@boxyhq/saml-jackson 0.2.4-beta.198 → 0.3.0-beta.248

Sign up to get free protection for your applications and to get access to all the features.
Files changed (100) hide show
  1. package/Dockerfile +9 -7
  2. package/README.md +28 -29
  3. package/dist/controller/api.d.ts +32 -0
  4. package/dist/controller/api.js +193 -0
  5. package/dist/controller/error.d.ts +5 -0
  6. package/dist/controller/error.js +12 -0
  7. package/dist/controller/oauth/allowed.d.ts +1 -0
  8. package/dist/controller/oauth/allowed.js +17 -0
  9. package/dist/controller/oauth/code-verifier.d.ts +2 -0
  10. package/dist/controller/oauth/code-verifier.js +15 -0
  11. package/dist/controller/oauth/redirect.d.ts +1 -0
  12. package/dist/controller/oauth/redirect.js +11 -0
  13. package/dist/controller/oauth.d.ts +23 -0
  14. package/dist/controller/oauth.js +263 -0
  15. package/dist/controller/utils.d.ts +6 -0
  16. package/dist/controller/utils.js +17 -0
  17. package/dist/db/db.d.ts +15 -0
  18. package/dist/db/db.js +107 -0
  19. package/dist/db/encrypter.d.ts +3 -0
  20. package/dist/db/encrypter.js +29 -0
  21. package/dist/db/mem.d.ts +20 -0
  22. package/dist/db/mem.js +128 -0
  23. package/dist/db/mongo.d.ts +17 -0
  24. package/dist/db/mongo.js +106 -0
  25. package/dist/db/redis.d.ts +15 -0
  26. package/dist/db/redis.js +107 -0
  27. package/dist/db/sql/entity/JacksonIndex.d.ts +7 -0
  28. package/dist/db/sql/entity/JacksonIndex.js +41 -0
  29. package/dist/db/sql/entity/JacksonStore.d.ts +6 -0
  30. package/dist/db/sql/entity/JacksonStore.js +42 -0
  31. package/dist/db/sql/entity/JacksonTTL.d.ts +4 -0
  32. package/dist/db/sql/entity/JacksonTTL.js +29 -0
  33. package/dist/db/sql/sql.d.ts +20 -0
  34. package/dist/db/sql/sql.js +174 -0
  35. package/dist/db/store.d.ts +5 -0
  36. package/dist/db/store.js +68 -0
  37. package/dist/db/utils.d.ts +7 -0
  38. package/dist/db/utils.js +29 -0
  39. package/dist/env.d.ts +22 -0
  40. package/dist/env.js +35 -0
  41. package/dist/index.d.ts +9 -0
  42. package/dist/index.js +82 -0
  43. package/dist/jackson.d.ts +1 -0
  44. package/dist/jackson.js +153 -0
  45. package/dist/read-config.d.ts +3 -0
  46. package/dist/read-config.js +50 -0
  47. package/dist/saml/claims.d.ts +6 -0
  48. package/dist/saml/claims.js +35 -0
  49. package/dist/saml/saml.d.ts +11 -0
  50. package/dist/saml/saml.js +200 -0
  51. package/dist/saml/x509.d.ts +7 -0
  52. package/dist/saml/x509.js +69 -0
  53. package/dist/typings.d.ts +137 -0
  54. package/dist/typings.js +2 -0
  55. package/package.json +41 -21
  56. package/.dockerignore +0 -2
  57. package/.eslintrc.js +0 -13
  58. package/.github/ISSUE_TEMPLATE/bug_report.md +0 -27
  59. package/.github/ISSUE_TEMPLATE/config.yml +0 -5
  60. package/.github/ISSUE_TEMPLATE/feature_request.md +0 -43
  61. package/.github/pull_request_template.md +0 -31
  62. package/.github/workflows/codesee-arch-diagram.yml +0 -81
  63. package/.github/workflows/main.yml +0 -123
  64. package/_dev/docker-compose.yml +0 -37
  65. package/map.js +0 -1
  66. package/prettier.config.js +0 -4
  67. package/src/controller/api.js +0 -167
  68. package/src/controller/error.js +0 -12
  69. package/src/controller/oauth/allowed.js +0 -19
  70. package/src/controller/oauth/code-verifier.js +0 -16
