Skip to content

Announce external OpenSAML init in spring-security#19059

Open
strehle wants to merge 1 commit intospring-projects:mainfrom
sap-contributions:opensaml-init-main
Open

Announce external OpenSAML init in spring-security#19059
strehle wants to merge 1 commit intospring-projects:mainfrom
sap-contributions:opensaml-init-main

Conversation

@strehle
Copy link
Copy Markdown

@strehle strehle commented Apr 11, 2026

Problem: see details of #14656

Solution. Allow to mark with "initializedAlready" (name can be discussed), that OpenSAML was initialized outside of spring-security

There are situation, e.g. omit an algorithm and change one because you use FIPS, then you need another way of opensaml initialization and spring should not try to init it again.

This PR is in order to solve cloudfoundry/uaa#3811

Signed-off-by: strehle <markus.strehle@sap.com>
@strehle strehle force-pushed the opensaml-init-main branch from 39e6d70 to cfbcded Compare April 14, 2026 06:20
@jzheaux
Copy link
Copy Markdown
Contributor

jzheaux commented Apr 27, 2026

Thanks for the contribution, @strehle. I will not be able to review this likely until after the 7.1 release in May.

In the meantime, can you confirm if #14656 (comment) works in your case?

@strehle
Copy link
Copy Markdown
Author

strehle commented Apr 27, 2026

Thanks for the contribution, @strehle. I will not be able to review this likely until after the 7.1 release in May.

In the meantime, can you confirm if #14656 (comment) works in your case?

Yes it works and I would also provide PRs for your downports, means 6.5.x because in CF we first had the challenge to decouple from the fix version of opensaml, e.g.
https://github.com/cloudfoundry/uaa/releases/tag/v78.11.0

and then as preparation before boot 4.x we will do
cloudfoundry/uaa#3840

Therefore I can provide a similar PR for your opensaml4 integration.


because of the need for BC-FIPS we have forked parts of spring security but we will also remove that step by step.... before that PR, I have verified other approaches from other projects , e.g. elastic/elasticsearch#98785 but that was also somehow dangerous, so we know that SAML with EC keys will have restrictions, but this combination is not that common in enterprises

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

status: waiting-for-triage An issue we've not yet triaged

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants