Created
July 26, 2019 04:38
-
-
Save ostertoaster/3d322c8d2c9a48d9f8c3bb34cd7e12d0 to your computer and use it in GitHub Desktop.
idp-process.log 2019-07-25
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019-07-25 21:28:50,160 - DEBUG [net.shibboleth.idp.attribute.resolver.impl.AttributeResolverImpl:236] - Attribute Resolver 'ShibbolethAttributeResolver': Final resolved attribute collection: [uid, mail, eduPersonScopedAffiliation, givenName, eduPersonPrincipalName, sn, eduPersonPrincipalNameWid] | |
2019-07-25 21:28:50,175 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:125] - Attribute filtering engine 'ShibbolethAttributeFilter' Beginning process of filtering the following 7 attributes: [uid, mail, eduPersonScopedAffiliation, givenName, eduPersonPrincipalName, sn, eduPersonPrincipalNameWid] | |
2019-07-25 21:28:50,175 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:128] - Attribute Filter Policy 'testshib1' Checking if attribute filter policy is active | |
2019-07-25 21:28:50,176 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_8425d9a134bb2b1d1643884c7d7c30ef': Found attribute requester: BambooHR-SAML | |
2019-07-25 21:28:50,177 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:137] - Attribute Filter Policy 'testshib1' Policy is not active for this request | |
2019-07-25 21:28:50,177 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:128] - Attribute Filter Policy 'hathitrust1' Checking if attribute filter policy is active | |
2019-07-25 21:28:50,178 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_7bc3a46089f9900f4d9d9560a29c25c3': Found attribute requester: BambooHR-SAML | |
2019-07-25 21:28:50,178 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:137] - Attribute Filter Policy 'hathitrust1' Policy is not active for this request | |
2019-07-25 21:28:50,178 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:128] - Attribute Filter Policy 'BambooHR-SAML' Checking if attribute filter policy is active | |
2019-07-25 21:28:50,179 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterRegexpPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_ee5ec20afb033784bd3284645d5914b0': Found attribute requester: BambooHR-SAML | |
2019-07-25 21:28:50,179 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:137] - Attribute Filter Policy 'BambooHR-SAML' Policy is not active for this request | |
2019-07-25 21:28:50,180 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:128] - Attribute Filter Policy 'sans-sth1' Checking if attribute filter policy is active | |
2019-07-25 21:28:50,180 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_fe6e4ba0b2b875625f0d752698523226': Found attribute requester: BambooHR-SAML | |
2019-07-25 21:28:50,180 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:137] - Attribute Filter Policy 'sans-sth1' Policy is not active for this request | |
2019-07-25 21:28:50,181 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:128] - Attribute Filter Policy 'everfi1' Checking if attribute filter policy is active | |
2019-07-25 21:28:50,181 - DEBUG [net.shibboleth.idp.attribute.filter.policyrule.filtercontext.impl.AttributeRequesterPolicyRule:54] - Attribute Filter '/AttributeFilterPolicyGroup:ShibbolethFilterPolicy/PolicyRequirementRule:_ab6ea7df8b5191d7e902f711d45b364e': Found attribute requester: BambooHR-SAML | |
2019-07-25 21:28:50,181 - DEBUG [net.shibboleth.idp.attribute.filter.AttributeFilterPolicy:137] - Attribute Filter Policy 'everfi1' Policy is not active for this request | |
2019-07-25 21:28:50,182 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute uid values | |
2019-07-25 21:28:50,182 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute mail values | |
2019-07-25 21:28:50,183 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute eduPersonScopedAffiliation values | |
2019-07-25 21:28:50,183 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute givenName values | |
2019-07-25 21:28:50,183 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute eduPersonScopedAffiliation values | |
2019-07-25 21:28:50,183 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute givenName values | |
2019-07-25 21:28:50,183 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute eduPersonPrincipalName values | |
2019-07-25 21:28:50,184 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute sn values | |
2019-07-25 21:28:50,185 - DEBUG [net.shibboleth.idp.attribute.filter.impl.AttributeFilterImpl:176] - Attribute filtering engine 'ShibbolethAttributeFilter': no policy permitted release of attribute eduPersonPrincipalNameWid values | |
2019-07-25 21:28:50,240 - DEBUG [net.shibboleth.idp.saml.profile.impl.BaseAddAuthenticationStatementToAssertion:170] - Profile Action AddAuthnStatementToAssertion: Attempting to add an AuthenticationStatement to outgoing Assertion | |
2019-07-25 21:28:50,245 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAuthnStatementToAssertion:165] - Profile Action AddAuthnStatementToAssertion: Added AuthenticationStatement to Assertion _063af7bee10378f08d92c0a7f730b92f | |
2019-07-25 21:28:50,265 - DEBUG [net.shibboleth.idp.saml.profile.impl.BaseAddAttributeStatementToAssertion:229] - Profile Action AddAttributeStatementToAssertion: Attempting to add an AttributeStatement to outgoing Assertion | |
2019-07-25 21:28:50,266 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:137] - Profile Action AddAttributeStatementToAssertion: No attributes available to be encoded, nothing to do | |
2019-07-25 21:28:50,266 - DEBUG [net.shibboleth.idp.saml.saml2.profile.impl.AddAttributeStatementToAssertion:103] - Profile Action AddAttributeStatementToAssertion: No AttributeStatement was built, nothing to do | |
2019-07-25 21:28:50,290 - DEBUG [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:197] - Checking for source attribute mail | |
2019-07-25 21:28:50,291 - INFO [net.shibboleth.idp.saml.nameid.impl.AttributeSourcedSAML2NameIDGenerator:227] - Attribute sources [mail] did not produce a usable identifier | |
2019-07-25 21:28:50,292 - WARN [org.opensaml.saml.saml2.profile.impl.AddNameIDToSubjects:337] - Profile Action AddNameIDToSubjects: Request specified use of an unsupportable identifier format: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress | |
2019-07-25 21:28:50,304 - WARN [org.opensaml.profile.action.impl.LogEvent:105] - A non-proceed event occurred while processing the request: InvalidNameIDPolicy | |
2019-07-25 21:28:50,396 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:179] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler of type 'org.opensaml.messaging.handler.impl.BasicMessageHandlerChain' on OUTBOUND message context | |
2019-07-25 21:28:50,397 - DEBUG [net.shibboleth.idp.profile.impl.WebFlowMessageHandlerAdaptor:195] - Profile Action WebFlowMessageHandlerAdaptor: Invoking message handler on message context containing a message of type 'org.opensaml.saml.saml2.core.impl.ResponseImpl' | |
2019-07-25 21:28:50,450 - DEBUG [net.shibboleth.idp.saml.profile.impl.SpringAwareMessageEncoderFactory:100] - Looking up message encoder based on binding URI: urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST | |
2019-07-25 21:28:50,480 - DEBUG [net.shibboleth.idp.profile.impl.RecordResponseComplete:89] - Profile Action RecordResponseComplete: Record response complete |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment