PingAM 8.0.0

IdP adapter

Use the IdP adapter to alter the processing of the authentication request at a particular point in the SAML journey, such as to redirect the user before single sign-on takes place, or before a failure response is sent.

This task assumes your environment is already correctly configured for single sign-on using SAML v2.0, where AM is the hosted IdP.

The IdP adapter provides hooks at the following points in assertion processing:

Extension point Description

preSingleSignOn

Invoked when the authentication request is first received. Only applicable to SP-initiated flows.

preAuthentication

Invoked before the request is redirected for authentication. Only applicable to SP-initiated flows.

preSendResponse

Invoked after the user has successfully authenticated or for an existing valid session, before the response is sent.

preSignResponse

Invoked after the response has been constructed, but before the response is signed, to let you customize the content of the SAML response.

preSendFailureResponse

Invoked before a SAML error response is returned. Only applicable to SP-initiated flows.

Java implementation

To create a custom IdP adapter in Java, follow these high-level steps:

  1. Include the openam-federation-library as a dependency in your Maven project.

  2. Write a Java class that implements the org.forgerock.openam.saml2.plugins.IDPAdapter interface, or extends the com.sun.identity.saml2.plugins.DefaultIDPAdapter class.

  3. Override one of the methods described in the extension points table to customize the authentication journey.

  4. Package your custom class in a JAR file and copy to the /WEB-INF/lib folder where you deployed AM.

  5. Configure AM to use the new Java plugin.

    1. In the AM admin UI, go to Realms > Realm Name > Applications > Federation > Entity Providers > Hosted IDP Name > Advanced.

    2. In the IDP Adapter Class field, type the fully qualified name of your custom class.

    3. Save your changes.

  6. Restart AM or the container in which it runs.

  7. Test your changes using an appropriate mode of single-sign on.

    For example, note that some extension points are only invoked during SP-initiated flows.

Scripted implementation

Complete the following steps to implement an example IdP adapter script that determines whether the authentication journey should be redirected based on the evaluation of a policy.

Learn about IdP adapter scripts from the following resources:

  • To view the default script, refer to saml2-idp-adapter.js.

  • To modify the default script, go to Realms > Realm Name > Scripts and select SAML2 IDP Adapter Script.

  • To view the available bindings, refer to the IDP adapter scripting API.

  1. For this example, configure a policy that belongs to a policy set named saml:

    1. In the AM admin UI, go to Realms > Realm Name > Authorization > Resource Types to create a new resource type with the following values:

      • Name: SAML SP Access

      • Pattern: *

      • Action: Assert (Default State: Deny)

    2. Go to Policy Sets to create a new policy set:

      • Id: saml

      • Name: saml

      • Resource Types: SAML SP Access

    3. Add a new policy:

      • Name: SAML Access Policy

      • Resource Types: SAML SP Access

      • Resources: *

      • Actions: ASSERT:Denied

      • Response Attributes: redirect_uri: https://example.com

      • Subjects: "type": "AuthenticatedUsers"

  2. To modify the default script, go to Scripts, and click SAML2 IDP Adapter Script. Alternatively, create a new script of type Saml2 IDP Adapter.

    1. In the Script field, add code to the preSendResponse function to redirect or send an error response if the policy for the SP evaluates to false. For example:

      function preSendResponse () {
      
        var frJava = JavaImporter(
          com.sun.identity.saml2.common.SAML2Exception);
      
        try {
          var ents = idpAdapterScriptHelper.getEntitlements(
              "saml", realm, session, authnRequest).iterator();
          while(ents.hasNext()){
            var entitlement = ents.next();
            var isAllowed = entitlement.getActionValue("Assert");
      
            if(isAllowed != null && isAllowed == true){
              return false;
            } else{
              var redirectUris = entitlement.getAttributes().get("redirect_uri");
      
              if (redirectUris == null || redirectUris.isEmpty()){
                logger.error("No redirect_uri");
                response.sendError(403);
              } else{
                var redirectUri = redirectUris.iterator().next();
                response.sendRedirect(redirectUri);
              } return true;
            }
          }
        } catch(error) {
          logger.error("Error in preSend reponse. " + error);
          throw new frJava.SAML2Exception(error);
        }
      }
    2. Validate and save your changes.

  3. Configure AM to use the updated IdP adapter script.

    1. Still in the AM admin UI, go to Applications > Federation > Entity Providers > Hosted IDP Name > Advanced.

    2. Under IDP Adapter, select your customized script from the IDP Adapter Script drop-down list.

    3. Save your changes.

  4. Test your changes using an SP-initiated flow and verify that the user is redirected to the redirect_uri (in this example, https://example.com).