From 0a2e25a4231051fbd2e348b8a085efde93d9bc81 Mon Sep 17 00:00:00 2001 From: aliaksander-samuseu Date: Fri, 4 Oct 2024 17:00:23 +0300 Subject: [PATCH] Update saml2oidc_acr_router.py Signed-off-by: aliaksander-samuseu --- .../saml2oidc_acr_router/saml2oidc_acr_router.py | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/Server/integrations/saml2oidc_acr_router/saml2oidc_acr_router.py b/Server/integrations/saml2oidc_acr_router/saml2oidc_acr_router.py index a20d47b46..cf9ed4263 100644 --- a/Server/integrations/saml2oidc_acr_router/saml2oidc_acr_router.py +++ b/Server/integrations/saml2oidc_acr_router/saml2oidc_acr_router.py @@ -56,7 +56,7 @@ def isValidAuthenticationMethod(self, usageType, configurationAttributes): return False def getAlternativeAuthenticationMethod(self, usageType, configurationAttributes): - print "DEBUG OUTPUT: SAML 2 OIDC ACR router script. Processing url query arguments..." + #print "DEBUG OUTPUT: SAML 2 OIDC ACR router script. Processing url query arguments..." # !!!Note: oxAuth stores in session only known parameters # We need to add to authorizationRequestCustomAllowedParameters oxAuth property issuerId and entityId @@ -69,7 +69,7 @@ def getAlternativeAuthenticationMethod(self, usageType, configurationAttributes) issuerId = session_attributes.get("issuerId") entityId = session_attributes.get("entityId") redirect_uri = session_attributes.get("redirect_uri") - print "DEBUG OUTPUT: SAML 2 OIDC ACR router script. issuerId: %s, entityId: %s, redirect_uri: %s: " % (issuerId, entityId, redirect_uri) + #print "DEBUG OUTPUT: SAML 2 OIDC ACR router script. issuerId: %s, entityId: %s, redirect_uri: %s: " % (issuerId, entityId, redirect_uri) if entityId in self.entityidOidcAcrMap: target_oidc_acr = self.entityidOidcAcrMap[entityId] print "SAML 2 OIDC ACR router script. Next target OIDC ACR is chosen based on SP entityId %s: %s" % (entityId, target_oidc_acr) @@ -77,9 +77,6 @@ def getAlternativeAuthenticationMethod(self, usageType, configurationAttributes) else: print "SAML 2 OIDC ACR router script. No mapping for entityId %s is found, redirecting to the default method" % (entityId) return self.default_acr - #if StringHelper.equalsIgnoreCase(issuerId, "https://samltest.id/saml/sp"): - # print "ACR SAML Router. Redirect to super_gluu" - # return "super_gluu" else: print "SAML 2 OIDC ACR router script. entityId url query parameter must be present in case of valid Shibboleth IDP authentication flow, but it's not found. Aborting the flow..." return False