Back
Lines

Spring Boot Server Logs Viewer

2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 08:55:06 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from MockIDP 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: [] 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : MockIDP 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: MockIDP 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-05-06T08:45:23Z' against 'skewed now' time '2026-05-06T09:00:24.015272099Z' 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-05-06T09:05:23Z' against 'skewed now' time '2026-05-06T08:50:24.015272099Z' 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box] 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-05-06T09:05:23Z' against 'skewed now' time '2026-05-06T08:50:24.015523116Z' 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ2891483-dc66-4817-a68a-315cf77fec45 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQ2891483-dc66-4817-a68a-315cf77fec45 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [s2f9422865e33d9dbd4e870518c04411bb08f55350] 2026-05-06 08:55:24 [https-jsse-nio-443-exec-14] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@b7f5ee0c, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=167.127.90.97, SessionId=97BEEF884CCDA2D9C558C943C8F32CCC], Granted Authorities=[ROLE_USER]] 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] INFO c.b.s.c.SamlResponseController - SAML Response: PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6 cHJvdG9jb2wiIERlc3RpbmF0aW9uPSJodHRwczovL3NhbWwtYm94LmNvbS9sb2dpbi9zYW1sMi9z c28iIElEPSJzMmY5NDIyODY1ZTMzZDlkYmQ0ZTg3MDUxOGMwNDQxMWJiMDhmNTUzNTAiIEluUmVz cG9uc2VUbz0iQVJRMjg5MTQ4My1kYzY2LTQ4MTctYTY4YS0zMTVjZjc3ZmVjNDUiIElzc3VlSW5z dGFudD0iMjAyNi0wNS0wNlQwODo1NToyM1oiIFZlcnNpb249IjIuMCI+PHNhbWw6SXNzdWVyIHht bG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphc3NlcnRpb24iPk1vY2tJRFA8 L3NhbWw6SXNzdWVyPjxzYW1scDpTdGF0dXM+PHNhbWxwOlN0YXR1c0NvZGUgVmFsdWU9InVybjpv YXNpczpuYW1lczp0YzpTQU1MOjIuMDpzdGF0dXM6U3VjY2VzcyIvPjwvc2FtbHA6U3RhdHVzPjxz YW1sOkFzc2VydGlvbiB4bWxuczpzYW1sPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNz ZXJ0aW9uIiBJRD0iczJmYjllYTA3MDBlOTFiMzQwMTZhNzM1M2Q5OTJlODE0NjAxNGQyZjNiIiBJ c3N1ZUluc3RhbnQ9IjIwMjYtMDUtMDZUMDg6NTU6MjNaIiBWZXJzaW9uPSIyLjAiPjxzYW1sOklz c3Vlcj5Nb2NrSURQPC9zYW1sOklzc3Vlcj48ZHM6U2lnbmF0dXJlIHhtbG5zOmRzPSJodHRwOi8v d3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjIj48ZHM6U2lnbmVkSW5mbz48ZHM6Q2Fub25pY2Fs aXphdGlvbk1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4 Yy1jMTRuIyIvPjxkczpTaWduYXR1cmVNZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9y Zy8yMDAxLzA0L3htbGRzaWctbW9yZSNyc2Etc2hhMjU2Ii8+PGRzOlJlZmVyZW5jZSBVUkk9IiNz MmZiOWVhMDcwMGU5MWIzNDAxNmE3MzUzZDk5MmU4MTQ2MDE0ZDJmM2IiPjxkczpUcmFuc2Zvcm1z PjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRz aWcjZW52ZWxvcGVkLXNpZ25hdHVyZSIvPjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8v d3d3LnczLm9yZy8yMDAxLzEwL3htbC1leGMtYzE0biMiLz48L2RzOlRyYW5zZm9ybXM+PGRzOkRp Z2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMDQveG1sZW5jI3No YTI1NiIvPjxkczpEaWdlc3RWYWx1ZT5FNkRoYldrVzRUNjNpeTFCQkVZR1JSNUtrVnRwd2ErbDZq bXRtaGdILzBZPTwvZHM6RGlnZXN0VmFsdWU+PC9kczpSZWZlcmVuY2U+PC9kczpTaWduZWRJbmZv PjxkczpTaWduYXR1cmVWYWx1ZT5OV01uVHhVWDBKMWdTMHIwYnJ6TFNpaFlNK0VCRWhublU2L1BG d0pEV0RiSWdxZm41L09NcE0wNFRJNmtrL0RrMkJaazR2bXJBMnZoejM1RjdZRndkVHliQk95T1hx dkdBYTVBb0d1MnZLRGZKVTk1eDk0ak1GOUJKb1UyRFBUamkxY29aazhkWFo3NjlhQkVHcTcyNFlp ZjZRSExSQjF0OHUrdTdlTDJOTjlLVVI1NHhGVVR6R2lYQmtVVTNYdThFQ2tXWGtZeVluNWFSWDl6 NzRCSEhtWnovTFVUVXJuK3gxMTQ1QXdWdURIMlJnSnhqeXJEYkFqNzY1ZEFHVVRqaWcreEdpb0po amEzTGE3bUcwM1cyNjdCK2JuNTRQaWVIaVZjWStFU2FTbUd2aWNRbWduNnovNlhsY2ZPU2U2UUs3 Z2graGJSaXZuamcrYStoTUtJMVE9PTwvZHM6U2lnbmF0dXJlVmFsdWU+PGRzOktleUluZm8+PGRz Olg1MDlEYXRhPjxkczpYNTA5Q2VydGlmaWNhdGU+TUlJRjl6Q0NBOStnQXdJQkFnSVRXQUFBNTRo ZEVkRXVMY3NGNFFBQUFBRG5pREFOQmdrcWhraUc5dzBCQVFzRkFEQkhNUkl3RUFZS0NaSW1pWlB5 TEdRQkdSWUNZMkV4RnpBVkJnb0praWFKay9Jc1pBRVpGZ2RoWTJkd2NtOWtNUmd3RmdZRFZRUURF dzlCUTBkUWNtOWtMVWx6YzNWbFEwRXdIaGNOTWpZd01qSTFNVGt4TWpRd1doY05NamN3TWpJMU1U a3hNalF3V2pDQmt6RUxNQWtHQTFVRUJoTUNRMEV4RURBT0JnTlZCQWdUQjA5dWRHRnlhVzh4RURB T0JnTlZCQWNUQjFSdmNtOXVkRzh4R0RBV0JnTlZCQW9URDBGc2JITjBZWFJsSUVOaGJtRmtZVEVm TUIwR0ExVUVDeE1XU1c1bWIzSnRZWFJwYjI0Z1ZHVmphRzV2Ykc5bmVURWxNQ01HQTFVRUF4TWNZ V05uWldsaGJYTmhiV3h6Ym1SaWVDNWhiR3h6ZEdGMFpTNWpZVENDQVNJd0RRWUpLb1pJaHZjTkFR RUJCUUFEZ2dFUEFEQ0NBUW9DZ2dFQkFNaEhUWE1kZElvaE1GRzZHSDFWUmtxQVJyZ2hrYVlDU2Jz TmhvVjVKeFJxSU8xSzA3dmRZTzY4V2lrcW1tSDhSWjBHWk8vZjNxcXdJRWFEYlltNlNiOGpDUjhN OWdsbTFvZ2FBQkxvbTIvRHFWb3ViZnFYNXNZMkg2cHJGKzBScGRqemd3UGNOTnMyVldrMVgxZ2My K0YxS3V2NVdOTDZlU1hCRW5qcUhncnBxUjVIUXRBVXM3TU5ubXJOdmpwcmdlK210cUlod0ZuOFF4 QWE0VEVlaktlRFQwcGU5WEJmUzY3Y2ZvN1RQTGZDMkdnR2Nqa3dEcGZsa2FLVGx1QThrVkxySjYv djJlSFpsWW5YcmQ3UVJwU2NiV3RmNENVN3FUNHhkYW1YVnNqRU1kZTQzenBSaVZQV1RyTExwR21o VGgvMC9XOGJtemxhVHBwRkZJcWlZL1VDQXdFQUFhT0NBWTB3Z2dHSk1Bc0dBMVVkRHdRRUF3SUZv REE4QmdrckJnRUVBWUkzRlFjRUx6QXRCaVVyQmdFRUFZSTNGUWlHbHI5dmhQQ2xSb1NGbHhqZjZB S0VwZndGZVllbTJpaUhwczU5QWdGa0FnRWtNQjBHQTFVZERnUVdCQlJiTHpVSU5sdDROd3V3N3h2 MzNUZHZXMDJCQ0RBZkJnTlZIU01FR0RBV2dCUnlvMGxIOVZkL2Y4RGVUUXBVTzRTc0luQit1REJL QmdOVkhSOEVRekJCTUQrZ1BhQTdoamxvZEhSd09pOHZZV05uY0d0cExtRmpaM0J5YjJRdVkyRXZZ MkZ5WlhCdmMybDBiM0o1TDBGRFIxQlNUMFF0U1hOemRXVkRRUzVqY213d1ZRWUlLd1lCQlFVSEFR RUVTVEJITUVVR0NDc0dBUVVGQnpBQ2hqbG9kSFJ3T2k4dllXTm5jR3RwTG1GalozQnliMlF1WTJF dlkyRnlaWEJ2YzJsMGIzSjVMMEZEUjFCU1QwUXRTWE56ZFdWRFFTNWpjblF3RXdZRFZSMGxCQXd3 Q2dZSUt3WUJCUVVIQXdFd0d3WUpLd1lCQkFHQ054VUtCQTR3RERBS0JnZ3JCZ0VGQlFjREFUQW5C Z05WSFJFRUlEQWVnaHhoWTJkbGFXRnRjMkZ0YkhOdVpHSjRMbUZzYkhOMFlYUmxMbU5oTUEwR0NT cUdTSWIzRFFFQkN3VUFBNElDQVFDbTNUTlc5RWxuTFFMM2ZBUkV5dDhYbE5HWDFSQnJ3THEzbzI4 VWJLUXFkYWhjdjZhcytCRlNudVRnc0dOaVpCVGx0SXR0Q2Urb2srOFdMWWRmckZJM0FMQVkxenA4 RXRtMnpvdVdoQXdwenBDSTNpM2M2Sngyb3lYbEJybXk1NHluR1k2RGxXdmhtb2UwQzZhZnJCdEVO Tm5xQk16d2ZFQWY5dVNuTWRoWHZoUysyYm5sSGZkZ3gxZDQwaE14YkZOa2F4aG9JNWRoYWwvZGtQ VG92U1drcGszOFlBQ3V2MlY0aEtaUVVwcko1V1QwNHBQNUM3MUcyMnJvQjdnYzREVW5oY3IyaGcv WWtuMHhMeWd4SlVoS01nUU5FYmhVNjQ2eURaMjJHbkF4T0w1OEpucEZML0Rwc0lXb0M2NFByekZU T0N5bmZ4VldpQzkzdEhCc0hQSTVEZ3dyZHNCOUVTMnVZLzc5VGFHSWtTSC9RNHlqV3k2a1FkRmVm WUFuSlRQMEVkNmlWUDVYOHV3WDB6TDJIc1ZnK2kwUzdJU0tEWmt2c3FHd29NaHFUM3RuZ0xVQ0Q3 ZmE5d0o5Y3BTRmluU2pWSFduVzYvejB5L2NSZU45WFhQUXRzWnhKTDEyV3AxQm44MzBSN0REUXVG cUt2dGdUM0tJN3cySVJUS2h5SEJPeTFjWUJML3c4TVoyTEZtY3JCUWVjbmVqU3Y4WXdTdTdkREJr VktpYWVrTUh2dlNZQnNicTBZNG9Wd2FDeS9wcCtwaHdxcmk3L3FBSUdNOVBIM1piQ1Nrc0l6cTNq REd4Y1lTYmZVNHNBMmZnZjl2c0NrcnJ4Q3RGL1VhZDk2V1JKYVAwakJQVllDSDBNOFR0YjRVWE1T a3V1SHFLd2J0YjEycmQ1STE3eWc9PTwvZHM6WDUwOUNlcnRpZmljYXRlPjwvZHM6WDUwOURhdGE+ PC9kczpLZXlJbmZvPjwvZHM6U2lnbmF0dXJlPjxzYW1sOlN1YmplY3Q+PHNhbWw6TmFtZUlEIEZv cm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6MS4xOm5hbWVpZC1mb3JtYXQ6dW5zcGVjaWZp ZWQiIE5hbWVRdWFsaWZpZXI9Ik1vY2tJRFAiIFNQTmFtZVF1YWxpZmllcj0ic2FtbC1ib3giPmFk a3VtYXIwY2E8L3NhbWw6TmFtZUlEPjxzYW1sOlN1YmplY3RDb25maXJtYXRpb24gTWV0aG9kPSJ1 cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6Y206YmVhcmVyIj48c2FtbDpTdWJqZWN0Q29uZmly bWF0aW9uRGF0YSBJblJlc3BvbnNlVG89IkFSUTI4OTE0ODMtZGM2Ni00ODE3LWE2OGEtMzE1Y2Y3 N2ZlYzQ1IiBOb3RPbk9yQWZ0ZXI9IjIwMjYtMDUtMDZUMDk6MDU6MjNaIiBSZWNpcGllbnQ9Imh0 dHBzOi8vc2FtbC1ib3guY29tL2xvZ2luL3NhbWwyL3NzbyIvPjwvc2FtbDpTdWJqZWN0Q29uZmly bWF0aW9uPjwvc2FtbDpTdWJqZWN0PjxzYW1sOkNvbmRpdGlvbnMgTm90QmVmb3JlPSIyMDI2LTA1 LTA2VDA4OjQ1OjIzWiIgTm90T25PckFmdGVyPSIyMDI2LTA1LTA2VDA5OjA1OjIzWiI+PHNhbWw6 QXVkaWVuY2VSZXN0cmljdGlvbj48c2FtbDpBdWRpZW5jZT5zYW1sLWJveDwvc2FtbDpBdWRpZW5j ZT48L3NhbWw6QXVkaWVuY2VSZXN0cmljdGlvbj48L3NhbWw6Q29uZGl0aW9ucz48c2FtbDpBdXRo blN0YXRlbWVudCBBdXRobkluc3RhbnQ9IjIwMjYtMDUtMDZUMDg6NTU6MjJaIiBTZXNzaW9uSW5k ZXg9InMyMjg1NDE2OGMxN2JkZTMwMWQwMjQwYmZlNGRmMDMzZjI0ZjcxODYwMSI+PHNhbWw6QXV0 aG5Db250ZXh0PjxzYW1sOkF1dGhuQ29udGV4dENsYXNzUmVmPnVybjpvYXNpczpuYW1lczp0YzpT QU1MOjIuMDphYzpjbGFzc2VzOnVuc3BlY2lmaWVkPC9zYW1sOkF1dGhuQ29udGV4dENsYXNzUmVm Pjwvc2FtbDpBdXRobkNvbnRleHQ+PC9zYW1sOkF1dGhuU3RhdGVtZW50PjxzYW1sOkF0dHJpYnV0 ZVN0YXRlbWVudD48c2FtbDpBdHRyaWJ1dGUgTmFtZT0id29ya2RheUlEIj48c2FtbDpBdHRyaWJ1 dGVWYWx1ZSB4bWxuczp4cz0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEiIHhtbG5z OnhzaT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEtaW5zdGFuY2UiIHhzaTp0eXBl PSJ4czpzdHJpbmciPkMyMDAwMTAzODwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmli dXRlPjxzYW1sOkF0dHJpYnV0ZSBOYW1lPSJzYU1BY2NvdW50TmFtZSI+PHNhbWw6QXR0cmlidXRl VmFsdWUgeG1sbnM6eHM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hIiB4bWxuczp4 c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0i eHM6c3RyaW5nIj5hZGt1bWFyMGNhPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDpBdHRyaWJ1 dGU+PHNhbWw6QXR0cmlidXRlIE5hbWU9ImVtYWlsIj48c2FtbDpBdHRyaWJ1dGVWYWx1ZSB4bWxu czp4cz0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEiIHhtbG5zOnhzaT0iaHR0cDov L3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEtaW5zdGFuY2UiIHhzaTp0eXBlPSJ4czpzdHJpbmci PmFka3VtYXJAYWxsc3RhdGUuY2E8L3NhbWw6QXR0cmlidXRlVmFsdWU+PC9zYW1sOkF0dHJpYnV0 ZT48c2FtbDpBdHRyaWJ1dGUgTmFtZT0iTmFtZSI+PHNhbWw6QXR0cmlidXRlVmFsdWUgeG1sbnM6 eHM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hIiB4bWxuczp4c2k9Imh0dHA6Ly93 d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0ieHM6c3RyaW5nIj5L dW1hciwgQWRpdHlhPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDpBdHRyaWJ1dGU+PC9zYW1s OkF0dHJpYnV0ZVN0YXRlbWVudD48L3NhbWw6QXNzZXJ0aW9uPjwvc2FtbHA6UmVzcG9uc2U+ 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] INFO c.b.s.c.SamlResponseController - Relay State: e7927d58-29f8-4978-833c-5170f4664521 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 08:55:24 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 08:56:38 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 08:57:14 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from MockIDP 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: [] 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : MockIDP 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: MockIDP 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-05-06T08:47:37Z' against 'skewed now' time '2026-05-06T09:02:37.973362681Z' 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-05-06T09:07:37Z' against 'skewed now' time '2026-05-06T08:52:37.973362681Z' 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box] 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-05-06T09:07:37Z' against 'skewed now' time '2026-05-06T08:52:37.973476075Z' 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ44935a6-a8e4-4e45-a88b-2a1a6d39dd2f 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] WARN o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Valid InResponseTo was not available from the validation context, unable to evaluate SubjectConfirmationData@InResponseTo 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.o.s.s.a.SAML20AssertionValidator - No subject confirmation methods were met for assertion with ID 's221966648bc7a39f08366962ed2190cd4049103e3' 2026-05-06 08:57:37 [https-jsse-nio-443-exec-99] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Found 2 validation errors in SAML response [s2d0ac5fd219be51106ed744e29b791920e31c204e] 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 09:17:15 [https-jsse-nio-443-exec-99] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from MockIDP 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: [] 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : MockIDP 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: MockIDP 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-05-06T09:07:37Z' against 'skewed now' time '2026-05-06T09:22:37.706175861Z' 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-05-06T09:27:37Z' against 'skewed now' time '2026-05-06T09:12:37.706175861Z' 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box] 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-05-06T09:27:37Z' against 'skewed now' time '2026-05-06T09:12:37.706311991Z' 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ854d9dd-1600-47ee-b10e-7837f9ca459b 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] WARN o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Valid InResponseTo was not available from the validation context, unable to evaluate SubjectConfirmationData@InResponseTo 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.o.s.s.a.SAML20AssertionValidator - No subject confirmation methods were met for assertion with ID 's29ad09a30596c04bab7a7016dddc7c992ba9c6b64' 2026-05-06 09:17:37 [https-jsse-nio-443-exec-14] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Found 2 validation errors in SAML response [s2d043aac2f2182fd2098f6ee68573b75e345cb7d5] 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 09:18:59 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 09:18:59 [https-jsse-nio-443-exec-14] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from MockIDP 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: [] 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : MockIDP 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: MockIDP 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-05-06T09:09:07Z' against 'skewed