{"id":502,"date":"2021-03-06T13:32:55","date_gmt":"2021-03-06T12:32:55","guid":{"rendered":"http:\/\/www.labtinker.net\/?p=502"},"modified":"2021-03-06T13:32:55","modified_gmt":"2021-03-06T12:32:55","slug":"saml-follow-up","status":"publish","type":"post","link":"http:\/\/18.135.13.153\/?p=502","title":{"rendered":"SAML Follow Up"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">The eagle-eyed amongst you may have noticed I used the certificate <em>vpn.labtinker.net<\/em> whilst running my Palo on the URL <em> vpn.badtinker.net<\/em>. The SAML authentication still worked because I guess the relevant public certs are in the metadata so no PKI checking; not in my set up anyway. I did eventually configure the correct certificate but the only difference it made was removing the browser warning I&#8217;d been happily clicking through when browsing to the Palo.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The tool I used when troubleshooting was the Chrome plugin  &#8216;SAML tracer&#8217; so here&#8217;s an excerpt of what I saw in that. (I did actually use system messages on the Palo as well.)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This is the  SAML tracer output having got as far as the re-direct to the login screen of <em>fs.labtiner.net.<\/em> The entries with SAML related content are helpfuly highlighted in orange.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"316\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1024x316.png\" alt=\"\" class=\"wp-image-503\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1024x316.png 1024w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-300x92.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-768x237.png 768w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image.png 1119w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">SAML tracer<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In the lower window you have the SAML info&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"223\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1-1024x223.png\" alt=\"\" class=\"wp-image-504\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1-1024x223.png 1024w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1-300x65.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1-768x167.png 768w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-1.png 1269w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">SAML tracer lower-window<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Having put in the password  in <em>fs.labtinker.net<\/em>  this is the return POST back to the Palo.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"596\" height=\"56\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-3.png\" alt=\"\" class=\"wp-image-506\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-3.png 596w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-3-300x28.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><figcaption class=\"wp-element-caption\">SAML &#8211; From fs.labtinker.net to vpn.badtinker.net.<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">I&#8217;ve split the SAML response up into parts to make it more digestible. The first part of the response includes the destination\u2026.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"888\" height=\"196\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-6.png\" alt=\"\" class=\"wp-image-510\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-6.png 888w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-6-300x66.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-6-768x170.png 768w\" sizes=\"auto, (max-width: 888px) 100vw, 888px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The second part includes the issuer id and also begins the actual assertion:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"105\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-18-1024x105.png\" alt=\"\" class=\"wp-image-526\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-18-1024x105.png 1024w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-18-300x31.png 300w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-18-768x79.png 768w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-18.png 1092w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This includes details on transforms and methods used, the issuer&#8217;s signature and there at the bottom are the actual attributes of the assertion that the ADFS has passed on, in this instance just one: &#8216;username&#8217;:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"628\" height=\"126\" src=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-11.png\" alt=\"\" class=\"wp-image-515\" srcset=\"http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-11.png 628w, http:\/\/18.135.13.153\/wp-content\/uploads\/2021\/03\/image-11-300x60.png 300w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The eagle-eyed amongst you may have noticed I used the certificate vpn.labtinker.net whilst running my Palo on the URL vpn.badtinker.net. The SAML authentication still worked because I guess the relevant public certs are in the metadata so no PKI checking; not in my set up anyway. I did eventually configure the correct certificate but the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-502","post","type-post","status-publish","format-standard","hentry","category-authentication"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts\/502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=502"}],"version-history":[{"count":0,"href":"http:\/\/18.135.13.153\/index.php?rest_route=\/wp\/v2\/posts\/502\/revisions"}],"wp:attachment":[{"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=502"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/18.135.13.153\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}