Warning: file_get_contents(/data/phpspider/zhask/data//catemap/2/.net/24.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
.net Kentor.AuthServices正在配置指纹验证_.net_Single Sign On_Wif_Saml 2.0_Kentor Authservices - Fatal编程技术网

.net Kentor.AuthServices正在配置指纹验证

.net Kentor.AuthServices正在配置指纹验证,.net,single-sign-on,wif,saml-2.0,kentor-authservices,.net,Single Sign On,Wif,Saml 2.0,Kentor Authservices,如何配置以使用WIF中的颁发者注册表?具体来说,要基于指纹进行检查,如以下示例所示: <system.identityModel> <identityConfiguration> <securityTokenHandlers> <securityTokenHandlerConfiguration> <issuerNameRegistry type="System.IdentityMode

如何配置以使用WIF中的颁发者注册表?具体来说,要基于指纹进行检查,如以下示例所示:

<system.identityModel>
    <identityConfiguration>
      <securityTokenHandlers>
        <securityTokenHandlerConfiguration>
          <issuerNameRegistry type="System.IdentityModel.Tokens.ConfigurationBasedIssuerNameRegistry, System.IdentityModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=B77A5C561934E089">
            <trustedIssuers>
              <add thumbprint="1111111111111" name="http://some.domain/adfs/services/trust" />
            </trustedIssuers>
          </issuerNameRegistry>
          <certificateValidation certificateValidationMode="None"/>
        </securityTokenHandlerConfiguration>
      </securityTokenHandlers>
    </identityConfiguration>
  </system.identityModel>

"

有没有办法在Kentor中实现类似的功能,或者(更好的)有没有办法将现有的WIF配置提供给Kentor?

没有,目前(版本0.12.0),没有办法设置自己的
IssuerNameRegistry
。不过,这是我正在研究的,作为其中的一部分

然而,这一更改并非微不足道,因为它不仅仅是向WIF提供一个配置的
issuernamerRegistry
,因为这只包括断言本身被签名的情况。如果签名在消息级别,验证由AuthServices本身完成,因此代码也必须更改以使用
issuernamerRegistry

  <kentor.authServices>
    <identityProviders>
      <add entityId="http://some.domain/adfs/services/trust" destinationUrl="https://some.domain/adfs/ls" allowUnsolicitedAuthnResponse="true" binding="HttpPost">
        <signingCertificate findValue="1111111111111" x509FindType="FindByThumbprint" />
      </add>
    </identityProviders>
  </kentor.authServices>