|
internal string GetSAMLToken(SAMLTokenRequestDTO sAMLTokenRequest) |
|
{ |
|
var organisationVal = "urn:oid:" + GetDBParameterValue("SYSTEM_OBJECT_IDENTIFIER", string.Empty); |
|
var issuerAddress = "http://" + Dns.GetHostName() + "/" + IPGlobalProperties.GetIPGlobalProperties().DomainName + "/idp"; |
|
#region Create SAML Assertion Object |
|
|
|
Saml2NameIdentifier nameIdentifier = new Saml2NameIdentifier(issuerAddress); |
|
var gc = "_" + Guid.NewGuid().ToString(); |
|
Saml2Assertion assertion = new Saml2Assertion(nameIdentifier) |
|
{ |
|
Id = new Saml2Id(gc.ToString()), |
|
Issuer = new Saml2NameIdentifier(issuerAddress) |
|
}; |
|
#endregion |
|
|
|
#region Get Signed Certificate from store |
|
X509Store store = new X509Store(StoreName.My, StoreLocation.LocalMachine); |
|
store.Open(OpenFlags.ReadOnly); |
|
object _certificateIssurer = sAMLTokenRequest.CertificateIssuer; |
|
X509Certificate2Collection certificate2Collection = store.Certificates.Find(X509FindType.FindByIssuerName, _certificateIssurer, false); |
|
X509Certificate2Collection certificate = null; |
|
if (certificate2Collection.Count > 1) |
|
{ |
|
certificate = certificate2Collection.Find(X509FindType.FindBySerialNumber, sAMLTokenRequest.CertificateSerial, false); |
|
if (certificate.Count < 1) //within this collection there should be unique serial number |
|
throw new ArgumentException(String.Format("Unable to locate certificate for {0} and {1}", sAMLTokenRequest.CertificateIssuer, sAMLTokenRequest.CertificateSerial)); |
|
} |
|
else if (certificate2Collection.Count == 1) |
|
certificate = certificate2Collection; |
|
else |
|
throw new ArgumentException(String.Format("Unable to locate certificate for {0} and {1}", sAMLTokenRequest.CertificateIssuer, sAMLTokenRequest.CertificateSerial)); |
|
X509Certificate2 signingCert = certificate[0]; |
|
store.Close(); |
|
|
|
#endregion |
|
|
|
#region Add Subject, Condition, Statement, Attributes |
|
AddAssertionSubject(assertion, sAMLTokenRequest.CertificateIssuer,sAMLTokenRequest.SubjectNameQualifer, sAMLTokenRequest.ServiceProviderNameQualifier, sAMLTokenRequest.TokenRecipientUrl); |
|
AddAssertionCondition(assertion, sAMLTokenRequest.TokenRecipientUrl); |
|
AddAuthnStatement(assertion); |
|
AddAttributeStatement(assertion, sAMLTokenRequest.CertificateIssuer, sAMLTokenRequest.SubjectRole, organisationVal); |
|
#endregion |
|
|
|
Saml2SecurityToken securityToken = new Saml2SecurityToken(assertion); |
|
Saml2SecurityTokenHandler handler = new Saml2SecurityTokenHandler(); |
|
var sb = new StringBuilder(); |
|
handler.WriteToken(new XmlPrefixTextWriter(new StringWriter(sb), "saml2"), securityToken); |
|
return SignXmlWithCertificate(sb.ToString(), signingCert, assertion); |
|
|
|
} |
|
|
|
private static string SignXmlWithCertificate(string assert, X509Certificate2 x509Certificate2, Saml2Assertion assertion) |
|
{ |
|
XmlDsigDocument doc = new XmlDsigDocument(); |
|
doc.LoadXml(assert); |
|
SignedXml signedXml = new SignedXml(doc); |
|
using (x509Certificate2.GetRSAPrivateKey()) { } |
|
signedXml.SigningKey = x509Certificate2.PrivateKey; |
|
signedXml.SignedInfo.CanonicalizationMethod = SignedXml.XmlDsigExcC14NTransformUrl; |
|
Reference reference = new Reference() |
|
{ |
|
Uri = "#" + assertion.Id |
|
}; |
|
reference.AddTransform(new XmlDsigEnvelopedSignatureTransform()); |
|
reference.AddTransform(new XmlDsigExcC14NTransform()); |
|
signedXml.AddReference(reference); |
|
|
|
KeyInfo keyInfo = new KeyInfo(); |
|
keyInfo.AddClause(new KeyInfoX509Data(x509Certificate2)); |
|
signedXml.KeyInfo = keyInfo; |
|
signedXml.ComputeSignature(); |
|
