Spring SAML ADFS:java.security.InvalidKeyException

Posted

技术标签:

【中文标题】Spring SAML ADFS:java.security.InvalidKeyException【英文标题】:Spring SAML ADFS: java.security.InvalidKeyException 【发布时间】:2013-09-24 11:20:05 【问题描述】:

我的任务是实现对带有 LDAP 的 Active Directory 联合服务 (SSL) 的可访问性。 首先我不得不说我在 ADFS 和 SAML 方面的经验非常少。 我决定采用 Spring Security SAML Extension 来实现此功能。 我从 GIThub 下载并安装了 Spring Security 项目的 SAML 扩展: https://github.com/spring-projects/spring-security-saml

我在官方文档中找到的 http://docs.spring.io/spring-security-saml/docs/1.0.x/reference/html/ 在“6. IDP 集成指南”点下,我已经完成了所有操作。

我从 ADFS 服务器下载元数据 我将下载的元数据存储在 saml2-sample/WEB-INF/src/main/resources/security/FederationMetadata.xml 下,并增强了 securityContext.xml 的描述方式 启动 Web 应用程序后,系统会自动生成元数据文档 我创建了一个 metadata.xml 并将其提供给 ADFS 服务器的系统管理员 系统管理员完成了其余的工作。

在此之后我想测试登录。在我选择 IDP 并单击登录按钮后,我被要求提供凭据。 传输凭据后,我得到以下结果/异常:

- Evaluating security policy of type 'org.opensaml.ws.security.provider.BasicSecurityPolicy' for decoded message
- SAML protocol message was not signed, skipping XML signature processing
- Successfully decoded message.
- Checking SAML message intended destination endpoint against receiver endpoint
- Intended message destination endpoint: ........
- Actual message receiver endpoint: ........
- SAML message intended destination endpoint matched recipient endpoint
- Verifying issuer of the message
- Decrypting assertion
- Getting key iterator from next resolver: class org.opensaml.xml.encryption.InlineEncryptedKeyResolver
- Found matching encrypted key: org.opensaml.xml.encryption.impl.EncryptedKeyImpl@78f5b81e
- Added decryption key algorithm criteria: RSA
- Error decrypting the encrypted data element
org.apache.xml.security.encryption.XMLEncryptionException: Illegal key size
Original Exception was java.security.InvalidKeyException: Illegal key size
    at org.apache.xml.security.encryption.XMLCipher.decryptToByteArray(Unknown Source)
    at org.opensaml.xml.encryption.Decrypter.decryptDataToDOM(Decrypter.java:574)
    at org.opensaml.xml.encryption.Decrypter.decryptUsingResolvedEncryptedKey(Decrypter.java:763)
    at org.opensaml.xml.encryption.Decrypter.decryptDataToDOM(Decrypter.java:513)
    at org.opensaml.xml.encryption.Decrypter.decryptDataToList(Decrypter.java:440)
    at org.opensaml.xml.encryption.Decrypter.decryptData(Decrypter.java:401)
    at org.opensaml.saml2.encryption.Decrypter.decryptData(Decrypter.java:141)
    at org.opensaml.saml2.encryption.Decrypter.decrypt(Decrypter.java:69)
    at org.springframework.security.saml.websso.WebSSOProfileConsumerImpl.processAuthenticationResponse(WebSSOProfileConsumerImpl.java:190)
    at org.springframework.security.saml.SAMLAuthenticationProvider.authenticate(SAMLAuthenticationProvider.java:81)
    at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:156)
    at org.springframework.security.saml.SAMLProcessingFilter.attemptAuthentication(SAMLProcessingFilter.java:84)
    at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:195)
    at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342)
    at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:192)
    at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:166)
    at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342)
    at org.springframework.security.web.context.SecurityContextPersistenceFilter.doFilter(SecurityContextPersistenceFilter.java:87)
    at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342)
    at org.springframework.security.saml.metadata.MetadataGeneratorFilter.doFilter(MetadataGeneratorFilter.java:86)
    at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:342)
    at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:192)
    at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:160)
    at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:346)
    at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:259)
    at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:243)
    at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:210)
    at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:222)
    at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:123)
    at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:502)
    at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:171)
    at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:99)
    at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:953)
    at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:118)
    at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:408)
    at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1023)
    at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:589)
    at org.apache.tomcat.util.net.JIoEndpoint$SocketProcessor.run(JIoEndpoint.java:312)
    at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
    at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
    at java.lang.Thread.run(Thread.java:724)

谁能帮我解决这个问题?

最好的问候 托马斯

【问题讨论】:

【参考方案1】:

这可能是由于 Java 最初有限的加密功能造成的。 Spring Securtiy SAML 扩展的文档可能会解决这个问题:

由于美国出口限制,Java JDK 附带了一组有限的 密码学能力。使用 SAML 扩展可能需要 安装无限强度管辖权政策文件,其中 消除了这些限制。

您可以从http://www.oracle.com/technetwork/java/javase/downloads/index.html 获取 Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 7 - 这应该可以解决问题。

【讨论】:

【参考方案2】:

这可能是因为您生成的密钥太小 - 请尝试

-keysize 2048

keytool 命令中的参数。

【讨论】:

以上是关于Spring SAML ADFS:java.security.InvalidKeyException的主要内容,如果未能解决你的问题,请参考以下文章

为啥 spring-saml-extension 和 adfs 2.0 返回 403 错误?

配置 ADFS 3.0 / SAML 2.0 以使用 Spring Security 进行 SSO 集成

ADFS 和 Spring-SAML 应用程序之间的循环

配置 ADFS / Spring Security 以接受未签名的 SAML AuthnRequest

Tomcat/ADFS 集成的 Spring SAML 异常

Spring SAML ADFS:java.security.InvalidKeyException