Custom POST Form Parameter Names
9.2 Custom POST Form Parameter Names
The parameters names passed to the POST form when a custom POST form is specified for SAML POST profile handling depend on which SAML provider is configured. ■ For the WebLogic Server 9.1and higher, Federation Services implementation in effect when V2 providers are configured, see Table 9–3 . ■ For the WebLogic Server 9.0 SAML services implementation in effect when V1 providers are configured, see Table 9–4 . The tables provide the parameter names and their data types required for casting the returned Java Object. For both implementations, the SAML response itself is passed using the parameter name specified by SAML: SAMLResponse String: The base64-encoded SAML Response element. MetadataPartner Metadata partner contains contact information for the partner, which is mainly required by the SAML 2.0 metadata profile. Partner Abstract representation of a SAML 2.0 partner. This interface defines mandatory information for a partner. SPPartner Abstract representation of a SAML 2.0 Service Provider partner. WebSSOIdPPartner Abstract representation of a SAML 2.0 Identity Provider partner for Web SSO profile. WebSSOPartner Abstract representation of a SAML 2.0 partner for Web SSO profile. WebSSOSPPartner Abstract representation of a SAML 2.0 Service Provider partner for Web SSO profile. WSSIdPPartner Abstract representation of a SAML 2.0 Identity Provider partner for WSS SAML Token profile. WSSPartner Abstract representation of a SAML 2.0 partner for WSS SAML Token profile. WSSSPPartner Abstract representation of a SAML 2.0 Service Provider partner for WSS SAML Token profile. It has no specific attributesmethods. Table 9–3 SAML V2 Provider Custom POST Form Parameters Parameter Description TARGET String The TARGET URL specified as a query parameter on the incoming Intersite Transfer Service ITS request. SAML_AssertionConsumerURL String The URL of the Assertion Consumer Service ACS at the destination site where the form should be POSTed. Table 9–2 Cont. WebLogic SAML 2.0 APIs WebLogic SAML 2.0 APIs Description SAML APIs 9-59.3 Creating Assertions for Non-WebLogic SAML 1.1 Relying Parties
Parts
» Oracle Fusion Middleware Online Documentation Library
» Document Scope Audience for This Guide
» Guide to this Document Related Information
» New and Changed Security Features in This Release What Is Security?
» Authentication Authorization Java EE Security
» User Name and Password Authentication
» Digital Certificate Authentication Authentication With Web Browsers
» Using Secure Cookies to Prevent Session Stealing
» Developing BASIC Authentication Web Applications
» Using WLST to Check the Value of enforce-valid-basic-auth-credentials
» Developing FORM Authentication Web Applications
» Developing Swing-Based Authentication Web Applications Deploying Web Applications
» auth-constraint security-constraint web.xml Deployment Descriptors
» security-role security-role-ref user-data-constraint web.xml Deployment Descriptors
» externally-defined weblogic.xml Deployment Descriptors
» security-permission-spec security-role-assignment weblogic.xml Deployment Descriptors
» getUserPrincipal isUserInRole Using Programmatic Security With Web Applications
» JAAS Authentication APIs JAAS Authentication Development Environment
» JAAS Client Application Components
» WebLogic LoginModule Implementation JVM-Wide Default User and the runAs Method
» Writing a Client Application Using JAAS Authentication
» Using JNDI Authentication Oracle Fusion Middleware Online Documentation Library
» Java Client JAAS Authentication Code Examples JSSE and WebLogic Server
» SSL Authentication APIs SSL Certificate Authentication Development Environment
» SSL Client Application Components
» SSLClient Sample SSLSocketClient Sample
» Two-Way SSL Authentication with JNDI
» Using Two-Way SSL Authentication Between WebLogic Server Instances
» Using Two-Way SSL Authentication with Servlets
» Using the CertPath Trust Manager Using a Handshake Completed Listener
» Using an SSLContext Using URLs to Make Outbound SSL Connections
» Declarative Authorization Programmatic Authorization
» SSL Client Code Examples Using Declarative Security With EJBs
» method method-permission ejb-jar.xml Deployment Descriptors
» role-name run-as security-identity ejb-jar.xml Deployment Descriptors
» security-role security-role-ref ejb-jar.xml Deployment Descriptors
» externally-defined weblogic-ejb-jar.xml Deployment Descriptors
» identity-assertion iiop-security-descriptor integrity principal-name
» role-name run-as-identity-principal weblogic-ejb-jar.xml Deployment Descriptors
» run-as-principal-name run-as-role-assignment weblogic-ejb-jar.xml Deployment Descriptors
» security-permission security-permission-spec security-role-assignment transport-requirements
» ConnectionFilterImpl Class ConnectionEvent Class
» Connection Filter Rules Syntax Types of Connection Filter Rules
» Modifying the weblogic.policy file for General Use
» Setting Application-Type Security Policies Setting Application-Specific Security Policies
» Using Java EE Security to Protect WebLogic Resources SAML API Description
» Custom POST Form Parameter Names
» Overview of Creating a Custom SAML Name Mapper
» SAMLAttributeStatementInfo Class Classes, Interfaces, and Methods
» SAMLCredentialAttributeMapper Interface Classes, Interfaces, and Methods
» Make the Custom SAMLCredentialAttributeMapper Class Available in the Console
» What Are SAML SSO Attributes?
» How to Implement SAML Attributes
» Example Custom SAML 2.0 Credential Attribute Mapper
» Custom SAML 2.0 Identity Asserter Attribute Mapper
» Example Custom SAML 1.1 Credential Attribute Mapper
» Custom SAML 1.1 Identity Asserter Attribute Mapper
» Instantiate a CertPathSelector CertPath Building
» Instantiate a CertPathBuilderParameters CertPath Building
» Use the JDK CertPathBuilder Interface Example Code Flow for Looking Up a Certificate Chain
Show more