ComponentSpace

Forums



DotNet Core migration 2.1


DotNet Core migration 2.1

Author
Message
rajurh85
rajurh85
New Member
New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)

Group: Forum Members
Posts: 4, Visits: 7
Hi All,

I have been using ComponentSpace with .Net core 2.0 in the past and had no issues. After migrating to .NET core 2.1 application is broken with attached screenshot.Error reported with below version of component space

<PackageReference Include="ComponentSpace.Saml2" Version="2.0.2" />

Later I migrated to latest version of ComponentSpace application broke with compile time errors for below code.
<PackageReference Include="ComponentSpace.Saml2" Version="2.1.0" />

Please refer the attached file with "comiletimeerror" with highlighted error messages.

Help on this will be much appreciated because we have purchased license and now application is not working condition.
Attachments
ComponentSpace.jpg (2 views, 316.00 KB)
comiletimeerror.JPG (2 views, 129.00 KB)
ComponentSpace
ComponentSpace
ComponentSpace Development
ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)

Group: Administrators
Posts: 3.2K, Visits: 11K
Regarding the compile time errors, we made some minor changes to the options to increase the flexibility and for naming consistency.
Instead of a string, the PartnerName is a delegate that returns a string.
The ...Url options have been renamed to ...Path.
For example:

services.AddAuthentication().AddSaml(options =>
{
  options.PartnerName = () => Configuration["PartnerName"];
  options.AssertionConsumerServicePath = Configuration["AssertionConsumerServicePath"];
  options.SingleLogoutServicePath = Configuration["SingleLogoutServicePath"];
});


Regarding the dependency injection related exception, we recently changed some singletons to transients.
These are documented in our Developer Guide under the Dependency Injection and Third-Party IoC Containers section.
https://www.componentspace.com/Forums/8235/Developer-Guide
Unless you're specifying different implementations for the interfaces, the standard setup where you call services.AddSaml should work.
If there's still an issue, please let us know.

Regards
ComponentSpace Development
rajurh85
rajurh85
New Member
New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)

Group: Forum Members
Posts: 4, Visits: 7
ComponentSpace - 11/19/2018
Regarding the compile time errors, we made some minor changes to the options to increase the flexibility and for naming consistency.
Instead of a string, the PartnerName is a delegate that returns a string.
The ...Url options have been renamed to ...Path.
For example:

services.AddAuthentication().AddSaml(options =>
{
  options.PartnerName = () => Configuration["PartnerName"];
  options.AssertionConsumerServicePath = Configuration["AssertionConsumerServicePath"];
  options.SingleLogoutServicePath = Configuration["SingleLogoutServicePath"];
});


Regarding the dependency injection related exception, we recently changed some singletons to transients.
These are documented in our Developer Guide under the Dependency Injection and Third-Party IoC Containers section.
https://www.componentspace.com/Forums/8235/Developer-Guide
Unless you're specifying different implementations for the interfaces, the standard setup where you call services.AddSaml should work.
If there's still an issue, please let us know.

Thanks Team for quick and prompt response compile time errors is gone with above code snippet. Now authentication is completed from IDP but on success of authentication i am facing below error related to Cookie based authentication.  Please refer the attached code snippet and error screenshot. Help on this will be much appreciated.
Attachments
Error1.JPG (1 view, 175.00 KB)
codesnippet.JPG (1 view, 107.00 KB)
ComponentSpace
ComponentSpace
ComponentSpace Development
ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)

Group: Administrators
Posts: 3.2K, Visits: 11K
To complete SSO, the SAML authentication handler signs the user in locally using the sign-in scheme specified by SamlAuthenticationOptions.SignInScheme.
The SignInScheme defaults to Identity.External which is part of Microsoft Identity.
You can specify a different sign-in scheme by setting this option.

Regards
ComponentSpace Development
rajurh85
rajurh85
New Member
New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)

Group: Forum Members
Posts: 4, Visits: 7
ComponentSpace - 11/20/2018
To complete SSO, the SAML authentication handler signs the user in locally using the sign-in scheme specified by SamlAuthenticationOptions.SignInScheme.
The SignInScheme defaults to Identity.External which is part of Microsoft Identity.
You can specify a different sign-in scheme by setting this option.

Can I get example of code snippet please?
ComponentSpace
ComponentSpace
ComponentSpace Development
ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)

Group: Administrators
Posts: 3.2K, Visits: 11K
I haven't tested this but it should be something like:

services.AddAuthentication().AddSaml(options =>
{
  options.PartnerName = () => Configuration["PartnerName"];
  options.SignInScheme = CookieAuthenticationDefaults.AuthenticationScheme;
});




Regards
ComponentSpace Development
rajurh85
rajurh85
New Member
New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)New Member (5 reputation)

Group: Forum Members
Posts: 4, Visits: 7
ComponentSpace - 11/20/2018
I haven't tested this but it should be something like:

services.AddAuthentication().AddSaml(options =>
{
  options.PartnerName = () => Configuration["PartnerName"];
  options.SignInScheme = CookieAuthenticationDefaults.AuthenticationScheme;
});



Is there a place or document for below issues. Because one or the other error gets popped up after resolving. Now i am getting the below error once i changed the code based on the above comment.
SamlProtocolException: The SAML message InResponseTo _24f130f8-abf9-4307-b3b6-3dab791c8841 doesn't match the expected InResponseTo _4a778c2d-52d1-412c-ab03-e2b19abb3c2f.

ComponentSpace
ComponentSpace
ComponentSpace Development
ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)ComponentSpace Development (4.4K reputation)

Group: Administrators
Posts: 3.2K, Visits: 11K
The SAML authn request sent to the IdP includes a unique ID.
The SAML response from the IdP includes an InResponseTo field that ties it to the authn request by this same ID.
If an unexpected InResponseto is received we throw a SamlProtocolException.
In this example, a response is pending for _4a778c2d-52d1-412c-ab03-e2b19abb3c2f but the InResponseTo field in the SAML response is _24f130f8-abf9-4307-b3b6-3dab791c8841.
One way that this can occur is if the SP sends multiple SAML authn requests without waiting for the SAML response.
For example, the SP sends an authn request with ID _24f130f8-abf9-4307-b3b6-3dab791c8841 followed by another authn request with an ID of _4a778c2d-52d1-412c-ab03-e2b19abb3c2f.
At the SP the expected InResponseTo is _4a778c2d-52d1-412c-ab03-e2b19abb3c2f.
However, the IdP returns a SAML response for the first authn request so the InResponseTo field is _24f130f8-abf9-4307-b3b6-3dab791c8841.
To avoid this, you shouldn't initiate SSO when SSO is pending.
You can also disable this check if required through the SAML configuration.
For the partner identity provider, set:
"DisableInResponseToCheck": true


Regards
ComponentSpace Development
GO


Similar Topics


Execution: 0.000. 2 queries. Compression Enabled.
Login
Existing Account
Email Address:


Password:


Select a Forum....












Forums, Documentation & Knowledge Base - ComponentSpace


Search