Skip to content

Instantly share code, notes, and snippets.

@truongnmt
Created January 21, 2020 10:38
Show Gist options
  • Save truongnmt/362e3ccc5c3049a952e0ad54a3c7b2d1 to your computer and use it in GitHub Desktop.
Save truongnmt/362e3ccc5c3049a952e0ad54a3c7b2d1 to your computer and use it in GitHub Desktop.
saml response
<samlp:Response
ID="_a2aec7e7-1843-443c-9af3-da94e69d5113"
Version="2.0"
IssueInstant="2020-01-21T06:59:36.653Z"
Destination="https://localhost:4447/acs"
InResponseTo="_9ecd6234ec0396a49a33a8a2ae0a9f8d2acc1b2a" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion">https://sts.windows.net/xxxx-xxxx-xxxx/
</Issuer>
<samlp:Status>
<samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
</samlp:Status>
<Assertion ID="_cc074cf4-34f6-464e-a198-6440bd998b00" IssueInstant="2020-01-21T06:59:36.638Z" Version="2.0"
xmlns="urn:oasis:names:tc:SAML:2.0:assertion">
<Issuer>https://sts.windows.net/xxxx-xxxx-xxxx/</Issuer>
<Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
<SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
<Reference URI="#_cc074cf4-34f6-464e-a198-6440bd998b00">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
<DigestValue>HTSKMJlCtFcMrp6zsNiOtV4mrpP8sQi2IJHGqwjgqWU=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>
Te0d/GEDA3mwrD6nAq8fLjj3iNIfxxxx-xxxx-xxxx==
</SignatureValue>
<KeyInfo>
<X509Data>
<X509Certificate>
MIIC8DCCAdigAwIBAgIQc5Zjxxxx-xxxx-xxxx
</X509Certificate>
</X509Data>
</KeyInfo>
</Signature>
<Subject>
<NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">truong@xxxx-xxxx-xxxx</NameID>
<SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
<SubjectConfirmationData InResponseTo="_9ecd6234ec0396a49a33a8a2ae0a9f8d2acc1b2a"
NotOnOrAfter="2020-01-21T07:59:36.450Z" Recipient="https://localhost:4447/acs"/>
</SubjectConfirmation>
</Subject>
<Conditions NotBefore="2020-01-21T06:54:36.450Z" NotOnOrAfter="2020-01-21T07:59:36.450Z">
<AudienceRestriction>
<Audience>https://localhost:4447/saml/metadata</Audience>
</AudienceRestriction>
</Conditions>
<AttributeStatement>
<Attribute Name="http://schemas.microsoft.com/identity/claims/tenantid">
<AttributeValue>xxxx-xxxx-xxxx</AttributeValue>
</Attribute>
<Attribute Name="http://schemas.microsoft.com/identity/claims/objectidentifier">
<AttributeValue>xxxx-xxxx-xxxx</AttributeValue>
</Attribute>
<Attribute Name="http://schemas.microsoft.com/identity/claims/displayname">
<AttributeValue>Truong</AttributeValue>
</Attribute>
<Attribute Name="http://schemas.microsoft.com/identity/claims/identityprovider">
<AttributeValue>https://sts.windows.net/xxxx-xxxx-xxxx/</AttributeValue>
</Attribute>
<Attribute Name="http://schemas.microsoft.com/claims/authnmethodsreferences">
<AttributeValue>http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password</AttributeValue>
<AttributeValue>http://schemas.microsoft.com/claims/multipleauthn</AttributeValue>
</Attribute>
<Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name">
<AttributeValue>truong@xxxx-xxxx-xxxx</AttributeValue>
</Attribute>
</AttributeStatement>
<AuthnStatement AuthnInstant="2020-01-17T09:06:03.241Z" SessionIndex="_cc074cf4-34f6-464e-a198-6440bd998b00">
<AuthnContext>
<AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</AuthnContextClassRef>
</AuthnContext>
</AuthnStatement>
</Assertion>
</samlp:Response>
@prdtaj
Copy link

prdtaj commented Aug 24, 2022

how to create this file can you please assist me?

@truongnmt
Copy link
Author

You can install this plugin and do a SAML authentication. You can see the SAML message in the plugin console.
https://chrome.google.com/webstore/detail/saml-chrome-panel/paijfdbeoenhembfhkhllainmocckace

@truongnmt
Copy link
Author

I use the same way to capture this SAML file. Hope it helps.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment