]> BookStack Code Mirror - bookstack/blob - tests/Auth/Saml2Test.php
Added 404 response for non-existing setting categories
[bookstack] / tests / Auth / Saml2Test.php
1 <?php
2
3 namespace Tests\Auth;
4
5 use BookStack\Auth\Role;
6 use BookStack\Auth\User;
7 use Tests\TestCase;
8
9 class Saml2Test extends TestCase
10 {
11     protected function setUp(): void
12     {
13         parent::setUp();
14         // Set default config for SAML2
15         config()->set([
16             'auth.method'                                   => 'saml2',
17             'auth.defaults.guard'                           => 'saml2',
18             'saml2.name'                                    => 'SingleSignOn-Testing',
19             'saml2.email_attribute'                         => 'email',
20             'saml2.display_name_attributes'                 => ['first_name', 'last_name'],
21             'saml2.external_id_attribute'                   => 'uid',
22             'saml2.user_to_groups'                          => false,
23             'saml2.group_attribute'                         => 'user_groups',
24             'saml2.remove_from_groups'                      => false,
25             'saml2.onelogin_overrides'                      => null,
26             'saml2.onelogin.idp.entityId'                   => 'http://saml.local/saml2/idp/metadata.php',
27             'saml2.onelogin.idp.singleSignOnService.url'    => 'http://saml.local/saml2/idp/SSOService.php',
28             'saml2.onelogin.idp.singleLogoutService.url'    => 'http://saml.local/saml2/idp/SingleLogoutService.php',
29             'saml2.autoload_from_metadata'                  => false,
30             'saml2.onelogin.idp.x509cert'                   => $this->testCert,
31             'saml2.onelogin.debug'                          => false,
32             'saml2.onelogin.security.requestedAuthnContext' => true,
33         ]);
34     }
35
36     public function test_metadata_endpoint_displays_xml_as_expected()
37     {
38         $req = $this->get('/saml2/metadata');
39         $req->assertHeader('Content-Type', 'text/xml; charset=UTF-8');
40         $req->assertSee('md:EntityDescriptor');
41         $req->assertSee(url('/saml2/acs'));
42     }
43
44     public function test_onelogin_overrides_functions_as_expected()
45     {
46         $json = '{"sp": {"assertionConsumerService": {"url": "https://example.com/super-cats"}}, "contactPerson": {"technical": {"givenName": "Barry Scott", "emailAddress": "barry@example.com"}}}';
47         config()->set(['saml2.onelogin_overrides' => $json]);
48
49         $req = $this->get('/saml2/metadata');
50         $req->assertSee('https://example.com/super-cats');
51         $req->assertSee('md:ContactPerson');
52         $req->assertSee('<md:GivenName>Barry Scott</md:GivenName>', false);
53     }
54
55     public function test_login_option_shows_on_login_page()
56     {
57         $req = $this->get('/login');
58         $req->assertSeeText('SingleSignOn-Testing');
59         $req->assertElementExists('form[action$="/saml2/login"][method=POST] button');
60     }
61
62     public function test_login()
63     {
64         $req = $this->post('/saml2/login');
65         $redirect = $req->headers->get('location');
66         $this->assertStringStartsWith('http://saml.local/saml2/idp/SSOService.php', $redirect, 'Login redirects to SSO location');
67
68         config()->set(['saml2.onelogin.strict' => false]);
69         $this->assertFalse($this->isAuthenticated());
70
71         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
72         $redirect = $acsPost->headers->get('Location');
73         $acsId = explode('?id=', $redirect)[1];
74         $this->assertTrue(strlen($acsId) > 12);
75
76         $this->assertStringContainsString('/saml2/acs?id=', $redirect);
77         $this->assertTrue(cache()->has('saml2_acs:' . $acsId));
78
79         $acsGet = $this->get($redirect);
80         $acsGet->assertRedirect('/');
81         $this->assertFalse(cache()->has('saml2_acs:' . $acsId));
82
83         $this->assertTrue($this->isAuthenticated());
84         $this->assertDatabaseHas('users', [
85             'email'            => 'user@example.com',
86             'external_auth_id' => 'user',
87             'email_confirmed'  => false,
88             'name'             => 'Barry Scott',
89         ]);
90     }
91
92     public function test_acs_process_id_randomly_generated()
93     {
94         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
95         $redirectA = $acsPost->headers->get('Location');
96
97         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
98         $redirectB = $acsPost->headers->get('Location');
99
100         $this->assertFalse($redirectA === $redirectB);
101     }
102
103     public function test_process_acs_endpoint_cant_be_called_with_invalid_id()
104     {
105         $resp = $this->get('/saml2/acs');
106         $resp->assertRedirect('/login');
107         $this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
108
109         $resp = $this->get('/saml2/acs?id=abc123');
110         $resp->assertRedirect('/login');
111         $this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
112     }
113
114     public function test_group_role_sync_on_login()
115     {
116         config()->set([
117             'saml2.onelogin.strict'    => false,
118             'saml2.user_to_groups'     => true,
119             'saml2.remove_from_groups' => false,
120         ]);
121
122         $memberRole = Role::factory()->create(['external_auth_id' => 'member']);
123         $adminRole = Role::getSystemRole('admin');
124
125         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
126         $user = User::query()->where('external_auth_id', '=', 'user')->first();
127
128         $userRoleIds = $user->roles()->pluck('id');
129         $this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
130         $this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
131     }
132
133     public function test_group_role_sync_removal_option_works_as_expected()
134     {
135         config()->set([
136             'saml2.onelogin.strict'    => false,
137             'saml2.user_to_groups'     => true,
138             'saml2.remove_from_groups' => true,
139         ]);
140
141         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
142         $user = User::query()->where('external_auth_id', '=', 'user')->first();
143
144         $randomRole = Role::factory()->create(['external_auth_id' => 'random']);
145         $user->attachRole($randomRole);
146         $this->assertContains($randomRole->id, $user->roles()->pluck('id'));
147
148         auth()->logout();
149         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
150         $this->assertNotContains($randomRole->id, $user->roles()->pluck('id'));
151     }
152
153     public function test_logout_link_directs_to_saml_path()
154     {
155         config()->set([
156             'saml2.onelogin.strict' => false,
157         ]);
158
159         $resp = $this->actingAs($this->getEditor())->get('/');
160         $resp->assertElementContains('form[action$="/saml2/logout"] button', 'Logout');
161     }
162
163     public function test_logout_sls_flow()
164     {
165         config()->set([
166             'saml2.onelogin.strict' => false,
167         ]);
168
169         $handleLogoutResponse = function () {
170             $this->assertTrue($this->isAuthenticated());
171
172             $req = $this->get('/saml2/sls');
173             $req->assertRedirect('/');
174             $this->assertFalse($this->isAuthenticated());
175         };
176
177         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
178
179         $req = $this->post('/saml2/logout');
180         $redirect = $req->headers->get('location');
181         $this->assertStringStartsWith('http://saml.local/saml2/idp/SingleLogoutService.php', $redirect);
182         $this->withGet(['SAMLResponse' => $this->sloResponseData], $handleLogoutResponse);
183     }
184
185     public function test_logout_sls_flow_when_sls_not_configured()
186     {
187         config()->set([
188             'saml2.onelogin.strict'                      => false,
189             'saml2.onelogin.idp.singleLogoutService.url' => null,
190         ]);
191
192         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
193         $this->assertTrue($this->isAuthenticated());
194
195         $req = $this->post('/saml2/logout');
196         $req->assertRedirect('/');
197         $this->assertFalse($this->isAuthenticated());
198     }
199
200     public function test_dump_user_details_option_works()
201     {
202         config()->set([
203             'saml2.onelogin.strict'   => false,
204             'saml2.dump_user_details' => true,
205         ]);
206
207         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
208         $acsPost->assertJsonStructure([
209             'id_from_idp',
210             'attrs_from_idp'      => [],
211             'attrs_after_parsing' => [],
212         ]);
213     }
214
215     public function test_saml_routes_are_only_active_if_saml_enabled()
216     {
217         config()->set(['auth.method' => 'standard']);
218         $getRoutes = ['/metadata', '/sls'];
219         foreach ($getRoutes as $route) {
220             $req = $this->get('/saml2' . $route);
221             $this->assertPermissionError($req);
222         }
223
224         $postRoutes = ['/login', '/acs', '/logout'];
225         foreach ($postRoutes as $route) {
226             $req = $this->post('/saml2' . $route);
227             $this->assertPermissionError($req);
228         }
229     }
230
231     public function test_forgot_password_routes_inaccessible()
232     {
233         $resp = $this->get('/password/email');
234         $this->assertPermissionError($resp);
235
236         $resp = $this->post('/password/email');
237         $this->assertPermissionError($resp);
238
239         $resp = $this->get('/password/reset/abc123');
240         $this->assertPermissionError($resp);
241
242         $resp = $this->post('/password/reset');
243         $this->assertPermissionError($resp);
244     }
245
246     public function test_standard_login_routes_inaccessible()
247     {
248         $resp = $this->post('/login');
249         $this->assertPermissionError($resp);
250
251         $resp = $this->post('/logout');
252         $this->assertPermissionError($resp);
253     }
254
255     public function test_user_invite_routes_inaccessible()
256     {
257         $resp = $this->get('/register/invite/abc123');
258         $this->assertPermissionError($resp);
259
260         $resp = $this->post('/register/invite/abc123');
261         $this->assertPermissionError($resp);
262     }
263
264     public function test_user_register_routes_inaccessible()
265     {
266         $resp = $this->get('/register');
267         $this->assertPermissionError($resp);
268
269         $resp = $this->post('/register');
270         $this->assertPermissionError($resp);
271     }
272
273     public function test_email_domain_restriction_active_on_new_saml_login()
274     {
275         $this->setSettings([
276             'registration-restrict' => 'testing.com',
277         ]);
278         config()->set([
279             'saml2.onelogin.strict' => false,
280         ]);
281
282         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
283         $acsPost->assertSeeText('That email domain does not have access to this application');
284         $this->assertFalse(auth()->check());
285         $this->assertDatabaseMissing('users', ['email' => 'user@example.com']);
286     }
287
288     public function test_group_sync_functions_when_email_confirmation_required()
289     {
290         setting()->put('registration-confirmation', 'true');
291         config()->set([
292             'saml2.onelogin.strict'    => false,
293             'saml2.user_to_groups'     => true,
294             'saml2.remove_from_groups' => false,
295         ]);
296
297         $memberRole = Role::factory()->create(['external_auth_id' => 'member']);
298         $adminRole = Role::getSystemRole('admin');
299
300         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
301
302         $this->assertEquals('http://localhost/register/confirm', url()->current());
303         $acsPost->assertSee('Please check your email and click the confirmation button to access BookStack.');
304         /** @var User $user */
305         $user = User::query()->where('external_auth_id', '=', 'user')->first();
306
307         $userRoleIds = $user->roles()->pluck('id');
308         $this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
309         $this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
310         $this->assertFalse(boolval($user->email_confirmed), 'User email remains unconfirmed');
311
312         $this->assertNull(auth()->user());
313         $homeGet = $this->get('/');
314         $homeGet->assertRedirect('/login');
315     }
316
317     public function test_login_where_existing_non_saml_user_shows_warning()
318     {
319         $this->post('/saml2/login');
320         config()->set(['saml2.onelogin.strict' => false]);
321
322         // Make the user pre-existing in DB with different auth_id
323         User::query()->forceCreate([
324             'email'            => 'user@example.com',
325             'external_auth_id' => 'old_system_user_id',
326             'email_confirmed'  => false,
327             'name'             => 'Barry Scott',
328         ]);
329
330         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
331         $this->assertFalse($this->isAuthenticated());
332         $this->assertDatabaseHas('users', [
333             'email'            => 'user@example.com',
334             'external_auth_id' => 'old_system_user_id',
335         ]);
336
337         $acsPost->assertSee('A user with the email user@example.com already exists but with different credentials');
338     }
339
340     public function test_login_request_contains_expected_default_authncontext()
341     {
342         $authReq = $this->getAuthnRequest();
343         $this->assertStringContainsString('samlp:RequestedAuthnContext Comparison="exact"', $authReq);
344         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>', $authReq);
345     }
346
347     public function test_false_idp_authncontext_option_does_not_pass_authncontext_in_saml_request()
348     {
349         config()->set(['saml2.onelogin.security.requestedAuthnContext' => false]);
350         $authReq = $this->getAuthnRequest();
351         $this->assertStringNotContainsString('samlp:RequestedAuthnContext', $authReq);
352         $this->assertStringNotContainsString('<saml:AuthnContextClassRef>', $authReq);
353     }
354
355     public function test_array_idp_authncontext_option_passes_value_as_authncontextclassref_in_request()
356     {
357         config()->set(['saml2.onelogin.security.requestedAuthnContext' => ['urn:federation:authentication:windows', 'urn:federation:authentication:linux']]);
358         $authReq = $this->getAuthnRequest();
359         $this->assertStringContainsString('samlp:RequestedAuthnContext', $authReq);
360         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:windows</saml:AuthnContextClassRef>', $authReq);
361         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:linux</saml:AuthnContextClassRef>', $authReq);
362     }
363
364     protected function getAuthnRequest(): string
365     {
366         $req = $this->post('/saml2/login');
367         $location = $req->headers->get('Location');
368         $query = explode('?', $location)[1];
369         $params = [];
370         parse_str($query, $params);
371
372         return gzinflate(base64_decode($params['SAMLRequest']));
373     }
374
375     protected function withGet(array $options, callable $callback)
376     {
377         return $this->withGlobal($_GET, $options, $callback);
378     }
379
380     protected function withGlobal(array &$global, array $options, callable $callback)
381     {
382         $original = [];
383         foreach ($options as $key => $val) {
384             $original[$key] = $global[$key] ?? null;
385             $global[$key] = $val;
386         }
387
388         $callback();
389
390         foreach ($options as $key => $val) {
391             $val = $original[$key];
392             if ($val) {
393                 $global[$key] = $val;
394             } else {
395                 unset($global[$key]);
396             }
397         }
398     }
399
400     /**
401      * The post data for a callback for single-sign-in.
