@@ -261,7 +263,10 @@ onelogin.saml2.idp.single_logout_service.binding = urn:oasis:names:tc:SAML:2.0:b
261263
# Public x509 certificate of the IdP
262264
onelogin.saml2.idp.x509cert =
263265

264-
# Instead of use the whole x509cert you can use a fingerprint
266+
# Instead of using the whole x509cert you can use a fingerprint in order to
267+
# validate a SAMLResponse (but you still need the x509cert to validate LogoutRequest and LogoutResponse using the HTTP-Redirect binding).
268+
# But take in mind that the fingerprint, is a hash, so at the end is open to a collision attack that can end on a signature validation bypass,
269+
# that why we don't recommend it use for production environments.
265270
# (openssl x509 -noout -fingerprint -in "idp.crt" to generate it,
266271
# or add for example the -sha256 , -sha384 or -sha512 parameter)
267272
#

samples/java-saml-tookit-jspsample/src/main/resources/onelogin.saml.properties

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,10 @@ onelogin.saml2.idp.single_logout_service.binding = urn:oasis:names:tc:SAML:2.0:b
7878
# Public x509 certificate of the IdP
7979
onelogin.saml2.idp.x509cert =
8080

81-
# Instead of use the whole x509cert you can use a fingerprint
81+
# Instead of using the whole x509cert you can use a fingerprint in order to
82+
# validate a SAMLResponse (but you still need the x509cert to validate LogoutRequest and LogoutResponse using the HTTP-Redirect binding).
83+
# But take in mind that the fingerprint, is a hash, so at the end is open to a collision attack that can end on a signature validation bypass,
84+
# that why we don't recommend it use for production environments.
8285
# (openssl x509 -noout -fingerprint -in "idp.crt" to generate it,
8386
# or add for example the -sha256 , -sha384 or -sha512 parameter)
8487
#

0 commit comments

Comments
 (0)