  71. package/src/controller/oauth/redirect.js +0 -18
  72. package/src/controller/oauth.js +0 -321
  73. package/src/controller/utils.js +0 -19
  74. package/src/db/db.js +0 -81
  75. package/src/db/db.test.js +0 -302
  76. package/src/db/encrypter.js +0 -36
  77. package/src/db/mem.js +0 -111
  78. package/src/db/mongo.js +0 -89
  79. package/src/db/redis.js +0 -88
  80. package/src/db/sql/entity/JacksonIndex.js +0 -42
  81. package/src/db/sql/entity/JacksonStore.js +0 -42
  82. package/src/db/sql/entity/JacksonTTL.js +0 -23
  83. package/src/db/sql/model/JacksonIndex.js +0 -9
  84. package/src/db/sql/model/JacksonStore.js +0 -10
  85. package/src/db/sql/model/JacksonTTL.js +0 -8
  86. package/src/db/sql/sql.js +0 -153
  87. package/src/db/store.js +0 -42
  88. package/src/db/utils.js +0 -30
  89. package/src/env.js +0 -39
  90. package/src/index.js +0 -67
  91. package/src/jackson.js +0 -161
  92. package/src/read-config.js +0 -24
  93. package/src/saml/claims.js +0 -40
  94. package/src/saml/saml.js +0 -223
  95. package/src/saml/x509.js +0 -48
  96. package/src/test/api.test.js +0 -186
  97. package/src/test/data/metadata/boxyhq.js +0 -6
  98. package/src/test/data/metadata/boxyhq.xml +0 -30
  99. package/src/test/data/saml_response +0 -1
  100. package/src/test/oauth.test.js +0 -342
package/src/saml/saml.js DELETED
@@ -1,223 +0,0 @@
1
- const saml = require('@boxyhq/saml20');
2
- const xml2js = require('xml2js');
3
- const rambda = require('rambda');
4
- const thumbprint = require('thumbprint');
5
- const xmlbuilder = require('xmlbuilder');
6
- const crypto = require('crypto');
7
- const xmlcrypto = require('xml-crypto');
8
- const claims = require('./claims');
9
-
10
- const idPrefix = '_';
11
- const authnXPath =
12
- '/*[local-name(.)="AuthnRequest" and namespace-uri(.)="urn:oasis:names:tc:SAML:2.0:protocol"]';
13
- const issuerXPath =
14
- '/*[local-name(.)="Issuer" and namespace-uri(.)="urn:oasis:names:tc:SAML:2.0:assertion"]';
15
-
16
- const signRequest = (xml, signingKey) => {
17
- if (!xml) {
18
- throw new Error('Please specify xml');
19
- }
20
- if (!signingKey) {
21
- throw new Error('Please specify signingKey');
22
- }
23
-
24
- const sig = new xmlcrypto.SignedXml();
25
- sig.signatureAlgorithm = 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256';
26
- sig.signingKey = signingKey;
27
- sig.addReference(
28
- authnXPath,
29
- [
30
- 'http://www.w3.org/2000/09/xmldsig#enveloped-signature',
31
- 'http://www.w3.org/2001/10/xml-exc-c14n#',
32
- ],
33
- 'http://www.w3.org/2001/04/xmlenc#sha256'
34
- );
35
- sig.computeSignature(xml, {
36
- location: { reference: authnXPath + issuerXPath, action: 'after' },
37
- });
38
-
39
- return sig.getSignedXml();
40
- };
41
-
42
- module.exports = {
43
- request: ({
44
- ssoUrl,
45
- entityID,
46
- callbackUrl,
47
- isPassive = false,
48
- forceAuthn = false,
49
- identifierFormat = 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
50
- providerName = 'BoxyHQ',
51
- signingKey,
52
- }) => {
53
- const id = idPrefix + crypto.randomBytes(10).toString('hex');
54
- const date = new Date().toISOString();
55
-
56
- const samlReq = {
57
- 'samlp:AuthnRequest': {
58
- '@xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol',
59
- '@ID': id,
60
- '@Version': '2.0',
61
- '@IssueInstant': date,
62
- '@ProtocolBinding': 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
63
- '@Destination': ssoUrl,
64
- 'saml:Issuer': {
65
- '@xmlns:saml': 'urn:oasis:names:tc:SAML:2.0:assertion',
66
- '#text': entityID,
67
- },
68
- },
69
- };
70
-
71
- if (isPassive) samlReq['samlp:AuthnRequest']['@IsPassive'] = true;
72
-
73
- if (forceAuthn) {
74
- samlReq['samlp:AuthnRequest']['@ForceAuthn'] = true;
75
- }
76
-
77
- samlReq['samlp:AuthnRequest']['@AssertionConsumerServiceURL'] = callbackUrl;
78
-
79
- samlReq['samlp:AuthnRequest']['samlp:NameIDPolicy'] = {
80
- '@xmlns:samlp': 'urn:oasis:names:tc:SAML:2.0:protocol',
81
- '@Format': identifierFormat,
82
- '@AllowCreate': 'true',
83
- };
84
-
85
- if (providerName != null) {
86
- samlReq['samlp:AuthnRequest']['@ProviderName'] = providerName;
87
- }
88
-
89
- let xml = xmlbuilder.create(samlReq).end({});
90
- if (signingKey) {
91
- xml = signRequest(xml, signingKey);
92
- }
93
-
94
- return {
95
- id,
96
- request: xml,
97
- };
98
- },
99
-
100
- parseAsync: async (rawAssertion) => {
101
- return new Promise((resolve, reject) => {
102
- saml.parse(rawAssertion, function onParseAsync(err, profile) {
103
- if (err) {
104
- reject(err);
105
- return;
106
- }
107
-
108
- resolve(profile);
109
- });
110
- });
111
- },
112
-
113
- validateAsync: async (rawAssertion, options) => {
114
- return new Promise((resolve, reject) => {
115
- saml.validate(
116
- rawAssertion,
117
- options,
118
- function onValidateAsync(err, profile) {
119
- if (err) {
120
- reject(err);
121
- return;
122
- }
123
-
124
- if (profile && profile.claims) {
125
- // we map claims to our attributes id, email, firstName, lastName where possible. We also map original claims to raw
126
- profile.claims = claims.map(profile.claims);
127
-
128
- // some providers don't return the id in the assertion, we set it to a sha256 hash of the email
129
- if (!profile.claims.id) {
130
- profile.claims.id = crypto
131
- .createHash('sha256')
132
- .update(profile.claims.email)
133
- .digest('hex');
134
- }
135
- }
136
-
137
- resolve(profile);
138
- }
139
- );
140
- });
141
- },
142
-
143
- parseMetadataAsync: async (idpMeta) => {
144
- return new Promise((resolve, reject) => {
145
- xml2js.parseString(
146
- idpMeta,
147
- { tagNameProcessors: [xml2js.processors.stripPrefix] },
148
- (err, res) => {
149
- if (err) {
150
- reject(err);
151
- return;
152
- }
153
-
154
- const entityID = rambda.path('EntityDescriptor.$.entityID', res);
155
- let X509Certificate = null;
156
- let ssoPostUrl = null;
157
- let ssoRedirectUrl = null;
158
- let loginType = 'idp';
159
-
160
- let ssoDes = rambda.pathOr(
161
- null,
162
- 'EntityDescriptor.IDPSSODescriptor',
163
- res
164
- );
165
- if (!ssoDes) {
166
- ssoDes = rambda.pathOr([], 'EntityDescriptor.SPSSODescriptor', res);
167
- if (!ssoDes) {
168
- loginType = 'sp';
169
- }
170
- }
171
-
172
- for (const ssoDesRec of ssoDes) {
173
- const keyDes = ssoDesRec['KeyDescriptor'];
174
- for (const keyDesRec of keyDes) {
175
- if (keyDesRec['$'] && keyDesRec['$'].use === 'signing') {
176
- const ki = keyDesRec['KeyInfo'][0];
177
- const cd = ki['X509Data'][0];
178
- X509Certificate = cd['X509Certificate'][0];
179
- }
180
- }
181
-
182
- const ssoSvc =
183
- ssoDesRec['SingleSignOnService'] ||
184
- ssoDesRec['AssertionConsumerService'] ||