now' time '2026-05-06T09:24:07.682539337Z' 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-05-06T09:29:07Z' against 'skewed now' time '2026-05-06T09:14:07.682539337Z' 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box] 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-05-06T09:29:07Z' against 'skewed now' time '2026-05-06T09:14:07.682648613Z' 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ5782436-545c-416d-baf9-110b9d0242e7 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQ5782436-545c-416d-baf9-110b9d0242e7 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [s204bfc017ec27938494341f015a380211f3ebd28d] 2026-05-06 09:19:07 [https-jsse-nio-443-exec-100] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@b7f5ee0c, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=167.127.90.97, SessionId=F59DFEA3847E3BE823300BF12415243C], Granted Authorities=[ROLE_USER]] 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] INFO c.b.s.c.SamlResponseController - SAML Response: PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6 cHJvdG9jb2wiIERlc3RpbmF0aW9uPSJodHRwczovL3NhbWwtYm94LmNvbS9sb2dpbi9zYW1sMi9z c28iIElEPSJzMjA0YmZjMDE3ZWMyNzkzODQ5NDM0MWYwMTVhMzgwMjExZjNlYmQyOGQiIEluUmVz cG9uc2VUbz0iQVJRNTc4MjQzNi01NDVjLTQxNmQtYmFmOS0xMTBiOWQwMjQyZTciIElzc3VlSW5z dGFudD0iMjAyNi0wNS0wNlQwOToxOTowN1oiIFZlcnNpb249IjIuMCI+PHNhbWw6SXNzdWVyIHht bG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphc3NlcnRpb24iPk1vY2tJRFA8 L3NhbWw6SXNzdWVyPjxzYW1scDpTdGF0dXM+PHNhbWxwOlN0YXR1c0NvZGUgVmFsdWU9InVybjpv YXNpczpuYW1lczp0YzpTQU1MOjIuMDpzdGF0dXM6U3VjY2VzcyIvPjwvc2FtbHA6U3RhdHVzPjxz YW1sOkFzc2VydGlvbiB4bWxuczpzYW1sPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNz ZXJ0aW9uIiBJRD0iczIwODU5NjQyNzQyMzM2ZjBhM2E4MDhmOGFmNmVjZDE0Nzg4MzBmYjBkIiBJ c3N1ZUluc3RhbnQ9IjIwMjYtMDUtMDZUMDk6MTk6MDdaIiBWZXJzaW9uPSIyLjAiPjxzYW1sOklz c3Vlcj5Nb2NrSURQPC9zYW1sOklzc3Vlcj48ZHM6U2lnbmF0dXJlIHhtbG5zOmRzPSJodHRwOi8v d3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjIj48ZHM6U2lnbmVkSW5mbz48ZHM6Q2Fub25pY2Fs aXphdGlvbk1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4 Yy1jMTRuIyIvPjxkczpTaWduYXR1cmVNZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9y Zy8yMDAxLzA0L3htbGRzaWctbW9yZSNyc2Etc2hhMjU2Ii8+PGRzOlJlZmVyZW5jZSBVUkk9IiNz MjA4NTk2NDI3NDIzMzZmMGEzYTgwOGY4YWY2ZWNkMTQ3ODgzMGZiMGQiPjxkczpUcmFuc2Zvcm1z PjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRz aWcjZW52ZWxvcGVkLXNpZ25hdHVyZSIvPjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8v d3d3LnczLm9yZy8yMDAxLzEwL3htbC1leGMtYzE0biMiLz48L2RzOlRyYW5zZm9ybXM+PGRzOkRp Z2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMDQveG1sZW5jI3No YTI1NiIvPjxkczpEaWdlc3RWYWx1ZT5KblhDUk13OHpGaHkvK25PeVN0MUJmZEFaSmVKN2JldkZX dHJkUk9jeDVnPTwvZHM6RGlnZXN0VmFsdWU+PC9kczpSZWZlcmVuY2U+PC9kczpTaWduZWRJbmZv PjxkczpTaWduYXR1cmVWYWx1ZT5XNGlKT2c3eFJtZ3RyMXRydHZnTVMxOVhJN01BWDVoR0oyQ2Za cGlWTUY1cmRkcFRFNmFMaC9vaXEzY3JJR01OR3FvbHJEWU5DWmpIVVRmN2dvNUpkK2hreEJyYmF3 Wnk4ZHNiNVNWNXErWmowS0VsMHFXRzduNDFJTU5rTUwyVlMxV3czRVlSQjJ2STRmeEY0TkZzU0tn NmtaWjRpcUJBcU5LVGtPRG1iNExsdHFBY1NJNk0reFROL2dURFpJY09DUU9oL1pyZHQ0WWwwc2Zn ZWxBcmQ4NktuSTVRSktyTDZFVDlmUzBiZWxsUzBFUkYxdXhuTVQyL2JBbldSS0lIZTMzS0tOZU5F UjM3WWNkOWgvN00xekVrVU5GbnM3VmtPUThtOG5OTVAvYVp4Z2JnT3dwdFA5WnM3TUJ4aHBXd1di UmJWc2RxZjhrQm1NZTQxR0tZdUE9PTwvZHM6U2lnbmF0dXJlVmFsdWU+PGRzOktleUluZm8+PGRz Olg1MDlEYXRhPjxkczpYNTA5Q2VydGlmaWNhdGU+TUlJRjl6Q0NBOStnQXdJQkFnSVRXQUFBNTRo ZEVkRXVMY3NGNFFBQUFBRG5pREFOQmdrcWhraUc5dzBCQVFzRkFEQkhNUkl3RUFZS0NaSW1pWlB5 TEdRQkdSWUNZMkV4RnpBVkJnb0praWFKay9Jc1pBRVpGZ2RoWTJkd2NtOWtNUmd3RmdZRFZRUURF dzlCUTBkUWNtOWtMVWx6YzNWbFEwRXdIaGNOTWpZd01qSTFNVGt4TWpRd1doY05NamN3TWpJMU1U a3hNalF3V2pDQmt6RUxNQWtHQTFVRUJoTUNRMEV4RURBT0JnTlZCQWdUQjA5dWRHRnlhVzh4RURB T0JnTlZCQWNUQjFSdmNtOXVkRzh4R0RBV0JnTlZCQW9URDBGc2JITjBZWFJsSUVOaGJtRmtZVEVm TUIwR0ExVUVDeE1XU1c1bWIzSnRZWFJwYjI0Z1ZHVmphRzV2Ykc5bmVURWxNQ01HQTFVRUF4TWNZ V05uWldsaGJYTmhiV3h6Ym1SaWVDNWhiR3h6ZEdGMFpTNWpZVENDQVNJd0RRWUpLb1pJaHZjTkFR RUJCUUFEZ2dFUEFEQ0NBUW9DZ2dFQkFNaEhUWE1kZElvaE1GRzZHSDFWUmtxQVJyZ2hrYVlDU2Jz TmhvVjVKeFJxSU8xSzA3dmRZTzY4V2lrcW1tSDhSWjBHWk8vZjNxcXdJRWFEYlltNlNiOGpDUjhN OWdsbTFvZ2FBQkxvbTIvRHFWb3ViZnFYNXNZMkg2cHJGKzBScGRqemd3UGNOTnMyVldrMVgxZ2My K0YxS3V2NVdOTDZlU1hCRW5qcUhncnBxUjVIUXRBVXM3TU5ubXJOdmpwcmdlK210cUlod0ZuOFF4 QWE0VEVlaktlRFQwcGU5WEJmUzY3Y2ZvN1RQTGZDMkdnR2Nqa3dEcGZsa2FLVGx1QThrVkxySjYv djJlSFpsWW5YcmQ3UVJwU2NiV3RmNENVN3FUNHhkYW1YVnNqRU1kZTQzenBSaVZQV1RyTExwR21o VGgvMC9XOGJtemxhVHBwRkZJcWlZL1VDQXdFQUFhT0NBWTB3Z2dHSk1Bc0dBMVVkRHdRRUF3SUZv REE4QmdrckJnRUVBWUkzRlFjRUx6QXRCaVVyQmdFRUFZSTNGUWlHbHI5dmhQQ2xSb1NGbHhqZjZB S0VwZndGZVllbTJpaUhwczU5QWdGa0FnRWtNQjBHQTFVZERnUVdCQlJiTHpVSU5sdDROd3V3N3h2 MzNUZHZXMDJCQ0RBZkJnTlZIU01FR0RBV2dCUnlvMGxIOVZkL2Y4RGVUUXBVTzRTc0luQit1REJL QmdOVkhSOEVRekJCTUQrZ1BhQTdoamxvZEhSd09pOHZZV05uY0d0cExtRmpaM0J5YjJRdVkyRXZZ MkZ5WlhCdmMybDBiM0o1TDBGRFIxQlNUMFF0U1hOemRXVkRRUzVqY213d1ZRWUlLd1lCQlFVSEFR RUVTVEJITUVVR0NDc0dBUVVGQnpBQ2hqbG9kSFJ3T2k4dllXTm5jR3RwTG1GalozQnliMlF1WTJF dlkyRnlaWEJ2YzJsMGIzSjVMMEZEUjFCU1QwUXRTWE56ZFdWRFFTNWpjblF3RXdZRFZSMGxCQXd3 Q2dZSUt3WUJCUVVIQXdFd0d3WUpLd1lCQkFHQ054VUtCQTR3RERBS0JnZ3JCZ0VGQlFjREFUQW5C Z05WSFJFRUlEQWVnaHhoWTJkbGFXRnRjMkZ0YkhOdVpHSjRMbUZzYkhOMFlYUmxMbU5oTUEwR0NT cUdTSWIzRFFFQkN3VUFBNElDQVFDbTNUTlc5RWxuTFFMM2ZBUkV5dDhYbE5HWDFSQnJ3THEzbzI4 VWJLUXFkYWhjdjZhcytCRlNudVRnc0dOaVpCVGx0SXR0Q2Urb2srOFdMWWRmckZJM0FMQVkxenA4 RXRtMnpvdVdoQXdwenBDSTNpM2M2Sngyb3lYbEJybXk1NHluR1k2RGxXdmhtb2UwQzZhZnJCdEVO Tm5xQk16d2ZFQWY5dVNuTWRoWHZoUysyYm5sSGZkZ3gxZDQwaE14YkZOa2F4aG9JNWRoYWwvZGtQ VG92U1drcGszOFlBQ3V2MlY0aEtaUVVwcko1V1QwNHBQNUM3MUcyMnJvQjdnYzREVW5oY3IyaGcv WWtuMHhMeWd4SlVoS01nUU5FYmhVNjQ2eURaMjJHbkF4T0w1OEpucEZML0Rwc0lXb0M2NFByekZU T0N5bmZ4VldpQzkzdEhCc0hQSTVEZ3dyZHNCOUVTMnVZLzc5VGFHSWtTSC9RNHlqV3k2a1FkRmVm WUFuSlRQMEVkNmlWUDVYOHV3WDB6TDJIc1ZnK2kwUzdJU0tEWmt2c3FHd29NaHFUM3RuZ0xVQ0Q3 ZmE5d0o5Y3BTRmluU2pWSFduVzYvejB5L2NSZU45WFhQUXRzWnhKTDEyV3AxQm44MzBSN0REUXVG cUt2dGdUM0tJN3cySVJUS2h5SEJPeTFjWUJML3c4TVoyTEZtY3JCUWVjbmVqU3Y4WXdTdTdkREJr VktpYWVrTUh2dlNZQnNicTBZNG9Wd2FDeS9wcCtwaHdxcmk3L3FBSUdNOVBIM1piQ1Nrc0l6cTNq REd4Y1lTYmZVNHNBMmZnZjl2c0NrcnJ4Q3RGL1VhZDk2V1JKYVAwakJQVllDSDBNOFR0YjRVWE1T a3V1SHFLd2J0YjEycmQ1STE3eWc9PTwvZHM6WDUwOUNlcnRpZmljYXRlPjwvZHM6WDUwOURhdGE+ PC9kczpLZXlJbmZvPjwvZHM6U2lnbmF0dXJlPjxzYW1sOlN1YmplY3Q+PHNhbWw6TmFtZUlEIEZv cm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6MS4xOm5hbWVpZC1mb3JtYXQ6dW5zcGVjaWZp ZWQiIE5hbWVRdWFsaWZpZXI9Ik1vY2tJRFAiIFNQTmFtZVF1YWxpZmllcj0ic2FtbC1ib3giPmFk a3VtYXIwY2E8L3NhbWw6TmFtZUlEPjxzYW1sOlN1YmplY3RDb25maXJtYXRpb24gTWV0aG9kPSJ1 cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6Y206YmVhcmVyIj48c2FtbDpTdWJqZWN0Q29uZmly bWF0aW9uRGF0YSBJblJlc3BvbnNlVG89IkFSUTU3ODI0MzYtNTQ1Yy00MTZkLWJhZjktMTEwYjlk MDI0MmU3IiBOb3RPbk9yQWZ0ZXI9IjIwMjYtMDUtMDZUMDk6Mjk6MDdaIiBSZWNpcGllbnQ9Imh0 dHBzOi8vc2FtbC1ib3guY29tL2xvZ2luL3NhbWwyL3NzbyIvPjwvc2FtbDpTdWJqZWN0Q29uZmly bWF0aW9uPjwvc2FtbDpTdWJqZWN0PjxzYW1sOkNvbmRpdGlvbnMgTm90QmVmb3JlPSIyMDI2LTA1 LTA2VDA5OjA5OjA3WiIgTm90T25PckFmdGVyPSIyMDI2LTA1LTA2VDA5OjI5OjA3WiI+PHNhbWw6 QXVkaWVuY2VSZXN0cmljdGlvbj48c2FtbDpBdWRpZW5jZT5zYW1sLWJveDwvc2FtbDpBdWRpZW5j ZT48L3NhbWw6QXVkaWVuY2VSZXN0cmljdGlvbj48L3NhbWw6Q29uZGl0aW9ucz48c2FtbDpBdXRo blN0YXRlbWVudCBBdXRobkluc3RhbnQ9IjIwMjYtMDUtMDZUMDk6MTk6MDdaIiBTZXNzaW9uSW5k ZXg9InMyMjg1NDE2OGMxN2JkZTMwMWQwMjQwYmZlNGRmMDMzZjI0ZjcxODYwMSI+PHNhbWw6QXV0 aG5Db250ZXh0PjxzYW1sOkF1dGhuQ29udGV4dENsYXNzUmVmPnVybjpvYXNpczpuYW1lczp0YzpT QU1MOjIuMDphYzpjbGFzc2VzOnVuc3BlY2lmaWVkPC9zYW1sOkF1dGhuQ29udGV4dENsYXNzUmVm Pjwvc2FtbDpBdXRobkNvbnRleHQ+PC9zYW1sOkF1dGhuU3RhdGVtZW50PjxzYW1sOkF0dHJpYnV0 ZVN0YXRlbWVudD48c2FtbDpBdHRyaWJ1dGUgTmFtZT0id29ya2RheUlEIj48c2FtbDpBdHRyaWJ1 dGVWYWx1ZSB4bWxuczp4cz0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEiIHhtbG5z OnhzaT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEtaW5zdGFuY2UiIHhzaTp0eXBl PSJ4czpzdHJpbmciPkMyMDAwMTAzODwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmli dXRlPjxzYW1sOkF0dHJpYnV0ZSBOYW1lPSJzYU1BY2NvdW50TmFtZSI+PHNhbWw6QXR0cmlidXRl VmFsdWUgeG1sbnM6eHM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hIiB4bWxuczp4 c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0i eHM6c3RyaW5nIj5hZGt1bWFyMGNhPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDpBdHRyaWJ1 dGU+PHNhbWw6QXR0cmlidXRlIE5hbWU9ImRlcGFydG1lbnQiPjxzYW1sOkF0dHJpYnV0ZVZhbHVl IHhtbG5zOnhzPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYSIgeG1sbnM6eHNpPSJo dHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSIgeHNpOnR5cGU9InhzOnN0 cmluZyI+OTU5YzU5YTQtMjJiMC00MzNmLThkYjEtMDlhNWUxNmRiODcyPC9zYW1sOkF0dHJpYnV0 ZVZhbHVlPjwvc2FtbDpBdHRyaWJ1dGU+PHNhbWw6QXR0cmlidXRlIE5hbWU9ImVtYWlsIj48c2Ft bDpBdHRyaWJ1dGVWYWx1ZSB4bWxuczp4cz0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hl bWEiIHhtbG5zOnhzaT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEtaW5zdGFuY2Ui