XmlElement xmlsig = signedXml.GetXml(); |
|
doc.DocumentElement.AppendChild(doc.ImportNode(xmlsig, true)); |
|
var xmlstring = new XmlPrefixTextWriter(new StringWriter(new StringBuilder()), "ds:"); |
|
return doc.InnerXml; |
|
} |
|
|
|
//this is some Organization ID I am fetching from Database. |
|
internal virtual string GetDBParameterValue(string parameterName, string hospitalUnit) |
|
{ |
|
string isusValue = string.Empty; |
|
if (parameterName != string.Empty) |
|
{ |
|
IConfigurationManager baseSettings = GetConfigurationManager<IConfigurationManager>(); |
|
if (hospitalUnit.IsNotNullOrEmpty()) |
|
isusValue = baseSettings.GetHospitalSettings(parameterName, hospitalUnit); |
|
else |
|
isusValue = baseSettings.GetHospitalSettings(parameterName); |
|
} |
|
return isusValue; |
|
} |
|
|
|
private static void AddAttributeStatement(Saml2Assertion assertion, string name, string role, string organizationVal) |
|
{ |
|
Saml2AttributeStatement attributeStatement = new Saml2AttributeStatement(); |
|
Saml2Attribute attributeXSPASubject = new Saml2Attribute("urn:oasis:names:tc:xacml:1.0:subject:subject-id") |
|
{ |
|
FriendlyName = "XSPA Subject", |
|
Name = "urn:oasis:names:tc:xacml:1.0:subject:subject-id", |
|
NameFormat = new Uri("urn:oasis:names:tc:SAML:2.0:attrname-format:uri"), |
|
}; |
|
attributeXSPASubject.Values.Add(name); |
|
attributeStatement.Attributes.Add(attributeXSPASubject); |
|
|
|
Saml2Attribute attributeXSPARole = new Saml2Attribute("urn:oasis:names:tc:xacml:2.0:subject:role") |
|
{ |
|
FriendlyName = "XSPA Role", |
|
Name = "urn:oasis:names:tc:xacml:2.0:subject:role", |
|
NameFormat = new Uri("urn:oasis:names:tc:SAML:2.0:attrname-format:uri"), |
|
}; |
|
attributeXSPARole.Values.Add(role); |
|
attributeStatement.Attributes.Add(attributeXSPARole); |
|
|
|
Saml2Attribute attributeXSPAOrganization = new Saml2Attribute("urn:oasis:names:tc:xspa:1.0:subject:organization") |
|
{ |
|
FriendlyName = "XSPA Organization", |
|
Name = "urn:oasis:names:tc:xspa:1.0:subject:organization", |
|
NameFormat = new Uri("urn:oasis:names:tc:SAML:2.0:attrname-format:uri"), |
|
}; |
|
attributeXSPAOrganization.Values.Add(organizationVal); |
|
attributeStatement.Attributes.Add(attributeXSPAOrganization); |
|
|
|
Saml2Attribute attributeXSPAOrganizationId = new Saml2Attribute("urn:oasis:names:tc:xspa:1.0:subject:organization-id") |
|
{ |
|
FriendlyName = "XSPA Organization Id", |
|
Name = "urn:oasis:names:tc:xspa:1.0:subject:organization-id", |
|
NameFormat = new Uri("urn:oasis:names:tc:SAML:2.0:attrname-format:uri"), |
|
}; |
|
attributeXSPAOrganizationId.Values.Add(organizationVal); |
|
attributeStatement.Attributes.Add(attributeXSPAOrganizationId); |
|
assertion.Statements.Add(attributeStatement); |
|
} |
|
|
|
private static void AddAuthnStatement(Saml2Assertion assertion) |
|
{ |
|
Saml2AuthenticationContext authenticationContext = new Saml2AuthenticationContext(new Uri("urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport")); |
|
Saml2AuthenticationStatement authenticationStatement = new Saml2AuthenticationStatement(authenticationContext) |
|
{ |
|
AuthenticationInstant = DateTime.UtcNow, |
|
SessionIndex = assertion.Id.Value |
|
}; |
|
|
|
authenticationStatement.SubjectLocality = new Saml2SubjectLocality() { Address = Dns.GetHostEntry(Dns.GetHostName()).AddressList[1].ToString() }; |
|
assertion.Statements.Add(authenticationStatement); |
|
} |
|
|
|
private static void AddAssertionCondition(Saml2Assertion assertion, string recepientAudience) |
|
{ |
|
Saml2Conditions conditions = new Saml2Conditions() |
|
{ |
|
NotBefore = DateTime.UtcNow, |
|
NotOnOrAfter = DateTime.UtcNow.AddMinutes(5), |
|
}; |
|
Saml2AudienceRestriction audienceRestriction = new Saml2AudienceRestriction(new Uri(recepientAudience)); |
|
conditions.AudienceRestrictions.Add(audienceRestriction); |
|
assertion.Conditions = conditions; |
|
} |
|
|
|
private static void AddAssertionSubject(Saml2Assertion assertion, string issuerName, string nameQualifier, string spNameQualifier, string recepient) |
|
{ |
|
Saml2SubjectConfirmationData subjectConfirmationData = new Saml2SubjectConfirmationData() |
|
{ |
|
Address = Dns.GetHostEntry(Dns.GetHostName()).AddressList[1].ToString(), |
|
NotOnOrAfter = DateTime.UtcNow, |
|
Recipient = new Uri(recepient) |
|
}; |
|
Saml2SubjectConfirmation subjectConfirmation = new Saml2SubjectConfirmation(new Uri("urn:oasis:names:tc:SAML:2.0:cm:bearer"), subjectConfirmationData); |
|
Saml2NameIdentifier nameIdentifierSubject = new Saml2NameIdentifier(issuerName) |
|
{ |
|
Format = new Uri("urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"), |
|
NameQualifier = nameQualifier, //specifies the security or administrative domain that qualifies the name. |
|
SPNameQualifier = spNameQualifier //specifies the name of a service provider or affiliation of providers that is used to further qualify a name |
|
}; |
|
Saml2Subject subject = new Saml2Subject(subjectConfirmation) |
|
{ |
|
NameId = nameIdentifierSubject |
|
}; |
|
assertion.Subject = subject; |
|
} |
|
|
|
public class XmlPrefixTextWriter : XmlTextWriter |
|
{ |
|
public string LocalPrefix { get; set; } |
|
public XmlPrefixTextWriter(TextWriter w, string localPrefix) : base(w) |
|
{ |
|
this.LocalPrefix = localPrefix; |
|
} |
|
public override void WriteStartElement(string prefix, string localName, string ns) |
|
{ |
|
base.WriteStartElement(LocalPrefix, localName, ns); |
|
} |
|
} |
|
|
|
internal class XmlDsigDocument : XmlDocument |
|
{ |
|
/// <summary> |
|
/// Override CreateElement function as it is extensively used by SignedXml |
|
/// </summary> |
|
/// <param name="prefix"></param> |
|
/// <param name="localName"></param> |
|
/// <param name="namespaceURI"></param> |
|
/// <returns></returns> |
|
public override XmlElement CreateElement(string prefix, string localName, string namespaceURI) |
|
{ |
|
// uncomment code if "ds" prefix within 'SignedInfo' and descendants is causing siganture to fail. |
|
if (string.IsNullOrEmpty(prefix)) |
|
{ |
|
// List<string> SignedInfoAndDescendants = new List<string>(); |
|
// SignedInfoAndDescendants.Add("SignedInfo"); |
|
// SignedInfoAndDescendants.Add("CanonicalizationMethod"); |
|
// SignedInfoAndDescendants.Add("InclusiveNamespaces"); |
|
// SignedInfoAndDescendants.Add("SignatureMethod"); |
|
// SignedInfoAndDescendants.Add("Reference"); |
|
// SignedInfoAndDescendants.Add("Transforms"); |
|
// SignedInfoAndDescendants.Add("Transform"); |
|
// SignedInfoAndDescendants.Add("InclusiveNamespaces"); |
|
// SignedInfoAndDescendants.Add("DigestMethod"); |
|
// SignedInfoAndDescendants.Add("DigestValue"); |
|
// if (!SignedInfoAndDescendants.Contains(localName)) |
|
// { |
|
prefix = GetPrefix(namespaceURI); |
|
} |
|
// } |
|
|
|
return base.CreateElement(prefix, localName, namespaceURI); |
|
|
|
} |
|
|
|
/// <summary> |
|
/// Select the standard prefix for the namespaceURI provided |
|
/// </summary> |
|
/// <param name="namespaceURI"></param> |
|
/// <returns></returns> |
|
private string GetPrefix(string namespaceURI) |
|
{ |
|
if (namespaceURI == SignedXml.XmlDsigNamespaceUrl) |
|
return "ds"; |
|
else if(namespaceURI == "http://www.w3.org/2001/10/xml-exc-c14n#") |
|
return "ec"; |
|
return string.Empty; |
|
} |
|
} |