185
- [];
186
- for (const ssoSvcRec of ssoSvc) {
187
- if (
188
- rambda.pathOr('', '$.Binding', ssoSvcRec).endsWith('HTTP-POST')
189
- ) {
190
- ssoPostUrl = rambda.path('$.Location', ssoSvcRec);
191
- } else if (
192
- rambda
193
- .pathOr('', '$.Binding', ssoSvcRec)
194
- .endsWith('HTTP-Redirect')
195
- ) {
196
- ssoRedirectUrl = rambda.path('$.Location', ssoSvcRec);
197
- }
198
- }
199
- }
200
-
201
- const ret = {
202
- sso: {},
203
- };
204
- if (entityID) {
205
- ret.entityID = entityID;
206
- }
207
- if (X509Certificate) {
208
- ret.thumbprint = thumbprint.calculate(X509Certificate);
209
- }
210
- if (ssoPostUrl) {
211
- ret.sso.postUrl = ssoPostUrl;
212
- }
213
- if (ssoRedirectUrl) {
214
- ret.sso.redirectUrl = ssoRedirectUrl;
215
- }
216
- ret.loginType = loginType;
217
-
218
- resolve(ret);
219
- }
220
- );
221
- });
222
- },
223
- };
package/src/saml/x509.js DELETED
@@ -1,48 +0,0 @@
1
- const x509 = require('@peculiar/x509');
2
- const { Crypto } = require('@peculiar/webcrypto');
3
-
4
- const crypto = new Crypto();
5
- x509.cryptoProvider.set(crypto);
6
-
7
- const alg = {
8
- name: 'RSASSA-PKCS1-v1_5',
9
- hash: 'SHA-256',
10
- publicExponent: new Uint8Array([1, 0, 1]),
11
- modulusLength: 2048,
12
- };
13
-
14
- const generate = async () => {
15
- const keys = await crypto.subtle.generateKey(alg, true, ['sign', 'verify']);
16
-
17
- const extensions = [
18
- new x509.BasicConstraintsExtension(false, undefined, true),
19
- ];
20
-
21
- extensions.push(
22
- new x509.KeyUsagesExtension(x509.KeyUsageFlags.digitalSignature, true)
23
- );
24
- extensions.push(
25
- await x509.SubjectKeyIdentifierExtension.create(keys.publicKey)
26
- );
27
-
28
- const cert = await x509.X509CertificateGenerator.createSelfSigned({
29
- serialNumber: '01',
30
- name: 'CN=BoxyHQ Jackson',
31
- notBefore: new Date(),
32
- notAfter: new Date('3021/01/01'), // TODO: set shorter expiry and rotate ceritifcates
33
- signingAlgorithm: alg,
34
- keys: keys,
35
- extensions,
36
- });
37
-
38
- const pkcs8 = await crypto.subtle.exportKey('pkcs8', keys.privateKey);
39
-
40
- return {
41
- publicKey: cert.toString('pem'),
42
- privateKey: x509.PemConverter.encode(pkcs8, 'private key'),
43
- };
44
- };
45
-
46
- module.exports = {
47
- generate,
48
- };
@@ -1,186 +0,0 @@
1
- const tap = require('tap');
2
- const path = require('path');
3
- const sinon = require('sinon');
4
- const crypto = require('crypto');
5
-
6
- const readConfig = require('../read-config');
7
- const dbutils = require('../db/utils');
8
-
9
- let apiController;
10
-
11
- const CLIENT_ID = '75edb050796a0eb1cf2cfb0da7245f85bc50baa7';
12
- const PROVIDER = 'accounts.google.com';
13
- const OPTIONS = {
14
- externalUrl: 'https://my-cool-app.com',
15
- samlAudience: 'https://saml.boxyhq.com',
16
- samlPath: '/sso/oauth/saml',
17
- db: {
18
- engine: 'mem',
19
- },
20
- };
21
-
22
- tap.before(async () => {
23
- const controller = await require('../index.js')(OPTIONS);
24
-
25
- apiController = controller.apiController;
26
- });
27
-
28
- tap.teardown(async () => {
29
- process.exit(0);
30
- });
31
-
32
- tap.test('controller/api', async (t) => {
33
- const metadataPath = path.join(__dirname, '/data/metadata');
34
- const config = await readConfig(metadataPath);
35
-
36
- t.test('.config()', async (t) => {
