本文整理汇总了PHP中SAML2_Utils::validateSignature方法的典型用法代码示例。如果您正苦于以下问题:PHP SAML2_Utils::validateSignature方法的具体用法?PHP SAML2_Utils::validateSignature怎么用?PHP SAML2_Utils::validateSignature使用的例子?那么, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类SAML2_Utils
的用法示例。
在下文中一共展示了SAML2_Utils::validateSignature方法的4个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的PHP代码示例。
示例1: load_saml_response
/**
* @param string $saml_response Base64 Encoded SAML
*
* @throws Exception When no assertions are found or signature in invalid
*/
public function load_saml_response($saml_response)
{
$response_element = SAML2_DOMDocumentFactory::fromString(base64_decode($saml_response))->documentElement;
$signature_info = SAML2_Utils::validateElement($response_element);
SAML2_Utils::validateSignature($signature_info, $this->security_key);
$response = SAML2_StatusResponse::fromXML($response_element);
$this->destination = $response->getDestination();
$assertions = $response->getAssertions();
$this->assertions = $assertions;
}
开发者ID:aenglander,项目名称:launchkey-wordpress,代码行数:15,代码来源:class-launchkey-wp-saml2-response-service.php
示例2: load_saml_request
/**
* @param string $saml_request Base64 Encoded SAML
*
* @throws Exception When signature in invalid
*/
public function load_saml_request($saml_request)
{
$request_element = SAML2_DOMDocumentFactory::fromString(base64_decode($saml_request))->documentElement;
$signature_info = SAML2_Utils::validateElement($request_element);
SAML2_Utils::validateSignature($signature_info, $this->security_key);
/** @var SAML2_LogoutRequest $request */
$request = SAML2_LogoutRequest::fromXML($request_element);
$request->decryptNameId($this->security_key);
$name_id = $request->getNameId();
$this->notOnOrAfter = $request->getNotOnOrAfter();
$this->name = $name_id ? $name_id['Value'] : null;
$this->session_index = $request->getSessionIndex();
$this->destination = $request->getDestination();
}
示例3: validate
/**
* Validate this assertion against a public key.
*
* If no signature was present on the assertion, we will return FALSE.
* Otherwise, TRUE will be returned. An exception is thrown if the
* signature validation fails.
*
* @param XMLSecurityKey $key The key we should check against.
* @return boolean TRUE if successful, FALSE if it is unsigned.
*/
public function validate(XMLSecurityKey $key)
{
assert('$key->type === XMLSecurityKey::RSA_SHA1');
if ($this->signatureData === NULL) {
return FALSE;
}
SAML2_Utils::validateSignature($this->signatureData, $key);
return TRUE;
}
示例4: authenticate
/**
* Front controller for LaunchKey Native/White Label authentication
*
*
* @param WP_User $user Unused parameter always passed first by authenticate filter
* @param string $username Username specified by the user in the login screen
* @param string $password Password specifiedby the user in the login screen
*
* @since 1.0.0
* @return WP_User
*/
public function authenticate($user, $username, $password)
{
if (empty($user) && empty($username) && empty($password) && !empty($_REQUEST['SAMLResponse'])) {
$response_element = SAML2_DOMDocumentFactory::fromString(base64_decode($_REQUEST['SAMLResponse']))->documentElement;
$signature_info = SAML2_Utils::validateElement($response_element);
try {
SAML2_Utils::validateSignature($signature_info, $this->security_key);
$response = SAML2_StatusResponse::fromXML($response_element);
/** @var SAML2_Assertion[] $assertions */
$assertions = $response->getAssertions();
if (empty($assertions)) {
throw new Exception("No assertions in SAML response");
}
$assertion = $assertions[0];
$name_id = $assertion->getNameId();
$username = $name_id['Value'];
$session_id = $assertion->getSessionIndex();
// Find the user by login
$user = $this->wp_facade->get_user_by('login', $username);
// If we don't have a user, create one
if (!$user instanceof WP_User) {
$attributes = $assertion->getAttributes();
$user_data = array('user_login' => $username, 'user_pass' => '', 'role' => empty($attributes['role']) ? false : $this->translate_role($attributes['role'][0]));
$user_id = $this->wp_facade->wp_insert_user($user_data);
// Unset the password - wp_insert_user always generates a hash - it's misleading
$this->wp_facade->wp_update_user(array('ID' => $user_id, 'user_pass' => ''));
$user = new WP_User($user_id);
}
// Set the SSO session so we know we are logged in via SSSO
$this->wp_facade->update_user_meta($user->ID, 'launchkey_sso_session', $session_id);
} catch (Exception $e) {
$this->wp_facade->wp_redirect($this->error_url);
exit;
}
return $user;
}
}