line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package Net::SAML2::IdP; |
2
|
6
|
|
|
6
|
|
39486
|
use Moose; |
|
6
|
|
|
|
|
446787
|
|
|
6
|
|
|
|
|
51
|
|
3
|
6
|
|
|
6
|
|
43941
|
use MooseX::Types::URI qw/ Uri /; |
|
6
|
|
|
|
|
112554
|
|
|
6
|
|
|
|
|
69
|
|
4
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
our $VERSION = '0.43'; |
6
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
# ABSTRACT: Net::SAML2::IdP - SAML Identity Provider object |
8
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
|
10
|
6
|
|
|
6
|
|
12498
|
use Crypt::OpenSSL::Verify; |
|
6
|
|
|
|
|
23542
|
|
|
6
|
|
|
|
|
197
|
|
11
|
6
|
|
|
6
|
|
38
|
use Crypt::OpenSSL::X509; |
|
6
|
|
|
|
|
11
|
|
|
6
|
|
|
|
|
263
|
|
12
|
6
|
|
|
6
|
|
540
|
use HTTP::Request::Common; |
|
6
|
|
|
|
|
12705
|
|
|
6
|
|
|
|
|
462
|
|
13
|
6
|
|
|
6
|
|
1491
|
use LWP::UserAgent; |
|
6
|
|
|
|
|
20797
|
|
|
6
|
|
|
|
|
157
|
|
14
|
6
|
|
|
6
|
|
664
|
use XML::LibXML; |
|
6
|
|
|
|
|
51960
|
|
|
6
|
|
|
|
|
42
|
|
15
|
6
|
|
|
6
|
|
1577
|
use Net::SAML2::XML::Util qw/ no_comments /; |
|
6
|
|
|
|
|
16
|
|
|
6
|
|
|
|
|
9069
|
|
16
|
|
|
|
|
|
|
|
17
|
|
|
|
|
|
|
|
18
|
|
|
|
|
|
|
has 'entityid' => (isa => 'Str', is => 'ro', required => 1); |
19
|
|
|
|
|
|
|
has 'cacert' => (isa => 'Maybe[Str]', is => 'ro', required => 1); |
20
|
|
|
|
|
|
|
has 'sso_urls' => (isa => 'HashRef[Str]', is => 'ro', required => 1); |
21
|
|
|
|
|
|
|
has 'slo_urls' => (isa => 'Maybe[HashRef[Str]]', is => 'ro'); |
22
|
|
|
|
|
|
|
has 'art_urls' => (isa => 'Maybe[HashRef[Str]]', is => 'ro'); |
23
|
|
|
|
|
|
|
has 'certs' => (isa => 'HashRef[Str]', is => 'ro', required => 1); |
24
|
|
|
|
|
|
|
has 'formats' => (isa => 'HashRef[Str]', is => 'ro', required => 1); |
25
|
|
|
|
|
|
|
has 'sls_force_lcase_url_encoding' => (isa => 'Bool', is => 'ro', required => 0); |
26
|
|
|
|
|
|
|
has 'sls_double_encoded_response' => (isa => 'Bool', is => 'ro', required => 0); |
27
|
|
|
|
|
|
|
has 'default_format' => (isa => 'Str', is => 'ro', required => 1); |
28
|
|
|
|
|
|
|
|
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
sub new_from_url { |
31
|
0
|
|
|
0
|
1
|
0
|
my($class, %args) = @_; |
32
|
|
|
|
|
|
|
|
33
|
0
|
|
|
|
|
0
|
my $req = GET $args{url}; |
34
|
0
|
|
|
|
|
0
|
my $ua = LWP::UserAgent->new; |
35
|
|
|
|
|
|
|
|
36
|
0
|
0
|
|
|
|
0
|
if ( defined $args{ssl_opts} ) { |
37
|
0
|
|
|
|
|
0
|
require LWP::Protocol::https; |
38
|
0
|
|
|
|
|
0
|
$ua->ssl_opts( %{$args{ssl_opts}} ); |
|
0
|
|
|
|
|
0
|
|
39
|
|
|
|
|
|
|
} |
40
|
|
|
|
|
|
|
|
41
|
0
|
|
|
|
|
0
|
my $res = $ua->request($req); |
42
|
0
|
0
|
|
|
|
0
|
if (! $res->is_success ) { |
43
|
0
|
|
|
|
|
0
|
my $msg = "no metadata: " . $res->code . ": " . $res->message . "\n"; |
44
|
0
|
|
|
|
|
0
|
die $msg; |
45
|
|
|
|
|
|
|
} |
46
|
|
|