402      * Provides the following attributes:
403      * array:5 [
404      * "uid" => array:1 [
405      * 0 => "user"
406      * ]
407      * "first_name" => array:1 [
408      * 0 => "Barry"
409      * ]
410      * "last_name" => array:1 [
411      * 0 => "Scott"
412      * ]
413      * "email" => array:1 [
414      * 0 => "user@example.com"
415      * ]
416      * "user_groups" => array:2 [
417      * 0 => "member"
418      * 1 => "admin"
419      * ]
420      * ].
421      */
422     protected $acsPostData = '<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_4dd4564dc794061ef1baa0467d79028ced3ce54bee" Version="2.0" IssueInstant="2019-11-17T17:53:39Z" Destination="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_4dd4564dc794061ef1baa0467d79028ced3ce54bee"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>vmh/S75Nf+g+ecDJCzAbZWKJVlug7BfsC+9aWNeIreQ=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEazCCAtOgAwIBAgIUe7a088Cnr4izmrnBEnx5q3HTMvYwDQYJKoZIhvcNAQELBQAwRTELMAkGA1UEBhMCR0IxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xOTExMTYxMjE3MTVaFw0yOTExMTUxMjE3MTVaMEUxCzAJBgNVBAYTAkdCMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDzLe9FfdyplTxHp4SuQ9gQtZT3t+SDfvEL72ppCfFZw7+B5s5B/T73aXpoQ3S53pGI1RIWCge2iCUQ2tzm27aSNH0iu9aJYcUQZ/RITqd0ayyDks1NA2PT3TW6t3m7KV5re4P0Nb+YDeuyHdkz+jcMtpn8CmBoT0H+skha0hiqINkjkRPiHvLHVGp+tHUEA/I6mN4aB/UExSTLs79NsLUfteqqxe9+tvdUaToyDPrhPFjONs+9NKCkzIC6vcv7J6AtuKG6nET+zB9yOWgtGYQifXqQA2y5dL81BB0q5uMaBLS2pq3aPPjzU2F3+EysjySWTnCkfk7C5SsCXRu8Q+U95tunpNfwf5olE6Was48NMM+PwV7iCNMPkNzllq6PCiM+P8DrMSczzUZZQUSv6dSwPCo+YSVimEM0Og3XJTiNhQ5ANlaIn66Kw5gfoBfuiXmyIKiSDyAiDYmFaf4395wWwLkTR+cw8WfjaHswKZTomn1MR3OJsY2UJ0eRBYM+YSsCAwEAAaNTMFEwHQYDVR0OBBYEFImp2CYCGfcb7w91H/cShTCkXwR/MB8GA1UdIwQYMBaAFImp2CYCGfcb7w91H/cShTCkXwR/MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggGBAA+g/C7uL9ln+W+qBknLW81kojYflgPK1I1MHIwnMvl/ZTHX4dRXKDrk7KcUq1KjqajNV66f1cakp03IijBiO0Xi1gXUZYLoCiNGUyyp9XloiIy9Xw2PiWnrw0+yZyvVssbehXXYJl4RihBjBWul9R4wMYLOUSJDe2WxcUBhJnxyNRs+P0xLSQX6B2n6nxoDko4p07s8ZKXQkeiZ2iwFdTxzRkGjthMUv704nzsVGBT0DCPtfSaO5KJZW1rCs3yiMthnBxq4qEDOQJFIl+/LD71KbB9vZcW5JuavzBFmkKGNro/6G1I7el46IR4wijTyNFCYUuD9dtignNmpWtN8OW+ptiL/jtTySWukjys0s+vLn83CVvjB0dJtVAIYOgXFdIuii66gczwwM/LGiOExJn0dTNzsJ/IYhpxL4FBEuP0pskY0o0aUlJ2LS2j+wSQTRKsBgMjyrUrekle2ODStStn3eabjIx0/FHlpFr0jNIm/oMP7kwjtUX4zaNe47QI4Gg==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_6842df9c659f13fe5196cd9ef6c2f028364ae943b1" Version="2.0" IssueInstant="2019-11-17T17:53:39Z"