IHhzaTp0eXBlPSJ4czpzdHJpbmciPmFka3VtYXJAYWxsc3RhdGUuY2E8L3NhbWw6QXR0cmlidXRl VmFsdWU+PC9zYW1sOkF0dHJpYnV0ZT48c2FtbDpBdHRyaWJ1dGUgTmFtZT0iTmFtZSI+PHNhbWw6 QXR0cmlidXRlVmFsdWUgeG1sbnM6eHM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1h IiB4bWxuczp4c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4 c2k6dHlwZT0ieHM6c3RyaW5nIj5LdW1hciwgQWRpdHlhPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwv c2FtbDpBdHRyaWJ1dGU+PC9zYW1sOkF0dHJpYnV0ZVN0YXRlbWVudD48L3NhbWw6QXNzZXJ0aW9u Pjwvc2FtbHA6UmVzcG9uc2U+ 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] INFO c.b.s.c.SamlResponseController - Relay State: 0384f135-fb9c-4e58-9ccb-5928159f7f6a 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 09:19:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 09:20:07 [https-jsse-nio-443-exec-60] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256': supported 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.algorithm.AlgorithmRegistry - Runtime support eval for algorithm URI 'http://www.w3.org/2001/04/xmlenc#sha256': supported 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Resolved SignatureSigningParameters: 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signing credential with key algorithm: RSA 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Signature KeyInfoGenerator: org.opensaml.xmlsec.keyinfo.impl.X509KeyInfoGeneratorFactory$X509KeyInfoGenerator 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference digest method algorithm URI: http://www.w3.org/2001/04/xmlenc#sha256 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Reference canonicalization algorithm URI: null 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - Canonicalization algorithm URI: http://www.w3.org/2001/10/xml-exc-c14n# 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.i.BasicSignatureSigningParametersResolver - HMAC output length: null 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.saml.common.SAMLObjectSupport - Examining signed object for content references with exclusive canonicalization transform 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.saml.common.SAMLObjectSupport - Saw exclusive transform, declaring non-visible namespaces on signed object 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureMarshaller - Starting to marshall {http://www.w3.org/2000/09/xmldsig#}Signature 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating XMLSignature object 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureMarshaller - Adding content to XMLSignature. 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.s.c.SAMLObjectContentReference - Adding list of inclusive namespaces for signature exclusive canonicalization transform 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.impl.SignatureMarshaller - Creating Signature DOM element 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.xmlsec.signature.support.Signer - Using a signer of implemenation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignerProviderImpl 2026-05-06 09:20:07 [https-jsse-nio-443-exec-103] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignerProviderImpl - Computing signature over XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from MockIDP 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: [] 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : MockIDP 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: MockIDP 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-05-06T09:10:16Z' against 'skewed now' time '2026-05-06T09:25:16.607926332Z' 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-05-06T09:30:16Z' against 'skewed now' time '2026-05-06T09:15:16.607926332Z' 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box] 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-05-06T09:30:16Z' against 'skewed now' time '2026-05-06T09:15:16.608029929Z' 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ1311371-16ec-4e77-a97b-3c158b5c92cf 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQ1311371-16ec-4e77-a97b-3c158b5c92cf 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [s244b3df1b86e581deee5dab9457c6f9d24e5b4a68] 2026-05-06 09:20:16 [https-jsse-nio-443-exec-73] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@b7f5ee0c, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=167.127.90.97, SessionId=36EB97DBCDAA4254250291CB538CA4C3], Granted Authorities=[ROLE_USER]] 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] INFO c.b.s.c.SamlResponseController - SAML Response: PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWxwPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6 cHJvdG9jb2wiIERlc3RpbmF0aW9uPSJodHRwczovL3NhbWwtYm94LmNvbS9sb2dpbi9zYW1sMi9z c28iIElEPSJzMjQ0YjNkZjFiODZlNTgxZGVlZTVkYWI5NDU3YzZmOWQyNGU1YjRhNjgiIEluUmVz cG9uc2VUbz0iQVJRMTMxMTM3MS0xNmVjLTRlNzctYTk3Yi0zYzE1OGI1YzkyY2YiIElzc3VlSW5z dGFudD0iMjAyNi0wNS0wNlQwOToyMDoxNloiIFZlcnNpb249IjIuMCI+PHNhbWw6SXNzdWVyIHht bG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphc3NlcnRpb24iPk1vY2tJRFA8 L3NhbWw6SXNzdWVyPjxzYW1scDpTdGF0dXM+PHNhbWxwOlN0YXR1c0NvZGUgVmFsdWU9InVybjpv YXNpczpuYW1lczp0YzpTQU1MOjIuMDpzdGF0dXM6U3VjY2VzcyIvPjwvc2FtbHA6U3RhdHVzPjxz YW1sOkFzc2VydGlvbiB4bWxuczpzYW1sPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNz ZXJ0aW9uIiBJRD0iczIxNjc1OTI4MDBhNjU2YTliNzYzMjkzMGEwM2IxN2UwYmM4YmE3YjYyIiBJ c3N1ZUluc3RhbnQ9IjIwMjYtMDUtMDZUMDk6MjA6MTZaIiBWZXJzaW9uPSIyLjAiPjxzYW1sOklz c3Vlcj5Nb2NrSURQPC9zYW1sOklzc3Vlcj48ZHM6U2lnbmF0dXJlIHhtbG5zOmRzPSJodHRwOi8v d3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjIj48ZHM6U2lnbmVkSW5mbz48ZHM6Q2Fub25pY2Fs aXphdGlvbk1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMTAveG1sLWV4 Yy1jMTRuIyIvPjxkczpTaWduYXR1cmVNZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9y Zy8yMDAxLzA0L3htbGRzaWctbW9yZSNyc2Etc2hhMjU2Ii8+PGRzOlJlZmVyZW5jZSBVUkk9IiNz MjE2NzU5MjgwMGE2NTZhOWI3NjMyOTMwYTAzYjE3ZTBiYzhiYTdiNjIiPjxkczpUcmFuc2Zvcm1z PjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRz aWcjZW52ZWxvcGVkLXNpZ25hdHVyZSIvPjxkczpUcmFuc2Zvcm0gQWxnb3JpdGhtPSJodHRwOi8v d3d3LnczLm9yZy8yMDAxLzEwL3htbC1leGMtYzE0biMiLz48L2RzOlRyYW5zZm9ybXM+PGRzOkRp Z2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvMDQveG1sZW5jI3No YTI1NiIvPjxkczpEaWdlc3RWYWx1ZT5SR25GSzdyM3NHaTJtUGdyVXBUbDhVLzNSeXI5Y3dyUVFw ek5TYTMwUGUwPTwvZHM6RGlnZXN0VmFsdWU+PC9kczpSZWZlcmVuY2U+PC9kczpTaWduZWRJbmZv PjxkczpTaWduYXR1cmVWYWx1ZT5aZXFDbjZ5SURoQnRkcWg3clhjbGVMVXRudTRVMDJLSWtIZnFR OHVXdGs5anlXTHh1WVFabWtPUjJ6NFVpWU56eUJtSlAyVHlJMUpSb3BxRDVnYzBsNWplMVNxeFNr Q1BsaGpjS0svTzlXSWJJNXlyeW45WXMxT2E1eXFQRWZITjdQamdLa2lnaUtEL3BzK3drNEFNYzR3 SDNEN0FGQnBiakFWeVRLZkJ5WXp2TmRMZ1FXalIwRXdtQmhiS0pCUkFVU0t2bFNIcVZBbVVucVMx eHpoTUpGd0x6eWlSZHdSV0dTMGM3OWU4cjliekYvMW5ONDhDWVAwaHpzSkEra1RvQU5lUmo4ZGR2 dmFqajFML3h1SlRxRHBBT2Z0VGt6VnlucEM0MlZ2Q0xnTDZkWU56OXBLNEJLcVZ3Z05KYjBSNzdL dldzeFFmTTFzdnowb3RhV05mUUE9PTwvZHM6U2lnbmF0dXJlVmFsdWU+PGRzOktleUluZm8+PGRz Olg1MDlEYXRhPjxkczpYNTA5Q2VydGlmaWNhdGU+TUlJRjl6Q0NBOStnQXdJQkFnSVRXQUFBNTRo ZEVkRXVMY3NGNFFBQUFBRG5pREFOQmdrcWhraUc5dzBCQVFzRkFEQkhNUkl3RUFZS0NaSW1pWlB5 TEdRQkdSWUNZMkV4RnpBVkJnb0praWFKay9Jc1pBRVpGZ2RoWTJkd2NtOWtNUmd3RmdZRFZRUURF dzlCUTBkUWNtOWtMVWx6YzNWbFEwRXdIaGNOTWpZd01qSTFNVGt4TWpRd1doY05NamN3TWpJMU1U a3hNalF3V2pDQmt6RUxNQWtHQTFVRUJoTUNRMEV4RURBT0JnTlZCQWdUQjA5dWRHRnlhVzh4RURB T0JnTlZCQWNUQjFSdmNtOXVkRzh4R0RBV0JnTlZCQW9URDBGc2JITjBZWFJsSUVOaGJtRmtZVEVm TUIwR0ExVUVDeE1XU1c1bWIzSnRZWFJwYjI0Z1ZHVmphRzV2Ykc5bmVURWxNQ01HQTFVRUF4TWNZ V05uWldsaGJYTmhiV3h6Ym1SaWVDNWhiR3h6ZEdGMFpTNWpZVENDQVNJd0RRWUpLb1pJaHZjTkFR RUJCUUFEZ2dFUEFEQ0NBUW9DZ2dFQkFNaEhUWE1kZElvaE1GRzZHSDFWUmtxQVJyZ2hrYVlDU2Jz TmhvVjVKeFJxSU8xSzA3dmRZTzY4V2lrcW1tSDhSWjBHWk8vZjNxcXdJRWFEYlltNlNiOGpDUjhN OWdsbTFvZ2FBQkxvbTIvRHFWb3ViZnFYNXNZMkg2cHJGKzBScGRqemd3UGNOTnMyVldrMVgxZ2My K0YxS3V2NVdOTDZlU1hCRW5qcUhncnBxUjVIUXRBVXM3TU5ubXJOdmpwcmdlK210cUlod0ZuOFF4 QWE0VEVlaktlRFQwcGU5WEJmUzY3Y2ZvN1RQTGZDMkdnR2Nqa3dEcGZsa2FLVGx1QThrVkxySjYv djJlSFpsWW5YcmQ3UVJwU2NiV3RmNENVN3FUNHhkYW1YVnNqRU1kZTQzenBSaVZQV1RyTExwR21o VGgvMC9XOGJtemxhVHBwRkZJcWlZL1VDQXdFQUFhT0NBWTB3Z2dHSk1Bc0dBMVVkRHdRRUF3SUZv REE4QmdrckJnRUVBWUkzRlFjRUx6QXRCaVVyQmdFRUFZSTNGUWlHbHI5dmhQQ2xSb1NGbHhqZjZB S0VwZndGZVllbTJpaUhwczU5QWdGa0FnRWtNQjBHQTFVZERnUVdCQlJiTHpVSU5sdDROd3V3N3h2 MzNUZHZXMDJCQ0RBZkJnTlZIU01FR0RBV2dCUnlvMGxIOVZkL2Y4RGVUUXBVTzRTc0luQit1REJL QmdOVkhSOEVRekJCTUQrZ1BhQTdoamxvZEhSd09pOHZZV05uY0d0cExtRmpaM0J5YjJRdVkyRXZZ MkZ5WlhCdmMybDBiM0o1TDBGRFIxQlNUMFF0U1hOemRXVkRRUzVqY213d1ZRWUlLd1lCQlFVSEFR RUVTVEJITUVVR0NDc0dBUVVGQnpBQ2hqbG9kSFJ3T2k4dllXTm5jR3RwTG1GalozQnliMlF1WTJF dlkyRnlaWEJ2YzJsMGIzSjVMMEZEUjFCU1QwUXRTWE56ZFdWRFFTNWpjblF3RXdZRFZSMGxCQXd3 Q2dZSUt3WUJCUVVIQXdFd0d3WUpLd1lCQkFHQ054VUtCQTR3RERBS0JnZ3JCZ0VGQlFjREFUQW5C Z05WSFJFRUlEQWVnaHhoWTJkbGFXRnRjMkZ0YkhOdVpHSjRMbUZzYkhOMFlYUmxMbU5oTUEwR0NT cUdTSWIzRFFFQkN3VUFBNElDQVFDbTNUTlc5RWxuTFFMM2ZBUkV5dDhYbE5HWDFSQnJ3THEzbzI4 VWJLUXFkYWhjdjZhcytCRlNudVRnc0dOaVpCVGx0SXR0Q2Urb2srOFdMWWRmckZJM0FMQVkxenA4 RXRtMnpvdVdoQXdwenBDSTNpM2M2Sngyb3lYbEJybXk1NHluR1k2RGxXdmhtb2UwQzZhZnJCdEVO Tm5xQk16d2ZFQWY5dVNuTWRoWHZoUysyYm5sSGZkZ3gxZDQwaE14YkZOa2F4aG9JNWRoYWwvZGtQ VG92U1drcGszOFlBQ3V2MlY0aEtaUVVwcko1V1QwNHBQNUM3MUcyMnJvQjdnYzREVW5oY3IyaGcv WWtuMHhMeWd4SlVoS01nUU5FYmhVNjQ2eURaMjJHbkF4T0w1OEpucEZML0Rwc0lXb0M2NFByekZU T0N5bmZ4VldpQzkzdEhCc0hQSTVEZ3dyZHNCOUVTMnVZLzc5VGFHSWtTSC9RNHlqV3k2a1FkRmVm WUFuSlRQMEVkNmlWUDVYOHV3WDB6TDJIc1ZnK2kwUzdJU0tEWmt2c3FHd29NaHFUM3RuZ0xVQ0Q3 ZmE5d0o5Y3BTRmluU2pWSFduVzYvejB5L2NSZU45WFhQUXRzWnhKTDEyV3AxQm44MzBSN0REUXVG cUt2dGdUM0tJN3cySVJUS2h5SEJPeTFjWUJML3c4TVoyTEZtY3JCUWVjbmVqU3Y4WXdTdTdkREJr VktpYWVrTUh2dlNZQnNicTBZNG9Wd2FDeS9wcCtwaHdxcmk3L3FBSUdNOVBIM1piQ1Nrc0l6cTNq REd4Y1lTYmZVNHNBMmZnZjl2c0NrcnJ4Q3RGL1VhZDk2V1JKYVAwakJQVllDSDBNOFR0YjRVWE1T a3V1SHFLd2J0YjEycmQ1STE3eWc9PTwvZHM6WDUwOUNlcnRpZmljYXRlPjwvZHM6WDUwOURhdGE+ PC9kczpLZXlJbmZvPjwvZHM6U2lnbmF0dXJlPjxzYW1sOlN1YmplY3Q+PHNhbWw6TmFtZUlEIEZv cm1hdD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6MS4xOm5hbWVpZC1mb3JtYXQ6dW5zcGVjaWZp ZWQiIE5hbWVRdWFsaWZpZXI9Ik1vY2tJRFAiIFNQTmFtZVF1YWxpZmllcj0ic2FtbC1ib3giPmFk a3VtYXIwY2E8L3NhbWw6TmFtZUlEPjxzYW1sOlN1YmplY3RDb25maXJtYXRpb24gTWV0aG9kPSJ1 cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6Y206YmVhcmVyIj48c2FtbDpTdWJqZWN0Q29uZmly bWF0aW9uRGF0YSBJblJlc3BvbnNlVG89IkFSUTEzMTEzNzEtMTZlYy00ZTc3LWE5N2ItM2MxNThi NWM5MmNmIiBOb3RPbk9yQWZ0ZXI9IjIwMjYtMDUtMDZUMDk6MzA6MTZaIiBSZWNpcGllbnQ9Imh0 dHBzOi8vc2FtbC1ib3guY29tL2xvZ2luL3NhbWwyL3NzbyIvPjwvc2FtbDpTdWJqZWN0Q29uZmly bWF0aW9uPjwvc2FtbDpTdWJqZWN0PjxzYW1sOkNvbmRpdGlvbnMgTm90QmVmb3JlPSIyMDI2LTA1 LTA2VDA5OjEwOjE2WiIgTm90T25PckFmdGVyPSIyMDI2LTA1LTA2VDA5OjMwOjE2WiI+PHNhbWw6 QXVkaWVuY2VSZXN0cmljdGlvbj48c2FtbDpBdWRpZW5jZT5zYW1sLWJveDwvc2FtbDpBdWRpZW5j ZT48L3NhbWw6QXVkaWVuY2VSZXN0cmljdGlvbj48L3NhbWw6Q29uZGl0aW9ucz48c2FtbDpBdXRo blN0YXRlbWVudCBBdXRobkluc3RhbnQ9IjIwMjYtMDUtMDZUMDk6MjA6MTVaIiBTZXNzaW9uSW5k ZXg9InMyMjg1NDE2OGMxN2JkZTMwMWQwMjQwYmZlNGRmMDMzZjI0ZjcxODYwMSI+PHNhbWw6QXV0 aG5Db250ZXh0PjxzYW1sOkF1dGhuQ29udGV4dENsYXNzUmVmPnVybjpvYXNpczpuYW1lczp0YzpT QU1MOjIuMDphYzpjbGFzc2VzOnVuc3BlY2lmaWVkPC9zYW1sOkF1dGhuQ29udGV4dENsYXNzUmVm Pjwvc2FtbDpBdXRobkNvbnRleHQ+PC9zYW1sOkF1dGhuU3RhdGVtZW50PjxzYW1sOkF0dHJpYnV0 ZVN0YXRlbWVudD48c2FtbDpBdHRyaWJ1dGUgTmFtZT0id29ya2RheUlEIj48c2FtbDpBdHRyaWJ1 dGVWYWx1ZSB4bWxuczp4cz0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEiIHhtbG5z OnhzaT0iaHR0cDovL3d3dy53My5vcmcvMjAwMS9YTUxTY2hlbWEtaW5zdGFuY2UiIHhzaTp0eXBl PSJ4czpzdHJpbmciPkMyMDAwMTAzODwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmli dXRlPjxzYW1sOkF0dHJpYnV0ZSBOYW1lPSJzYU1BY2NvdW50TmFtZSI+PHNhbWw6QXR0cmlidXRl VmFsdWUgeG1sbnM6eHM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hIiB4bWxuczp4 c2k9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0i eHM6c3RyaW5nIj5hZGt1bWFyMGNhPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDpBdHRyaWJ1 dGU+PHNhbWw6QXR0cmlidXRlIE5hbWU9ImRlcGFydG1lbnQiPjxzYW1sOkF0dHJpYnV0ZVZhbHVl IHhtbG5zOnhzPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYSIgeG1sbnM6eHNpPSJo dHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSIgeHNpOnR5cGU9InhzOnN0 cmluZyI+SW5mb3JtYXRpb24gVGVjaG5vbG9neTwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6 QXR0cmlidXRlPjxzYW1sOkF0dHJpYnV0ZSBOYW1lPSJlbWFpbCI+PHNhbWw6QXR0cmlidXRlVmFs dWUgeG1sbnM6eHM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hIiB4bWxuczp4c2k9 Imh0dHA6Ly93d3cudzMub3JnLzIwMDEvWE1MU2NoZW1hLWluc3RhbmNlIiB4c2k6dHlwZT0ieHM6 c3RyaW5nIj5hZGt1bWFyQGFsbHN0YXRlLmNhPC9zYW1sOkF0dHJpYnV0ZVZhbHVlPjwvc2FtbDpB dHRyaWJ1dGU+PHNhbWw6QXR0cmlidXRlIE5hbWU9Ik5hbWUiPjxzYW1sOkF0dHJpYnV0ZVZhbHVl IHhtbG5zOnhzPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYSIgeG1sbnM6eHNpPSJo dHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSIgeHNpOnR5cGU9InhzOnN0 cmluZyI+S3VtYXIsIEFkaXR5YTwvc2FtbDpBdHRyaWJ1dGVWYWx1ZT48L3NhbWw6QXR0cmlidXRl Pjwvc2FtbDpBdHRyaWJ1dGVTdGF0ZW1lbnQ+PC9zYW1sOkFzc2VydGlvbj48L3NhbWxwOlJlc3Bv bnNlPg== 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] INFO c.b.s.c.SamlResponseController - Relay State: e197a15c-a012-4122-944f-3256855327ac 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl' 2026-05-06 09:20:16 [https-jsse-nio-443-exec-91] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential