Saml Jobs

15 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
Start SSO session from SP side using spSSOInit.jsp Vefiry AuthRequest SAML XML Observe that RequestedAuthnContext is not present Original request: <samlp:AuthnRequest ID="_6b2e0c13-fea0-467c-9add-733a9a66f5c8" Version="2.0" IssueInstant="2011-05-03T20:49:33.151Z" Destination="https://AdfsServer.contoso.com/adfs/ls/" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="true" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> http://AdfsServer.contoso.com/adfs/services/trust </Issuer> <Conditions xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> <AudienceRestriction> <Audience> https://SamlApp.sales.contoso.com/adfs/ls/ </Audience> </AudienceRestriction> </Conditions> <samlp:RequestedAuthnContext Comparison=”exact” <samlp:AuthnContextClassRef xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion"> urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient </samlp:AuthnContextClassRef> <samlp:AuthnContextClassRef xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion"> urn:federation:authentication:windows </samlp:AuthnContextClassRef> </samlp:RequestedAuthnContext> </samlp:AuthnRequest> Expected: <samlp:AuthnRequest ID="_6b2e0c13-fea0-467c-9add-733a9a66f5c8" Version="2.0" IssueInstant="2011-05-03T20:49:33.151Z" Destination="https://AdfsServer.contoso.com/adfs/ls/" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="true" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> http://AdfsServer.contoso.com/adfs/services/trust </Issuer> <Conditions xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> <AudienceRestriction> <Audience> https://SamlApp.sales.contoso.com/adfs/ls/ </Audience> </AudienceRestriction> </Conditions> </samlp:AuthnRequest> Fererence to MSDN documentation: https://msdn.microsoft.com/en-us/library/ee895365.aspx ... Start SSO session from SP side using spSSOInit.jsp Vefiry AuthRequest SAML XML Observe that RequestedAuthnContext is not present Original request: <samlp:AuthnRequest ID="_6b2e0c13-fea0-467c-9add-733a9a66f5c8" Version="2.0" IssueInstant="2011-05-03T20:49:33.151Z" Destination="https://AdfsServer.contoso.com/adfs/ls/" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="true" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> http://AdfsServer.contoso.com/adfs/services/trust </Issuer> <Conditions xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> <AudienceRestriction> <Audience> https://SamlApp.sales.contoso.com/adfs/ls/ </Audience> </AudienceRestriction> </Conditions> <samlp:RequestedAuthnContext Comparison=”exact” <samlp:AuthnContextClassRef xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion"> urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient </samlp:AuthnContextClassRef> <samlp:AuthnContextClassRef xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion"> urn:federation:authentication:windows </samlp:AuthnContextClassRef> </samlp:RequestedAuthnContext> </samlp:AuthnRequest> Expected: <samlp:AuthnRequest ID="_6b2e0c13-fea0-467c-9add-733a9a66f5c8" Version="2.0" IssueInstant="2011-05-03T20:49:33.151Z" Destination="https://AdfsServer.contoso.com/adfs/ls/" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="true" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> http://AdfsServer.contoso.com/adfs/services/trust </Issuer> <Conditions xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> <AudienceRestriction> <Audience> https://SamlApp.sales.contoso.com/adfs/ls/ </Audience> </AudienceRestriction> </Conditions> </samlp:AuthnRequest> Fererence to MSDN documentation: https://msdn.microsoft.com/en-us/library/ee895365.aspx ... Start SSO session from SP side using spSSOInit.jsp Vefiry AuthRequest SAML XML Observe that RequestedAuthnContext is not present Original request: <samlp:AuthnRequest ID="_6b2e0c13-fea0-467c-9add-733a9a66f5c8" Version="2.0" IssueInstant="2011-05-03T20:49:33.151Z" Destination="https://AdfsServer.contoso.com/adfs/ls/" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="true" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> http://AdfsServer.contoso.com/adfs/services/trust </Issuer> <Conditions xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> <AudienceRestriction> <Audience> https://SamlApp.sales.contoso.com/adfs/ls/ </Audience> </AudienceRestriction> </Conditions> <samlp:RequestedAuthnContext Comparison=”exact” <samlp:AuthnContextClassRef xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion"> urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient </samlp:AuthnContextClassRef> <samlp:AuthnContextClassRef xmlns:samlp="urn:oasis:names:tc:SAML:2.0:assertion"> urn:federation:authentication:windows </samlp:AuthnContextClassRef> </samlp:RequestedAuthnContext> </samlp:AuthnRequest> Expected: <samlp:AuthnRequest ID="_6b2e0c13-fea0-467c-9add-733a9a66f5c8" Version="2.0" IssueInstant="2011-05-03T20:49:33.151Z" Destination="https://AdfsServer.contoso.com/adfs/ls/" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" ForceAuthn="true" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"> <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> http://AdfsServer.contoso.com/adfs/services/trust </Issuer> <Conditions xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> <AudienceRestriction> <Audience> https://SamlApp.sales.contoso.com/adfs/ls/ </Audience> </AudienceRestriction> </Conditions> </samlp:AuthnRequest> Fererence to MSDN documentation: https://msdn.microsoft.com/en-us/library/ee895365.aspx
Fixed-Price - Intermediate ($$) - Est. Budget: $300 - Posted
Strong knowledge of Azure Web Services, ADFS, AD, Federation, Shiboleth, SAML, STS and OAuth to help us configure and develop a simple prototype. ... We only want that service to return "hello world" when the calling user is authenticated into our Single Sign on (Shib/SAML) We have other applications on SSO that behave this way that are SAML compliant. Possible to make our custom Azure web service SAML compliant? ... We only want that service to return "hello world" when the calling user is authenticated into our Single Sign on (Shib/SAML) We have other applications on SSO that behave this way that are SAML compliant. Possible to make our custom Azure web service SAML compliant? If not, what option are available for us?
Skills: Microsoft Windows Azure
Hourly - Entry Level ($) - Est. Time: 1 to 3 months, 30+ hrs/week - Posted
Experience with Drupal 8 preferred -Experience in working with RESTful Web Services -Experience with working in an Agile development environment -Experience with test-driven development and unit testing tools -Experience with source control management systems, including Subversion and Git -Experience with the migration of existing CMS content into Drupal via the Migrate module -Experience with Drupal modules, including feeds, Organic Groups, Open LDAP, Simple SAML, OAuth, Panels, Display Suite, or Context -Experience with configuring users, roles, and permissions -Experience with programming languages, including Python, Perl, .NET, Ruby, Java, or C# -Ability to analyze requirements and formulate design -Possession of excellent oral and written communication skills -Possession of excellent teamwork skills
Skills: AJAX Drupal PHP
Fixed-Price - Intermediate ($$) - Est. Budget: $500 - Posted
Looking for an OpenID and SAML specialist to install and configure a Identity Provider and SSO to external systems. ... Implementation and deployment on EC2 2. Demonstrated SAML 2.0 configuration 3. Desired past experience with Gluu or Shibboleth Start next week.
Skills: Amazon EC2
Hourly - Intermediate ($$) - Est. Time: 1 to 3 months, 30+ hrs/week - Posted
We are looking for an experienced senior-level JavaScript developer with proven commercial experience implementing enterprise authentication systems using Oauth/SAML/SSO/Active Directory, required to integrate an existing NodeJS SSO OAuth 2 Identity Service with client SSO systems. ... . • 5 years+ Experience with Authentication and authorisation systems, including; OAuth 2.0, SSO, Client Integrations with SAML, Active Directory, role-based permissions. • REST APIs - both building and consuming • Client-facing technical documentation experience. • Experience with at least one RDBMS, ideally PostgreSQL • Github and standard source code workflows
Skills: Active Directory GitHub JavaScript Node.js OAuth PostgreSQL Programming REST
Fixed-Price - Intermediate ($$) - Est. Budget: $50 - Posted
this project will require you to develop the following: 1) ASP.Net App1 2) ASP.Net App2 3) Related Tables/Queries 4) SAML Provider The problem definition is as follows : The App1 needs to allow a single signon for its users to App2. ... App1 does not know those passwords but if App1 has authenticated these users based on their email/password, app1 should call the saml provider in App2 to allow the user to login to app2 without having to enter his password as long as the email address is same.