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_6842df9c659f13fe5196cd9ef6c2f028364ae943b1"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>krb5w6S8toXc/eSwZPUOBvQzn3os4JACuxxrJkxpgFw=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>2qqmAkxnqxNksyyxyvqST51L89U/YtzckkuzAxr/aCRS+SOG85bAMZo/SznswtMYAbQQCEFoDujgMvZsHYw6TvvaGjyWYJQ5VrahezfZIiBUE44pmXak8+0WItY5gvpFIxqXVZFgERKvTLfeQB38d1VPsFUgDXut8U/Pvn7uvpuvcUz+1E29EJGaY/GgvxT7KrYORA8wJ+MuTsQVmjseRxoyRSz08Nbwe2H8jWBzEYcqYl2+Fg+hp5gtKmzVhKFpd5vA67AIz55stBcG5+04rUijEK4sr/qkLyBkJB7KvL3jvJpo3B8qbLXyxKoWRJdgk8J4s/MZuAi7Ae1QsSN9vgvSuTesEBR5iHrnKYklJQYskmD3m++za8SSQnpe3E3aFAczzpITuD8bABZdjqI6NHkJaQApfoHV5T+gn8z7TMk+I+TSbeADnmLBKyg0tZmmt/FJl5zyj0VlpsWsMS69Q6mFIU+jpHRjzNoaK1S5vT7emGmHJIJtqiNurQ7KdBPI</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="http://bookstack.local/saml2/metadata" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_2c7ab86eb8f1d1063443f219cc5868ff66708912e3</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2019-11-17T17:58:39Z" Recipient="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2019-11-17T17:53:09Z" NotOnOrAfter="2019-11-17T17:58:39Z"><saml:AudienceRestriction><saml:Audience>http://bookstack.local/saml2/metadata</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2019-11-17T17:53:39Z" SessionNotOnOrAfter="2019-11-18T01:53:39Z" SessionIndex="_4fe7c0d1572d64b27f930aa6f236a6f42e930901cc"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue></saml:Attribute><saml:Attribute Name="first_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Barry</saml:AttributeValue></saml:Attribute><saml:Attribute Name="last_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Scott</saml:AttributeValue></saml:Attribute><saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="user_groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">member</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>';
423
424     protected $sloResponseData = 'fZHRa8IwEMb/lZJ3bdJa04a2MOYYglOY4sNe5JKms9gmpZfC/vxF3ZjC8OXgLvl938ddjtC1vVjZTzu6d429NaiDr641KC5PBRkHIyxgg8JAp1E4JbZPbysRTanoB+ussi25QR4TgKgH11hDguWiIIeawTxOaK1iPYt5XcczHUlJeVRlMklBJjOuM1qDVCTY6wE9WRAv5HHEUS8NOjDOjyjLJoxNGN+xVESpSNgHCRYaXWPAXaijc70IQ2ntyUPqNG2tgjY8Z45CbNFLmt8V7GxBNuuX1eZ1uT7EcZJKAE4TJhXPaMxlVlFffPKKJnXE5ryusoiU+VlMXJIN5Y/feXRn1VR92GkHFTiY9sc+D2+p/HqRrQM34n33bCsd7KEd9eMd4+W32I5KaUQSlleHP9Hwv6uX3w==';
425
426     protected $testCert = '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';
427 }
Morty Proxy This is a proxified and sanitized view of the page, visit original site.