|
|
|
|
|
47
|
0
|
|
|
|
|
0
|
my $xml = $res->content; |
48
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
return $class->new_from_xml( |
50
|
|
|
|
|
|
|
xml => $xml, |
51
|
|
|
|
|
|
|
cacert => $args{cacert}, |
52
|
|
|
|
|
|
|
sls_force_lcase_url_encoding => $args{sls_force_lcase_url_encoding}, |
53
|
|
|
|
|
|
|
sls_double_encoded_response => $args{sls_double_encoded_response}, |
54
|
0
|
|
|
|
|
0
|
); |
55
|
|
|
|
|
|
|
} |
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
sub new_from_xml { |
59
|
7
|
|
|
7
|
1
|
7063
|
my($class, %args) = @_; |
60
|
|
|
|
|
|
|
|
61
|
7
|
|
|
|
|
47
|
my $dom = no_comments($args{xml}); |
62
|
|
|
|
|
|
|
|
63
|
7
|
|
|
|
|
126
|
my $xpath = XML::LibXML::XPathContext->new($dom); |
64
|
7
|
|
|
|
|
55
|
$xpath->registerNs('md', 'urn:oasis:names:tc:SAML:2.0:metadata'); |
65
|
7
|
|
|
|
|
30
|
$xpath->registerNs('ds', 'http://www.w3.org/2000/09/xmldsig#'); |
66
|
|
|
|
|
|
|
|
67
|
7
|
|
|
|
|
12
|
my $data; |
68
|
|
|
|
|
|
|
|
69
|
7
|
|
|
|
|
42
|
for my $sso ( |
70
|
|
|
|
|
|
|
$xpath->findnodes( |
71
|
|
|
|
|
|
|
'//md:EntityDescriptor/md:IDPSSODescriptor/md:SingleSignOnService') |
72
|
|
|
|
|
|
|
) |
73
|
|
|
|
|
|
|
{ |
74
|
21
|
|
|
|
|
658
|
my $binding = $sso->getAttribute('Binding'); |
75
|
21
|
|
|
|
|
376
|
$data->{SSO}->{$binding} = $sso->getAttribute('Location'); |
76
|
|
|
|
|
|
|
} |
77
|
|
|
|
|
|
|
|
78
|
7
|
|
|
|
|
91
|
for my $slo ( |
79
|
|
|
|
|
|
|
$xpath->findnodes( |
80
|
|
|
|
|
|
|
'//md:EntityDescriptor/md:IDPSSODescriptor/md:SingleLogoutService') |
81
|
|
|
|
|
|
|
) |
82
|
|
|
|
|
|
|
{ |
83
|
21
|
|
|
|
|
977
|
my $binding = $slo->getAttribute('Binding'); |
84
|
21
|
|
|
|
|
203
|
$data->{SLO}->{$binding} = $slo->getAttribute('Location'); |
85
|
|
|
|
|
|
|
} |
86
|
|
|
|
|
|
|
|
87
|
7
|
|
|
|
|
77
|
for my $art ( |
88
|
|
|
|
|
|
|
$xpath->findnodes( |
89
|
|
|
|
|
|
|
'//md:EntityDescriptor/md:IDPSSODescriptor/md:ArtifactResolutionService') |
90
|
|
|
|
|
|
|
) |
91
|
|
|
|
|
|
|
{ |
92
|
7
|
|
|
|
|
456
|
my $binding = $art->getAttribute('Binding'); |
93
|
7
|
|
|
|
|
87
|
$data->{Art}->{$binding} = $art->getAttribute('Location'); |
94
|
|
|
|
|
|
|
} |
95
|
|
|
|
|
|
|
|
96
|
7
|
|
|
|
|
88
|
for my $format ( |
97
|
|
|
|
|
|
|
$xpath->findnodes('//md:EntityDescriptor/md:IDPSSODescriptor/md:NameIDFormat')) |
98
|
|
|
|
|
|
|
{ |
99
|
49
|
|
|
|
|
567
|
$format = $format->string_value; |
100
|
49
|
|
|
|
|
118
|
$format =~ s/^\s+|\s+$//g; |
101
|
49
|
|
|
|
|
1163
|
my($short_format) |
102
|
|
|
|
|
|
|
= $format =~ /urn:oasis:names:tc:SAML:(?:2.0|1.1):nameid-format:(.*)$/; |
103
|
49
|
50
|
|
|
|
125
|
if(defined $short_format) { |
104
|
49
|
|
|
|
|
151
|
$data->{NameIDFormat}->{$short_format} = $format; |
105
|
49
|
100
|
|
|
|
133
|
$data->{DefaultFormat} = $short_format unless exists $data->{DefaultFormat}; |
106
|
|
|
|
|
|
|
} |
107
|
|
|
|
|
|
|
} |
108
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
# NameIDFormat is an optional field and not provided in all metadata xml |
110
|
|
|
|
|
|
|
# Microsoft in particular does not provide this field |
111
|
7
|
50
|
|
|
|
39
|
if(!defined($data->{NameIDFormat})){ |
112
|
0
|
|
|
|
|
0
|
$data->{NameIDFormat}->{unspecified} = 'urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified'; |
113
|
0
|
0
|
|
|
|
0
|
$data->{DefaultFormat} = 'unspecified' unless exists $data->{DefaultFormat}; |
114
|
|
|
|
|
|
|
} |
115
|
|
|
|
|
|
|
|
116
|
7
|
|
|
|
|
32
|
for my $key ( |
117
|
|
|
|
|
|
|
$xpath->findnodes('//md:EntityDescriptor/md:IDPSSODescriptor/md:KeyDescriptor')) |
118
|
|
|
|
|
|
|
{ |
119
|
7
|
|
50
|
|
|
298
|
my $use = $key->getAttribute('use') || 'signing'; |
120
|
|
|
|
|
|
|
|
121
|
|
|
|
|
|
|
# We can't select by ds:KeyInfo/ds:X509Data/ds:X509Certificate |
122
|
|
|
|
|
|
|
# because of https://rt.cpan.org/Public/Bug/Display.html?id=8784 |
123
|
7
|
|
|
|
|
125
|
my ($text) |
124
|
|
|
|
|
|
|
= $key->findvalue("//*[local-name()='X509Certificate']") |
125
|
|
|
|
|
|
|
=~ /^\s*(.+?)\s*$/s; |
126
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
# rewrap the base64 data from the metadata; it may not |
128
|
|
|
|
|
|
|
# be wrapped at 64 characters as PEM requires |
129
|
7
|
|
|
|
|
2412
|
$text =~ s/\n//g; |
130
|
|
|
|
|
|
|
|
131
|
7
|
|
|
|
|
22
|
my @lines; |
132
|
7
|
|
|
|
|
86
|
while(length $text > 64) { |
133
|
142
|
|
|
|
|
928
|
push @lines, substr $text, 0, 64, ''; |
134
|
|
|
|
|
|
|
} |
135
|
7
|
|
|
|
|
20
|
push @lines, $text; |
136
|
|
|
|
|
|
|
|
137
|
7
|
|
|
|
|
56
|
$text = join "\n", @lines; |
138
|
|
|
|
|
|
|
|
139
|
|
|
|
|
|
|
# form a PEM certificate |
140
|
7
|
|
|
|
|
92
|
$data->{Cert}->{$use} |
141
|
|
|
|
|
|
|
= sprintf("-----BEGIN CERTIFICATE-----\n%s\n-----END CERTIFICATE-----\n", |
142
|
|
|
|
|
|
|
$text); |
143
|
|
|
|
|
|
|
} |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
my $self = $class->new( |
146
|
|
|
|
|
|
|
entityid => $xpath->findvalue('//md:EntityDescriptor/@entityID'), |
147
|
|
|
|
|
|
|
sso_urls => $data->{SSO}, |
148
|
|
|
|
|
|
|
slo_urls => $data->{SLO} || {}, |
149
|
|
|
|
|
|
|
art_urls => $data->{Art} || {}, |
150
|
|
|
|
|
|
|
certs => $data->{Cert}, |
151
|
|
|
|
|
|
|
formats => $data->{NameIDFormat}, |
152
|
|
|
|
|
|
|
default_format => $data->{DefaultFormat}, |
153
|
|
|
|
|
|
|
cacert => $args{cacert}, |
154
|
|
|
|
|
|
|
sls_force_lcase_url_encoding => $args{sls_force_lcase_url_encoding}, |
155
|
|
|
|
|
|
|
sls_double_encoded_response => $args{sls_double_encoded_response}, |
156
|
7
|
|
50
|
|
|
28
|
); |
|
|
|
50
|
|
|
|
|
157
|
|
|
|
|
|
|
|
158
|
7
|
|
|
|
|
246
|
return $self; |
159
|
|
|
|
|
|
|
} |
160
|
|
|
|
|
|
|
|
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
sub BUILD { |
163
|
7
|
|
|
7
|
1
|
37
|
my($self) = @_; |
164
|
|
|
|
|
|
|
|
165
|
7
|
50
|
|
|
|
249
|
if ($self->cacert) { |
166
|
7
|
|
|
|
|
179
|
my $ca = Crypt::OpenSSL::Verify->new($self->cacert, { strict_certs => 0, }); |
167
|
|
|
|
|
|
|
|
168
|
7
|
|
|
|
|
50
|
for my $use (keys %{$self->certs}) { |
|
7
|
|
|
|
|
297
|
|
169
|
7
|
|
|
|
|
175
|
my $cert = Crypt::OpenSSL::X509->new_from_string($self->certs->{$use}); |
170
|
|
|
|
|
|
|
## BUGBUG this is failing for valid things ... |
171
|
7
|
|
|
|
|
27
|
eval { $ca->verify($cert) }; |
|
7
|
|
|
|
|
940
|
|
172
|
7
|
50
|
|
|
|
2665
|
if ($@) { |
173
|
0
|
|
|
|
|
0
|
warn "Can't verify IdP '$use' cert: $@\n"; |
174
|
|
|
|
|
|
|
} |
175
|
|
|
|
|
|
|
} |
176
|
|
|
|
|
|
|
} |
177
|
|
|
|
|
|
|
} |
178
|
|
|
|
|
|
|
|
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
sub sso_url { |
181
|
8
|
|
|
8
|
1
|
4731
|
my($self, $binding) = @_; |
182
|
8
|
|
|
|
|
293
|
return $self->sso_urls->{$binding}; |
183
|
|
|
|
|
|
|
} |
184
|
|
|
|
|
|
|
|
185
|
|
|
|
|
|
|
|
186
|
|
|
|
|
|
|
sub slo_url { |
187
|
4
|
|
|
4
|
1
|
13
|
my ($self, $binding) = @_; |
188
|
4
|
50
|
|
|
|
142
|
return $self->slo_urls ? $self->slo_urls->{$binding} : undef; |
189
|
|
|
|
|
|
|
} |
190
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
|
192
|
|
|
|
|
|
|
sub art_url { |
193
|
3
|
|
|
3
|
1
|
14
|
my ($self, $binding) = @_; |
194
|
3
|
50
|
|
|
|
104
|
return $self->art_urls ? $self->art_urls->{$binding} : undef; |
195
|
|
|
|
|
|
|
} |
196
|
|
|
|
|
|
|
|
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
sub cert { |
199
|
6
|
|
|
6
|
1
|
1196
|
my($self, $use) = @_; |
200
|
6
|
|
|
|
|
192
|
return $self->certs->{$use}; |
201
|
|
|
|
|
|
|
} |
202
|
|
|
|
|
|
|
|
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
sub binding { |
205
|
9
|
|
|
9
|
1
|
3466
|
my($self, $name) = @_; |
206
|
|
|
|
|
|
|
|
207
|
9
|
|
|
|
|
36
|
my $bindings = { |
208
|
|
|
|
|
|
|
redirect => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect', |
209
|
|
|
|
|
|
|
soap => 'urn:oasis:names:tc:SAML:2.0:bindings:SOAP', |
210
|
|
|
|
|
|
|
}; |
211
|
|
|
|
|
|
|
|
212
|
9
|
50
|
|
|
|
31
|
if(exists $bindings->{$name}) { |
213
|
9
|
|
|
|
|
42
|
return $bindings->{$name}; |
214
|
|
|
|
|
|
|
} |
215
|
|
|
|
|
|
|
|
216
|
0
|
|
|
|
|
0
|
return; |
217
|
|
|
|
|
|
|
} |
218
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
|
220
|
|
|
|
|
|
|
sub format { |
221
|
6
|
|
|
6
|
1
|
18
|
my($self, $short_name) = @_; |
222
|
|
|
|
|
|
|
|
223
|
6
|
100
|
66
|
|
|
227
|
if(defined $short_name && exists $self->formats->{$short_name}) { |
|
|
50
|
|
|
|
|
|
224
|
4
|
|
|
|
|
95
|
return $self->formats->{$short_name}; |
225
|
|
|
|
|
|
|
} |
226
|
|
|
|
|
|
|
elsif($self->default_format) { |
227
|
2
|
|
|
|
|
49
|
return $self->formats->{$self->default_format}; |
228
|
|
|
|
|
|
|
} |
229
|
|
|
|
|
|
|
|
230
|
0
|
|
|
|
|
|
return; |
231
|
|
|
|
|
|
|
} |
232
|
|
|
|
|
|
|
|
233
|
|
|
|
|
|
|
__PACKAGE__->meta->make_immutable; |
234
|
|
|
|
|
|
|
|
235
|
|
|
|
|
|
|
__END__ |
236
|
|
|
|
|
|
|
|
237
|
|
|
|
|
|
|
=pod |
238
|
|
|
|
|
|
|
|
239
|
|
|
|
|
|
|
=encoding UTF-8 |
240
|
|
|
|
|
|
|
|
241
|
|
|
|
|
|
|
=head1 NAME |
242
|
|
|
|
|
|
|
|
243
|
|
|
|
|
|
|
Net::SAML2::IdP - Net::SAML2::IdP - SAML Identity Provider object |
244
|
|
|
|
|
|
|
|
245
|
|
|
|
|
|
|
=head1 VERSION |
246
|
|
|
|
|
|
|
|
247
|
|
|
|
|
|
|
version 0.43 |
248
|
|
|
|
|
|
|
|
249
|
|
|
|
|
|
|
=head1 SYNOPSIS |
250
|
|
|
|
|
|
|
|
251
|
|
|
|
|
|
|
my $idp = Net::SAML2::IdP->new_from_url( |
252
|
|
|
|
|
|
|
url => $url, |
253
|
|
|
|
|
|
|
cacert => $cacert, |
254
|
|
|
|
|
|
|
ssl_opts => # Optional options supported by LWP::Protocol::https |
255
|
|
|
|
|
|
|
{ |
256
|
|
|
|
|
|
|
SSL_ca_file => '/your/directory/cacert.pem', |
257
|
|
|
|
|
|
|
SSL_ca_path => '/etc/ssl/certs', |
258
|
|
|
|
|
|
|
verify_hostname => 1, |
259
|
|
|
|
|
|
|
} |
260
|
|
|
|
|
|
|
); |
261
|
|
|
|
|
|
|
my $sso_url = $idp->sso_url('urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect'); |
262
|
|
|
|
|
|
|
|
263
|
|
|
|
|
|
|
=head1 NAME |
264
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
Net::SAML2::IdP - SAML Identity Provider object |
266
|
|
|
|
|
|
|
|
267
|
|
|
|
|
|
|
=head1 METHODS |
268
|
|
|
|
|
|
|
|
269
|
|
|
|
|
|
|
=head2 new( ) |
270
|
|
|
|
|
|
|
|
271
|
|
|
|
|
|
|
Constructor |
272
|
|
|
|
|
|
|
|
273
|
|
|
|
|
|
|
=over |
274
|
|
|
|
|
|
|
|
275
|
|
|
|
|
|
|
=item B<entityid> |
276
|
|
|
|
|
|
|
|
277
|
|
|
|
|
|
|
=item B<sls_force_lcase_url_encoding> |
278
|
|
|
|
|
|
|
|
279
|
|
|
|
|
|
|
Specifies that the IdP requires the encoding of a URL to be in lowercase. |
280
|
|
|
|
|
|
|
Necessary for a HTTP-Redirect of a LogoutResponse from Azure in particular. |
281
|
|
|
|
|
|
|
True (1) or False (0). Some web frameworks and underlying http requests assume |
282
|
|
|
|
|
|
|
that the encoding should be in the standard uppercase (%2F not %2f) |
283
|
|
|
|
|
|
|
|
284
|
|
|
|
|
|
|
=item B<sls_double_encoded_response> |
285
|
|
|
|
|
|
|
|
286
|
|
|
|
|
|
|
Specifies that the IdP response sent to the HTTP-Redirect is double encoded. |
287
|
|
|
|
|
|
|
The double encoding requires it to be decoded prior to processing. |
288
|
|
|
|
|
|
|
|
289
|
|
|
|
|
|
|
=back |
290
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
=head2 new_from_url( url => $url, cacert => $cacert, ssl_opts => {} ) |
292
|
|
|
|
|
|
|
|
293
|
|
|
|
|
|
|
Create an IdP object by retrieving the metadata at the given URL. |
294
|
|
|
|
|
|
|
|
295
|
|
|
|
|
|
|
Dies if the metadata can't be retrieved with reason. |
296
|
|
|
|
|
|
|
|
297
|
|
|
|
|
|
|
=head2 new_from_xml( xml => $xml, cacert => $cacert ) |
298
|
|
|
|
|
|
|
|
299
|
|
|
|
|
|
|
Constructor. Create an IdP object using the provided metadata XML |
300
|
|
|
|
|
|
|
document. |
301
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
=head2 BUILD ( hashref of the parameters passed to the constructor ) |
303
|
|
|
|
|
|
|
|
304
|
|
|
|
|
|
|
Called after the object is created to validate the IdP using the cacert |
305
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
=head2 sso_url( $binding ) |
307
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
Returns the url for the SSO service using the given binding. Binding |
309
|
|
|
|
|
|
|
name should be the full URI. |
310
|
|
|
|
|
|
|
|
311
|
|
|
|
|
|
|
=head2 slo_url( $binding ) |
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
Returns the url for the Single Logout Service using the given |
314
|
|
|
|
|
|
|
binding. Binding name should be the full URI. |
315
|
|
|
|
|
|
|
|
316
|
|
|
|
|
|
|
=head2 art_url( $binding ) |
317
|
|
|
|
|
|
|
|
318
|
|
|
|
|
|
|
Returns the url for the Artifact Resolution service using the given |
319
|
|
|
|
|
|
|
binding. Binding name should be the full URI. |
320
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
=head2 cert( $use ) |
322
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
Returns the IdP's certificate for the given use (e.g. C<signing>). |
324
|
|
|
|
|
|
|
|
325
|
|
|
|
|
|
|
=head2 binding( $name ) |
326
|
|
|
|
|
|
|
|
327
|
|
|
|
|
|
|
Returns the full Binding URI for the given binding name (i.e. C<redirect> or C<soap>). |
328
|
|
|
|
|
|
|
Includes this module's currently-supported bindings. |
329
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
=head2 format( $short_name ) |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
Returns the full NameID Format URI for the given short name. |
333
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
If no short name is provided, returns the URI for the default format, |
335
|
|
|
|
|
|
|
the one listed first by the IdP. |
336
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
If no NameID formats were advertised by the IdP, returns undef. |
338
|
|
|
|
|
|
|
|
339
|
|
|
|
|
|
|
=head1 AUTHOR |
340
|
|
|
|
|
|
|
|
341
|
|
|
|
|
|
|
Chris Andrews <chrisa@cpan.org> |
342
|
|
|
|
|
|
|
|
343
|
|
|
|
|
|
|
=head1 COPYRIGHT AND LICENSE |
344
|
|
|
|
|
|
|
|
345
|
|
|
|
|
|
|
This software is copyright (c) 2021 by Chris Andrews and Others, see the git log. |
346
|
|
|
|
|
|
|
|
347
|
|
|
|
|
|
|
This is free software; you can redistribute it and/or modify it under |
348
|
|
|
|
|
|
|
the same terms as the Perl 5 programming language system itself. |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
=cut |