#include <shibsp/handler/AssertionConsumerService.h>
Inheritance diagram for shibsp::AssertionConsumerService:
Public Member Functions | |
std::pair< bool, long > | run (SPRequest &request, bool isHandler=true) const |
Executes handler functionality as an incoming request. | |
void | receive (DDF &in, std::ostream &out) |
Remoted classes implement this method to process incoming messages. | |
const char * | getType () const |
Returns the "type" of the Handler plugin. | |
const XMLCh * | getProtocolFamily () const |
Returns an identifier for the protocol family associated with the handler, if any. | |
Protected Member Functions | |
AssertionConsumerService (const xercesc::DOMElement *e, const char *appId, xmltooling::logging::Category &log, xercesc::DOMNodeFilter *filter=nullptr, const std::map< std::string, std::string > *remapper=nullptr) | |
Constructor. | |
void | checkAddress (const Application &application, const xmltooling::HTTPRequest &httpRequest, const char *issuedTo) const |
Enforce address checking requirements. | |
virtual std::pair< bool, long > | finalizeResponse (const Application &application, const xmltooling::HTTPRequest &httpRequest, xmltooling::HTTPResponse &httpResponse, std::string &relayState) const |
Complete the client's transition back to the expected resource. | |
void | generateMetadata (opensaml::saml2md::SPSSODescriptor &role, const char *handlerURL) const |
Generates and/or modifies metadata reflecting the Handler. | |
virtual opensaml::SecurityPolicy * | createSecurityPolicy (const Application &application, const xmltooling::QName *role, bool validate, const char *policyId) const |
virtual void | implementProtocol (const Application &application, const xmltooling::HTTPRequest &httpRequest, xmltooling::HTTPResponse &httpResponse, opensaml::SecurityPolicy &policy, const PropertySet *reserved, const xmltooling::XMLObject &xmlObject) const =0 |
Implement protocol-specific handling of the incoming decoded message. | |
virtual void | extractMessageDetails (const opensaml::Assertion &assertion, const XMLCh *protocol, opensaml::SecurityPolicy &policy) const |
Extracts policy-relevant assertion details. | |
ResolutionContext * | resolveAttributes (const Application &application, const opensaml::saml2md::RoleDescriptor *issuer=nullptr, const XMLCh *protocol=nullptr, const opensaml::saml1::NameIdentifier *v1nameid=nullptr, const opensaml::saml2::NameID *nameid=nullptr, const XMLCh *authncontext_class=nullptr, const XMLCh *authncontext_decl=nullptr, const std::vector< const opensaml::Assertion * > *tokens=nullptr) const |
ResolutionContext * | resolveAttributes (const Application &application, const xmltooling::GenericRequest *request=nullptr, const opensaml::saml2md::RoleDescriptor *issuer=nullptr, const XMLCh *protocol=nullptr, const xmltooling::XMLObject *protmsg=nullptr, const opensaml::saml1::NameIdentifier *v1nameid=nullptr, const opensaml::saml1::AuthenticationStatement *v1statement=nullptr, const opensaml::saml2::NameID *nameid=nullptr, const opensaml::saml2::AuthnStatement *statement=nullptr, const XMLCh *authncontext_class=nullptr, const XMLCh *authncontext_decl=nullptr, const std::vector< const opensaml::Assertion * > *tokens=nullptr) const |
Attempt SSO-initiated attribute resolution using the supplied information, including NameID and token extraction and filtering followed by secondary resolution. | |
virtual LoginEvent * | newLoginEvent (const Application &application, const xmltooling::HTTPRequest &request) const |
Creates a new AuthnRequestEvent for the event log. |
|
Constructor.
|
|
Enforce address checking requirements.
|
|
Allows handlers to customize the type of policy object their policy rules might require. The caller MUST lock the application's MetadataProvider for the life of the returned object.
|
|
Extracts policy-relevant assertion details.
|
|
Complete the client's transition back to the expected resource.
|
|
Generates and/or modifies metadata reflecting the Handler. The default implementation does nothing.
Reimplemented from shibsp::Handler. |
|
Returns an identifier for the protocol family associated with the handler, if any.
Reimplemented from shibsp::Handler. |
|
Returns the "type" of the Handler plugin.
Reimplemented from shibsp::Handler. |
|
Implement protocol-specific handling of the incoming decoded message. The result of implementing the protocol should be an exception or modifications to the request/response objects to reflect processing of the message.
|
|
Creates a new AuthnRequestEvent for the event log.
|
|
Remoted classes implement this method to process incoming messages.
Implements shibsp::Remoted. |
|
Attempt SSO-initiated attribute resolution using the supplied information, including NameID and token extraction and filtering followed by secondary resolution. The caller must free the returned context handle.
|
|
The caller must free the returned context handle.
|
|
Executes handler functionality as an incoming request. Handlers can be run either directly by incoming web requests or indirectly/implicitly during other SP processing.
Implements shibsp::Handler. |