37
- t.test('when required fields are missing or invalid', async (t) => {
38
- t.test('when `rawMetadata` is empty', async (t) => {
39
- const body = Object.assign({}, config[0]);
40
- delete body['rawMetadata'];
41
-
42
- try {
43
- await apiController.config(body);
44
- t.fail('Expecting JacksonError.');
45
- } catch (err) {
46
- t.equal(err.message, 'Please provide rawMetadata');
47
- t.equal(err.statusCode, 400);
48
- }
49
-
50
- t.end();
51
- });
52
-
53
- t.test('when `defaultRedirectUrl` is empty', async (t) => {
54
- const body = Object.assign({}, config[0]);
55
- delete body['defaultRedirectUrl'];
56
-
57
- try {
58
- await apiController.config(body);
59
- t.fail('Expecting JacksonError.');
60
- } catch (err) {
61
- t.equal(err.message, 'Please provide a defaultRedirectUrl');
62
- t.equal(err.statusCode, 400);
63
- }
64
-
65
- t.end();
66
- });
67
-
68
- t.test('when `redirectUrl` is empty', async (t) => {
69
- const body = Object.assign({}, config[0]);
70
- delete body['redirectUrl'];
71
-
72
- try {
73
- await apiController.config(body);
74
- t.fail('Expecting JacksonError.');
75
- } catch (err) {
76
- t.equal(err.message, 'Please provide redirectUrl');
77
- t.equal(err.statusCode, 400);
78
- }
79
-
80
- t.end();
81
- });
82
-
83
- t.test('when `tenant` is empty', async (t) => {
84
- const body = Object.assign({}, config[0]);
85
- delete body['tenant'];
86
-
87
- try {
88
- await apiController.config(body);
89
- t.fail('Expecting JacksonError.');
90
- } catch (err) {
91
- t.equal(err.message, 'Please provide tenant');
92
- t.equal(err.statusCode, 400);
93
- }
94
-
95
- t.end();
96
- });
97
-
98
- t.test('when `product` is empty', async (t) => {
99
- const body = Object.assign({}, config[0]);
100
- delete body['product'];
101
-
102
- try {
103
- await apiController.config(body);
104
- t.fail('Expecting JacksonError.');
105
- } catch (err) {
106
- t.equal(err.message, 'Please provide product');
107
- t.equal(err.statusCode, 400);
108
- }
109
-
110
- t.end();
111
- });
112
-
113
- t.test('when `rawMetadata` is not a valid XML', async (t) => {
114
- const body = Object.assign({}, config[0]);
115
- body['rawMetadata'] = 'not a valid XML';
116
-
117
- try {
118
- await apiController.config(body);
119
- t.fail('Expecting Error.');
120
- } catch (err) {
121
- t.match(err.message, /Non-whitespace before first tag./);
122
- }
123
-
124
- t.end();
125
- });
126
- });
127
-
128
- t.test('when the request is good', async (t) => {
129
- const body = Object.assign({}, config[0]);
130
-
131
- const kdStub = sinon.stub(dbutils, 'keyDigest').returns(CLIENT_ID);
132
- const rbStub = sinon
133
- .stub(crypto, 'randomBytes')
134
- .returns('f3b0f91eb8f4a9f7cc2254e08682d50b05b5d36262929e7f');
135
-
136
- const response = await apiController.config(body);
137
- t.ok(kdStub.called);
138
- t.ok(rbStub.calledOnce);
139
- t.equal(response.client_id, CLIENT_ID);
140
- t.equal(
141
- response.client_secret,
142
- 'f3b0f91eb8f4a9f7cc2254e08682d50b05b5d36262929e7f'
143
- );
144
- t.equal(response.provider, PROVIDER);
145
-
146
- let savedConf = await apiController.getConfig({
147
- clientID: CLIENT_ID,
148
- });
149
- t.equal(savedConf.provider, PROVIDER);
150
- try {
151
- await apiController.deleteConfig({ clientID: CLIENT_ID });
152
- t.fail('Expecting JacksonError.');
153
- } catch (err) {
154
- t.equal(err.message, 'Please provide clientSecret');
155
- t.equal(err.statusCode, 400);
156
- }
157
- try {
158
- await apiController.deleteConfig({
159
- clientID: CLIENT_ID,
160
- clientSecret: 'xxxxx',
161
- });
162
- t.fail('Expecting JacksonError.');
163
- } catch (err) {
164
- t.equal(err.message, 'clientSecret mismatch');
165
- t.equal(err.statusCode, 400);
166
- }
167
- await apiController.deleteConfig({
168
- clientID: CLIENT_ID,
169
- clientSecret: 'f3b0f91eb8f4a9f7cc2254e08682d50b05b5d36262929e7f',
170
- });
171
- savedConf = await apiController.getConfig({
172
- clientID: CLIENT_ID,
173
- });
174
- t.same(savedConf, {}, 'should return empty config');
175
-
176
- dbutils.keyDigest.restore();
177
- crypto.randomBytes.restore();
178
-
179
- t.end();
180
- });
181
-
182
- t.end();
183
- });
184
-
185
- t.end();
186
- });
@@ -1,6 +0,0 @@
1
- module.exports = {
2
- defaultRedirectUrl: 'http://localhost:3000/sso/oauth/completed',
3
- redirectUrl: '["http://localhost:3000"]',
4
- tenant: 'boxyhq.com',
5
- product: 'crm',
6
- };
@@ -1,30 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8" standalone="no"?>
2
- <md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" entityID="https://accounts.google.com/o/saml2" validUntil="2026-06-22T18:39:53.000Z">
3
- <md:IDPSSODescriptor WantAuthnRequestsSigned="false" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
4
- <md:KeyDescriptor use="signing">
5
- <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
6
- <ds:X509Data>
7
- <ds:X509Certificate>MIIDdDCCAlygAwIBAgIGAXo6K+u/MA0GCSqGSIb3DQEBCwUAMHsxFDASBgNVBAoTC0dvb2dsZSBJ
8
- bmMuMRYwFAYDVQQHEw1Nb3VudGFpbiBWaWV3MQ8wDQYDVQQDEwZHb29nbGUxGDAWBgNVBAsTD0dv
9
- b2dsZSBGb3IgV29yazELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWEwHhcNMjEwNjIz
10
- MTgzOTUzWhcNMjYwNjIyMTgzOTUzWjB7MRQwEgYDVQQKEwtHb29nbGUgSW5jLjEWMBQGA1UEBxMN
11
- TW91bnRhaW4gVmlldzEPMA0GA1UEAxMGR29vZ2xlMRgwFgYDVQQLEw9Hb29nbGUgRm9yIFdvcmsx
12
- CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
13
- MIIBCgKCAQEA4qZcxwPiVka9GzGdQ9LVlgVkn3A7O3HtxR6RIm5AMaL4YZziEHt2HgxLdJZyXYJw
14
- yfT1KB2IHt+XDQBkgEpQVXuuwSPI8vhI8Jr+nr8zia3MMoy9vJF8ZG7HuWeakaKEh7tJqjYu1Cl9
15
- a81rkYdXAFUA+gl2q+stvK26xylAUwptCJSQo0NanWzCq+k5zvX0uLmh58+W5Yv11hDTtAoW+1dH
16
- LWUTHXPfoZINPRy5NGKJ2Onq5/D5XJRimNnUa2iYi0Yv9txp1RRq4dpB9MaVttt3iKyDo4/+8fg/
17
- bL8BLhguiOeqcP4DEIzMuExi3bZAOu2NC7k7Qf28nA81LzP9DQIDAQABMA0GCSqGSIb3DQEBCwUA
18
- A4IBAQARBNB3+MfmKr5WXNXXE9YwUzUGmpfbqUPXh2y2dOAkj6TzoekAsOLWB0p8oyJ5d1bFlTsx
19
- i1OY9RuFl0tc35Jbo+ae5GfUvJmbnYGi9z8sBL55HY6x3KQNmM/ehof7ttZwvB6nwuRxAiGYG497
20
- 3tSzrqMQzEskcgX1mlCW0vks/ztCaayprDXcCUxWdP9FaiSZDEXV6PHhFZgGlRNvERsgaMDJgOsq
21
- v6hLX10Q9CtOWzqu18PI4DcfoZ7exWcC29yWvwZzDTfHGaSG1DtUFLwiQmhVUbfd7/fmLV+/iOxV
22
- zI0b5xSYZOJ7Kena7gd5zGVrc2ygKAFKiffiI5GLmLkv</ds:X509Certificate>
23
- </ds:X509Data>
24
- </ds:KeyInfo>
25
- </md:KeyDescriptor>
26
- <md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat>
27
- <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://accounts.google.com/o/saml2"/>
28
- <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://accounts.google.com/o/saml2"/>
29
- </md:IDPSSODescriptor>
30
- </md:EntityDescriptor>
@@ -1 +0,0 @@
1
- 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