spSingleLogoutInit.jsp revision 93884f14ebc35fbfaef3d70d4d69003d06891524
2N/A $Id: spSingleLogoutInit.jsp,v 1.13 2009/10/15 00:01:11 exu Exp $
2N/A<%@ page import="com.sun.identity.plugin.session.SessionManager" %>
2N/A<%@ page import="com.sun.identity.plugin.session.SessionException" %>
2N/A<%@ page import="com.sun.identity.saml.common.SAMLUtils" %>
2N/A<%@ page import="com.sun.identity.saml2.common.SAML2Utils" %>
2N/A<%@ page import="com.sun.identity.saml2.common.SAML2Constants" %>
2N/A<%@ page import="com.sun.identity.saml2.jaxb.entityconfig.SPSSOConfigElement" %>
2N/A<%@ page import="com.sun.identity.saml2.meta.SAML2MetaManager" %>
2N/A<%@ page import="com.sun.identity.saml2.meta.SAML2MetaUtils" %>
2N/A<%@ page import="com.sun.identity.saml2.common.SAML2Exception" %>
2N/A<%@ page import="com.sun.identity.saml2.profile.LogoutUtil" %>
2N/A<%@ page import="com.sun.identity.saml2.profile.SPCache" %>
2N/A<%@ page import="com.sun.identity.saml2.profile.SPSingleLogout" %>
2N/A<%@ page import="java.util.HashMap" %>
2N/A<%@ page import="java.util.List" %>
2N/A<%@ page import="org.owasp.esapi.ESAPI" %>
2N/A<%@ page import="java.io.PrintWriter" %>
2N/A<%@ page import="org.forgerock.guice.core.InjectorHolder" %>
2N/A<%@ page import="org.forgerock.openam.audit.AuditEventPublisher" %>
2N/A<%@ page import="org.forgerock.openam.saml2.audit.SAML2Auditor" %>
2N/A<%@ page import="org.forgerock.openam.audit.AuditEventFactory" %>
2N/A saml2Auditor.setMethod("spSingleLogoutInit");
2N/A if (RelayState == null || RelayState.isEmpty()) {
2N/A if (!ESAPI.validator().isValidInput("RelayState", RelayState, "HTTPQueryString", 2000, true)) {
2N/A ssoToken = SessionManager.getProvider().getSession(request);
2N/A saml2Auditor.setSSOTokenId(ssoToken);
2N/A if (SAML2Utils.debug.messageEnabled()) {
2N/A SAML2Utils.debug.message("No session.");
2N/A if (!SPCache.isFedlet) {
2N/A if (RelayState != null && !RelayState.isEmpty()
2N/A && ESAPI.validator().isValidInput("RelayState", RelayState, "URL", 2000, true)) {
2N/A response.sendRedirect(RelayState);
2N/A <jsp:forward page="/saml2/jsp/default.jsp?message=spSloSuccess"/>
2N/A String[] values = SessionManager.getProvider().
2N/A getProperty(ssoToken, SAML2Constants.SP_METAALIAS);
2N/A if (values != null && values.length > 0) {
2N/A saml2Auditor.setSSOTokenId(ssoToken);
2N/A spEntityID = request.getParameter("spEntityID");
2N/A if ((spEntityID == null) || (spEntityID.length() == 0)) {
2N/A if ((spMetaAliases != null) && !spMetaAliases.isEmpty()) {
2N/A metaAlias = (String) spMetaAliases.get(0);
2N/A manager.getSPSSOConfig("/", spEntityID);
2N/A metaAlias = spConfig.getMetaAlias();
2N/A SessionManager.getProvider().invalidateSession(ssoToken, request, response);
2N/A if (SAML2Utils.debug.messageEnabled()) {
2N/A SAML2Utils.debug.message("No session.");
2N/A if (RelayState != null && SAML2Utils.isRelayStateURLValid(request, RelayState, SAML2Constants.SP_ROLE)
2N/A && ESAPI.validator().isValidInput("RelayState", RelayState, "URL", 2000, true)) {
2N/A response.sendRedirect(RelayState);
2N/A <jsp:forward page="/saml2/jsp/default.jsp?message=spSloSuccess"/>
2N/A String idpEntityID = request.getParameter("idpEntityID");
2N/A String binding = LogoutUtil.getSLOBindingInfo(request, metaAlias,
2N/A SAML2Constants.SP_ROLE, idpEntityID);
2N/A spEntityID = manager.getEntityByMetaAlias(metaAlias);
2N/A String realm = SAML2MetaUtils.getRealmByMetaAlias(metaAlias);
2N/A * this parameter is /realm_name/SP_name.
2N/A if (SPCache.isFedlet) {
2N/A String sessionIndex = request.getParameter("SessionIndex");
2N/A if ((sessionIndex == null) || (sessionIndex.length() == 0)) {
2N/A SAML2Utils.bundle.getString("nullSessionIndex"));
2N/A SAML2Utils.bundle.getString("nullSessionIndex"));
2N/A paramsMap.put("SessionIndex", sessionIndex);
2N/A String nameID = request.getParameter("NameIDValue");
2N/A if ((nameID == null) || (nameID.length() == 0)) {
2N/A SAML2Utils.bundle.getString("nullNameID"));
2N/A SAML2Utils.bundle.getString("nullNameID"));
2N/A spEntityID = manager.getEntityByMetaAlias(metaAlias);
2N/A SAMLUtils.sendError(request, response,
2N/A SAML2Utils.bundle.getString("nullIDPEntityID"));
2N/A SAML2Utils.bundle.getString("nullIDPEntityID"));
2N/A paramsMap.put("metaAlias", metaAlias);
2N/A paramsMap.put("idpEntityID", idpEntityID);
2N/A if (RelayState == null || RelayState.isEmpty()) {
2N/A RelayState = SAML2Utils.getAttributeValueFromSSOConfig(
2N/A realm, spEntityID, SAML2Constants.SP_ROLE,
2N/A if (RelayState != null && !RelayState.isEmpty()
2N/A && ESAPI.validator().isValidInput("RelayState", RelayState, "URL", 2000, true)) {
2N/A response.sendRedirect(RelayState);
2N/A <jsp:forward page="/saml2/jsp/default.jsp?message=spSloSuccess"/>
2N/A SAML2Utils.debug.error("Error sending Logout Request " , sse);
2N/A SAML2Utils.bundle.getString("LogoutRequestCreationError"));
2N/A SAML2Utils.debug.error("Error initializing Request ",e);
2N/A SAML2Utils.bundle.getString("LogoutRequestCreationError"));