Spring Boot Server Logs Viewer
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.authentication.logout.Saml2LogoutResponseFilter.doFilterInternal(Saml2LogoutResponseFilter.java:112)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.authentication.logout.Saml2LogoutRequestFilter.doFilterInternal(Saml2LogoutRequestFilter.java:126)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.SecurityContextHolderFilter.doFilter(SecurityContextHolderFilter.java:82)
at org.springframework.security.web.context.SecurityContextHolderFilter.doFilter(SecurityContextHolderFilter.java:69)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:62)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:233)
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:191)
at org.springframework.web.filter.CompositeFilter$VirtualFilterChain.doFilter(CompositeFilter.java:113)
at org.springframework.web.servlet.handler.HandlerMappingIntrospector.lambda$createCacheFilter$3(HandlerMappingIntrospector.java:243)
at org.springframework.web.filter.CompositeFilter$VirtualFilterChain.doFilter(CompositeFilter.java:113)
at org.springframework.web.filter.CompositeFilter.doFilter(CompositeFilter.java:74)
at org.springframework.security.config.annotation.web.configuration.WebMvcSecurityConfiguration$CompositeFilterChainProxy.doFilter(WebMvcSecurityConfiguration.java:238)
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:362)
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:278)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:167)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:90)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:483)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:115)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:93)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:344)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:397)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:63)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:905)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1743)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:52)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1190)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:63)
at java.base/java.lang.Thread.run(Thread.java:1583)
2026-03-20 05:31:13 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 05:31:13 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 05:31:13 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 05:31:13 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 05:31:13 [https-jsse-nio-443-exec-533] ERROR o.a.c.c.C.[.[.[.[dispatcherServlet] - Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception
java.lang.IllegalArgumentException: Invalid registration ID
at com.bostonidentity.samlbox.repository.DynamicRelyingPartyRegistrationRepository.findByRegistrationId(DynamicRelyingPartyRegistrationRepository.java:205)
at org.springframework.security.saml2.provider.service.registration.RelyingPartyRegistrationRepository.findUniqueByAssertingPartyEntityId(RelyingPartyRegistrationRepository.java:45)
at com.bostonidentity.samlbox.config.EntityIdRelyingPartyRegistrationResolver.resolve(EntityIdRelyingPartyRegistrationResolver.java:28)
at org.springframework.security.saml2.provider.service.web.Saml2AuthenticationTokenConverter.convert(Saml2AuthenticationTokenConverter.java:65)
at com.bostonidentity.samlbox.config.EntityIdLookupAuthenticationConverter.convert(EntityIdLookupAuthenticationConverter.java:57)
at org.springframework.security.saml2.provider.service.web.authentication.Saml2WebSsoAuthenticationFilter.attemptAuthentication(Saml2WebSsoAuthenticationFilter.java:123)
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:231)
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:221)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.Saml2WebSsoAuthenticationRequestFilter.doFilterInternal(Saml2WebSsoAuthenticationRequestFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:107)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:93)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:107)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:93)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.authentication.logout.Saml2LogoutResponseFilter.doFilterInternal(Saml2LogoutResponseFilter.java:112)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.authentication.logout.Saml2LogoutRequestFilter.doFilterInternal(Saml2LogoutRequestFilter.java:126)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.SecurityContextHolderFilter.doFilter(SecurityContextHolderFilter.java:82)
at org.springframework.security.web.context.SecurityContextHolderFilter.doFilter(SecurityContextHolderFilter.java:69)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:62)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:233)
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:191)
at org.springframework.web.filter.CompositeFilter$VirtualFilterChain.doFilter(CompositeFilter.java:113)
at org.springframework.web.servlet.handler.HandlerMappingIntrospector.lambda$createCacheFilter$3(HandlerMappingIntrospector.java:243)
at org.springframework.web.filter.CompositeFilter$VirtualFilterChain.doFilter(CompositeFilter.java:113)
at org.springframework.web.filter.CompositeFilter.doFilter(CompositeFilter.java:74)
at org.springframework.security.config.annotation.web.configuration.WebMvcSecurityConfiguration$CompositeFilterChainProxy.doFilter(WebMvcSecurityConfiguration.java:238)
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:362)
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:278)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:167)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:90)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:483)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:115)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:93)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:344)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:397)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:63)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:905)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1743)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:52)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1190)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:63)
at java.base/java.lang.Thread.run(Thread.java:1583)
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from https://apexconductor-qa.apexanalytix.app/saml/idp
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : https://apexconductor-qa.apexanalytix.app/saml/idp
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: https://apexconductor-qa.apexanalytix.app/saml/idp
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T09:38:45.921Z' against 'skewed now' time '2026-03-20T09:43:46.244968454Z'
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T10:38:45.916Z' against 'skewed now' time '2026-03-20T09:33:46.244968454Z'
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T09:43:45.933Z' against 'skewed now' time '2026-03-20T09:33:46.245141678Z'
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [_8c94fd7c-3332-4a53-8e21-757f39e9d4d9]
2026-03-20 09:38:46 [https-jsse-nio-443-exec-574] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@4e6126cc, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=216.250.229.2, SessionId=null], Granted Authorities=[ROLE_USER]]
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_8c94fd7c-3332-4a53-8e21-757f39e9d4d9" Version="2.0" IssueInstant="2026-03-20T09:38:45.911Z" Destination="https://saml-box.com/login/saml2/sso"><saml:Issuer>https://apexconductor-qa.apexanalytix.app/saml/idp</saml:Issuer><Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /><SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><Reference URI="#_8c94fd7c-3332-4a53-8e21-757f39e9d4d9"><Transforms><Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /></Transforms><DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256" /><DigestValue>IYFuXNzTl/ZhEyv1xT/fm7KbYey0bJqYpkj8IwFNgr8=</DigestValue></Reference></SignedInfo><SignatureValue>mBSVvwgy98a75EN4sjsWTL7VgGKGT1MlxG6Jy/xYTRvJhsAn9zC/zf4iHjlr/KbfLw50+yymm0mb5g6dTu42xQl7fEFwSsN7CYzUspahuGZ7cLsMBfk31tlDBIQc7ygTtWoBc5euCnCBDFsuawSfXGXaDfbsHZBbKeJRfqZESCd9pt/0VFbTcKS+FPuKpl4Z09+8xuMLtYRbHDK2SDBbkV62/gd/ybPSh8HFo94lHlmibcQ/ZR2vJ2XI7XV+TcVshjkWxGaISGdUnhL87CvxfVne1G2RkMV8AW1QzVisZ/+gBsz67s8gxVOfshwGWOEJv3MYqG7BGJ8GUDad7MO6Og==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate></X509Data></KeyInfo></Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" /></samlp:Status><saml:Assertion ID="_0ddefaf3-15b1-449f-92d3-adf90da32e97" IssueInstant="2026-03-20T09:38:45.918Z" Version="2.0" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"><saml:Issuer>https://apexconductor-qa.apexanalytix.app/saml/idp</saml:Issuer><Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /><SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><Reference URI="#_0ddefaf3-15b1-449f-92d3-adf90da32e97"><Transforms><Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /></Transforms><DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256" /><DigestValue>260BmGP9aoXpQqsGBeN/Y+puz21or3jgsF8iOjGVqLI=</DigestValue></Reference></SignedInfo><SignatureValue>SRXWdAOOSyubGZXoWHymuhHrNjpo4RhNZQIxgoogRc1i6FufWkH2P+/6G3e/9VL1dwp64jA9K+IdJ/80GFwE6HtWzmZGjiCCUv3U4gDC9E4SizUJC9xvSyP+MAmhFIs5jxFjmxUb/dPaqzzEyoMtp5VibOEqna7xvi/RObumqdwU1ulJorM9I+WbrgSdsXBeD7Fee1jfZIeJ0J4T0TgRZu/0bXxiZhRvDZFvLtbOOBK201mMh10HI+55Jdm93p6qGdpDKXdxNqvlHBY1eXVWGBLfVMUjZ6TeRKEy0XcXRsSY1aqERzMHd8ZNB0Icf91QN8uUbcOjlg8kLlztc5ajhg==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate></X509Data></KeyInfo></Signature><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">pallavitestgt114@yopmail.com</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2026-03-20T09:43:45.933Z" Recipient="https://saml-box.com/login/saml2/sso" /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T09:38:45.921Z" NotOnOrAfter="2026-03-20T10:38:45.916Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AttributeStatement><saml:Attribute Name="email"><saml:AttributeValue>pallavitestgt114@yopmail.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="firstname"><saml:AttributeValue>PALLAVI</saml:AttributeValue></saml:Attribute><saml:Attribute Name="lastname"><saml:AttributeValue>TEST</saml:AttributeValue></saml:Attribute><saml:Attribute Name="username"><saml:AttributeValue>pallavitestgt114@yopmail.com</saml:AttributeValue></saml:Attribute></saml:AttributeStatement><saml:AuthnStatement AuthnInstant="2026-03-20T09:38:45.932Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion></samlp:Response>
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] INFO c.b.s.c.SamlResponseController - Relay State: null
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 09:38:46 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 09:55:22 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 09:55:22 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 09:55:22 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 09:55:22 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 09:55:22 [https-jsse-nio-443-exec-590] ERROR o.a.c.c.C.[.[.[.[dispatcherServlet] - Servlet.service() for servlet [dispatcherServlet] in context with path [] threw exception
java.lang.IllegalArgumentException: Invalid registration ID
at com.bostonidentity.samlbox.repository.DynamicRelyingPartyRegistrationRepository.findByRegistrationId(DynamicRelyingPartyRegistrationRepository.java:205)
at org.springframework.security.saml2.provider.service.registration.RelyingPartyRegistrationRepository.findUniqueByAssertingPartyEntityId(RelyingPartyRegistrationRepository.java:45)
at com.bostonidentity.samlbox.config.EntityIdRelyingPartyRegistrationResolver.resolve(EntityIdRelyingPartyRegistrationResolver.java:28)
at org.springframework.security.saml2.provider.service.web.Saml2AuthenticationTokenConverter.convert(Saml2AuthenticationTokenConverter.java:65)
at com.bostonidentity.samlbox.config.EntityIdLookupAuthenticationConverter.convert(EntityIdLookupAuthenticationConverter.java:57)
at org.springframework.security.saml2.provider.service.web.authentication.Saml2WebSsoAuthenticationFilter.attemptAuthentication(Saml2WebSsoAuthenticationFilter.java:123)
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:231)
at org.springframework.security.web.authentication.AbstractAuthenticationProcessingFilter.doFilter(AbstractAuthenticationProcessingFilter.java:221)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.Saml2WebSsoAuthenticationRequestFilter.doFilterInternal(Saml2WebSsoAuthenticationRequestFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:107)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:93)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:107)
at org.springframework.security.web.authentication.logout.LogoutFilter.doFilter(LogoutFilter.java:93)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.authentication.logout.Saml2LogoutResponseFilter.doFilterInternal(Saml2LogoutResponseFilter.java:112)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.saml2.provider.service.web.authentication.logout.Saml2LogoutRequestFilter.doFilterInternal(Saml2LogoutRequestFilter.java:126)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.header.HeaderWriterFilter.doHeadersAfter(HeaderWriterFilter.java:90)
at org.springframework.security.web.header.HeaderWriterFilter.doFilterInternal(HeaderWriterFilter.java:75)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.SecurityContextHolderFilter.doFilter(SecurityContextHolderFilter.java:82)
at org.springframework.security.web.context.SecurityContextHolderFilter.doFilter(SecurityContextHolderFilter.java:69)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter.doFilterInternal(WebAsyncManagerIntegrationFilter.java:62)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.session.DisableEncodeUrlFilter.doFilterInternal(DisableEncodeUrlFilter.java:42)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:374)
at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:233)
at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:191)
at org.springframework.web.filter.CompositeFilter$VirtualFilterChain.doFilter(CompositeFilter.java:113)
at org.springframework.web.servlet.handler.HandlerMappingIntrospector.lambda$createCacheFilter$3(HandlerMappingIntrospector.java:243)
at org.springframework.web.filter.CompositeFilter$VirtualFilterChain.doFilter(CompositeFilter.java:113)
at org.springframework.web.filter.CompositeFilter.doFilter(CompositeFilter.java:74)
at org.springframework.security.config.annotation.web.configuration.WebMvcSecurityConfiguration$CompositeFilterChainProxy.doFilter(WebMvcSecurityConfiguration.java:238)
at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:362)
at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:278)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201)
at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:116)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:164)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:140)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:167)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:90)
at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:483)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:115)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:93)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:344)
at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:397)
at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:63)
at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:905)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1743)
at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:52)
at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1190)
at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:63)
at java.base/java.lang.Thread.run(Thread.java:1583)
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from https://apexconductor-qa.apexanalytix.app/saml/idp
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : https://apexconductor-qa.apexanalytix.app/saml/idp
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: https://apexconductor-qa.apexanalytix.app/saml/idp
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T10:01:31.096Z' against 'skewed now' time '2026-03-20T10:06:32.126553004Z'
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T11:01:31.096Z' against 'skewed now' time '2026-03-20T09:56:32.126553004Z'
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T10:06:31.097Z' against 'skewed now' time '2026-03-20T09:56:32.126640715Z'
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [_a9101d6d-3548-49cc-88e5-4173e8d8e911]
2026-03-20 10:01:32 [https-jsse-nio-443-exec-580] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@42ba62ee, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=216.250.229.2, SessionId=null], Granted Authorities=[ROLE_USER]]
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_a9101d6d-3548-49cc-88e5-4173e8d8e911" Version="2.0" IssueInstant="2026-03-20T10:01:31.096Z" Destination="https://saml-box.com/login/saml2/sso"><saml:Issuer>https://apexconductor-qa.apexanalytix.app/saml/idp</saml:Issuer><Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /><SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><Reference URI="#_a9101d6d-3548-49cc-88e5-4173e8d8e911"><Transforms><Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /></Transforms><DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256" /><DigestValue>OG+BvaHZSMtbvmA3yWjvYc5JDyxsh1EjYayfWWl9280=</DigestValue></Reference></SignedInfo><SignatureValue>UZDVoWJKl9nUgVKXSxSd/rpvOAPcJ7yKFU3WoFMxByaoFrHCG+KZAbysVOKUpsnrZ+E8CNupVE2q3aQboB3bSFyKHmt46mxFz+32pgei10y6rYREsC1z7FBbSatFloUBpEzgpRrPaJ4yru4HS+7Zi22ASy/14Om82wRynHqqGCJVkcRb/OdLWaE5ewm9qSNHkH5h0ch3vTvXAV3mL2kEeEdnPNk1Nf8wizh4g/gq7OWIifGkjSptwgwP5xuSs+in+37awqSHaSiD+SWr5h1wLa6GCynMLJEb66PEpGI6IX1OpBEuNJCKrhknNa+MqA4LUhfwPfu5p2/osOtCRI/kmA==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate></X509Data></KeyInfo></Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" /></samlp:Status><saml:Assertion ID="_b68cbbdc-0b84-4fd7-ab04-9d9745361796" IssueInstant="2026-03-20T10:01:31.096Z" Version="2.0" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"><saml:Issuer>https://apexconductor-qa.apexanalytix.app/saml/idp</saml:Issuer><Signature xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /><SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" /><Reference URI="#_b68cbbdc-0b84-4fd7-ab04-9d9745361796"><Transforms><Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /><Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" /></Transforms><DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256" /><DigestValue>SkiTRKpGr/FIUma6bkftJScGAG2uf6pPtgmZLbQ82HE=</DigestValue></Reference></SignedInfo><SignatureValue>nQWNRvWFkj/ghDG8ulqAHieDHth7hrFyhQTE0Lb8ggnVI7Yy4M05Af0v+zf1ovE4iJDnYQBFBHVdNwhneIo5+dnvS9cvDr6Dj9pdC4/h2Mt8oA5tWYJjYea2ZSxvswTPgajfVGy8Pj28Y+YlbNnS4xhfLqBcMVUqT5z5bFTOVKPbVQ67/l3PIwdFfLQlEZHMdCh+38NNtWpQgSyPasJiEpDmpSFz+3BV6SIqWCEQ6Oi8lev5dvVw7syMdQCLjS4FyD94R7e+kgOeL0upb/UAl8TuFHKkp+20zbgGwvm6/9B/yzWzrDh7NVJDlfhDDh8YjiwsKVeN7mAvLZMv0didHQ==</SignatureValue><KeyInfo><X509Data><X509Certificate>MIIG+TCCBeGgAwIBAgIQBH2N7uqAfyKpbtvxGbJHZTANBgkqhkiG9w0BAQsFADBZMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMTMwMQYDVQQDEypEaWdpQ2VydCBHbG9iYWwgRzIgVExTIFJTQSBTSEEyNTYgMjAyMCBDQTEwHhcNMjUwNDI0MDAwMDAwWhcNMjYwNTI1MjM1OTU5WjB1MQswCQYDVQQGEwJVUzEXMBUGA1UECBMOTm9ydGggQ2Fyb2xpbmExEzARBgNVBAcTCkdSRUVOU0JPUk8xGzAZBgNVBAoTEkFwZXggQW5hbHl0aXgsIExMQzEbMBkGA1UEAwwSKi5hcGV4YW5hbHl0aXguYXBwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2pwQRvWVk85Dof52I9vFRVbI3VAl79aVz1QMrNFb87WfCXOTsECs5mc0rOoRpeVAq5EfNKin0q7JvBLIlYY7kvkP80F16rU132pHWItH09Cj0pZ9RlRM0PvtrClKRWg7EGZKIJx6G4EmRSxHjHo6JpRCN8eMJPSklVsz6URmIEDgtwyCUDZ3Hmpg8srU09l5p1mvFmp7BqAnSWvx44eQVbKBoO+Vf0o4Owetmd9F7m7TlrsLyM8SIEPg67DP1ZiZ//xZR+zC8OUIhdupKwL61wwXEz3mty08m5SS1fR4pytkg41L680A59LHN+IXCE6aVLFnDdjsHsvC5HiTPIxaBQIDAQABo4IDnzCCA5swHwYDVR0jBBgwFoAUdIWAwGbH3zfez70pN6oDHb7tzRcwHQYDVR0OBBYEFF5H5bqn0q/aSP67KOzYohGFXPLNMC8GA1UdEQQoMCaCEiouYXBleGFuYWx5dGl4LmFwcIIQYXBleGFuYWx5dGl4LmFwcDA+BgNVHSAENzA1MDMGBmeBDAECAjApMCcGCCsGAQUFBwIBFhtodHRwOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjCBnwYDVR0fBIGXMIGUMEigRqBEhkJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRHbG9iYWxHMlRMU1JTQVNIQTI1NjIwMjBDQTEtMS5jcmwwSKBGoESGQmh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbEcyVExTUlNBU0hBMjU2MjAyMENBMS0xLmNybDCBhwYIKwYBBQUHAQEEezB5MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wUQYIKwYBBQUHMAKGRWh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEdsb2JhbEcyVExTUlNBU0hBMjU2MjAyMENBMS0xLmNydDAMBgNVHRMBAf8EAjAAMIIBfQYKKwYBBAHWeQIEAgSCAW0EggFpAWcAdQAOV5S8866pPjMbLJkHs/eQ35vCPXEyJd0hqSWsYcVOIQAAAZZoZOhuAAAEAwBGMEQCICO7HBoeCIfP5lSuozP3QKbGrzJGVE6vloyOay4kr/smAiB4jwiSHUFjLVl1fA9EvAPfVAth32IdRwClRi2ccGKsCwB2AGQRxGykEuyniRyiAi4AvKtPKAfUHjUnq+r+1QPJfc3wAAABlmhk6K0AAAQDAEcwRQIhAPWNGG+eNKHflRQZHzSTyJnAfvv02iyM0jbtmR5ytjvKAiA0sS8dqYF52CRgfa3xWt1mPvpkcrij/WQW503blXTJ0QB2AEmcm2neHXzs/DbezYdkprhbrwqHgBnRVVL76esp3fjDAAABlmhk6MsAAAQDAEcwRQIhALtJaw5DaqPP0JfvtLALWzW5pumrNMNhkL2MgqzElAsSAiAk6nH359fzuuv1AVjhcktptSQA5o/UIFroQ7j9f2v9gTANBgkqhkiG9w0BAQsFAAOCAQEAIvh7cMt27n3YuLD2Q50F3rWXqa4uqka9CygpX9CwlYKSHA5pRBvFHLxQVNRndlnhslxyQaFfvnJI2u24LiiWkpL0zSDuBBbEOejr/TjEuKWk0efp/9fDtp95m6ZWaJjHgV9p8Q/niZxyGN/7PO97+9gqMrePFg1w6sTlHsAMJCzE+LNUGarnKpfs6K837CEai+QOxgo3oa5bQOiZP2sZW823M98es66puYLiAUthqECOg0WTpbBGMAts9xe6/IjMsm5+SmxwJkOhenRTX/5DCDPWkiU6MbKvg8Z5A8SynyGLoTkAcvF0vwMOYuP4a1Ce0zJw3JVKJu7leIVtIzVHUg==</X509Certificate></X509Data></KeyInfo></Signature><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">march20summer@yopmail.com</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2026-03-20T10:06:31.097Z" Recipient="https://saml-box.com/login/saml2/sso" /></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T10:01:31.096Z" NotOnOrAfter="2026-03-20T11:01:31.096Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AttributeStatement><saml:Attribute Name="email"><saml:AttributeValue>march20summer@yopmail.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="firstname"><saml:AttributeValue>RUCHI</saml:AttributeValue></saml:Attribute><saml:Attribute Name="lastname"><saml:AttributeValue>GAUTAM</saml:AttributeValue></saml:Attribute><saml:Attribute Name="username"><saml:AttributeValue>march20summer@yopmail.com</saml:AttributeValue></saml:Attribute></saml:AttributeStatement><saml:AuthnStatement AuthnInstant="2026-03-20T10:01:31.097Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement></saml:Assertion></samlp:Response>
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] INFO c.b.s.c.SamlResponseController - Relay State: asdsdsf
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 10:01:32 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:26:51.614Z' against 'skewed now' time '2026-03-20T13:31:53.788150165Z'
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:27:51.614Z' against 'skewed now' time '2026-03-20T13:21:53.788150165Z'
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:27:51.614Z' against 'skewed now' time '2026-03-20T13:21:53.788366774Z'
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ48bb34b-5029-4772-95c0-a661a78eb0de
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQ48bb34b-5029-4772-95c0-a661a78eb0de
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [ID_7636aac5-57ae-4577-ac43-d265051f38da]
2026-03-20 13:26:53 [https-jsse-nio-443-exec-589] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@30aec817, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=91.66.138.30, SessionId=725C08482E66BF317D569F8AAA836E2E], Granted Authorities=[ROLE_USER]]
2026-03-20 13:26:53 [https-jsse-nio-443-exec-574] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_7636aac5-57ae-4577-ac43-d265051f38da" InResponseTo="ARQ48bb34b-5029-4772-95c0-a661a78eb0de" IssueInstant="2026-03-20T13:26:53.615Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_7636aac5-57ae-4577-ac43-d265051f38da"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>uJrHJHOfeNuzpoB9IG3ZzgdUUYawhhzDyz9hwaFWhbw=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>W194gxqUCbiSxUesi5cJ62LDYwdLToBu1vhi4cpdpGLUePvSNbvt1ALTs6muqMvRYSBwE/JAsezc8u2/R45L+qFI2YDFjWm8+L/qviJmoQ4WxidA0k1EPmnem8TYsj/wI7R6/lMI5W8PM+jC7M7tFjLNFEzeabJUd8JvaWgzSjIsOPxgUUBA6mui5wv/EpH0hrk8nFDE/PdiYR05uCp8GJ5wREqgjJW4i5fmLcs5PggmBTt8V1SCrLSiokseTCam9MnwAe03W5EvvPQ4HoQwz60elM+IgTKzJCHBQ+fFdnZEmWlv0CDcCLTMWJ4Zbb7qeIgiwhoiMuU4RlbWFduUxw==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>MIICmzCCAYMCBgGdAaImejANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDDAZtYXN0ZXIwHhcNMjYwMzE4MTU0NjM3WhcNMzYwMzE4MTU0ODE3WjARMQ8wDQYDVQQDDAZtYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5//Js17BFQ2R9s7+iJmov15C8SwOkcH3J2SNMwZbt+tGR3sJA01TFnLoeVPLZWd4bas5XgaLkBC4/pUBzZB7LvFLNXxHvvl1Fo7yBOGrBtnUTnLwln/LL7yVJM36xUEQ+kuf5BTh7WLC22ozKcWkVuBNWmQZ2T2djFNAtIJW2npOAm4S0yRJN1QSqGiTck5Mjev8PMM51DGnisxkTULEcPNa5l/QOGUHCs4KzD2tH5U2PSqMs53AA030S5jWhxQRa5uGU3j/1JCUc6vWjMYEO3+kMb6C98iz2fZoRPRPqBa2n0BJp2kPjzg0umZOaJ4DSdNXJJ9wltcgzrar7CzQZAgMBAAEwDQYJKoZIhvcNAQELBQADggEBALNU+sp5Zhd6c5WLU4gG7J+0OjRWdmxm5YDsmFsfzgc8eo521uLyXEB+FOGHStDM0suhUUzsJvQ8FXeFg/m/BUerJlmykw+YmHazmg3bB8Xwl5+tkOZPLtOUFg0eXu9v00CqNfYQibugfa4pdH1sPO8Ins0RtBesg9mkqzcbEli1vVWAjqIfeTMVbXNOZSTsJTpOCUALlDyuivrHXOE/rwQ+p+gOMgc5rw87GkKUNTnpC/NKX+GPL+HK6cwNCaxkp/MBpLmBBl9yAxw1kc2tgRxAas90ZyRz0EB7TpuAP3HXt9vXKTCmf1g6bOvzFk3hcxdBVvET0EN8RtUc6p72SfE=</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_d4a3a3b3-7a28-43ae-8cc0-43519f58b3ea" IssueInstant="2026-03-20T13:26:53.614Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">gladiator@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQ48bb34b-5029-4772-95c0-a661a78eb0de" NotOnOrAfter="2026-03-20T13:27:51.614Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:26:51.614Z" NotOnOrAfter="2026-03-20T13:27:51.614Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:26:53.616Z" SessionIndex="T078EmAOIjn15qslwqQIjFUq::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:26:53.616Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">null null</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">gladiator@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-client</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">impersonation</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-realms</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-groups</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-identity-providers</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-identity-providers</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:26:53 [https-jsse-nio-443-exec-574] INFO c.b.s.c.SamlResponseController - Relay State: 4d3a8541-938d-4e4e-ba27-502aa5b39e76
2026-03-20 13:26:53 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:26:53 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:26:53 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:26:53 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:27:14.260Z' against 'skewed now' time '2026-03-20T13:32:16.407644679Z'
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:28:14.260Z' against 'skewed now' time '2026-03-20T13:22:16.407644679Z'
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:28:14.260Z' against 'skewed now' time '2026-03-20T13:22:16.407750560Z'
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQc44754f-ada2-4731-ace5-6429c385f1ec
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQc44754f-ada2-4731-ace5-6429c385f1ec
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [ID_52c2ac71-cc97-41ec-a3f7-01d408ed3cfd]
2026-03-20 13:27:16 [https-jsse-nio-443-exec-589] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@30aec817, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=91.66.138.30, SessionId=77A857A39AA74DB886F8E8A6FE773EC1], Granted Authorities=[ROLE_USER]]
2026-03-20 13:27:16 [https-jsse-nio-443-exec-590] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_52c2ac71-cc97-41ec-a3f7-01d408ed3cfd" InResponseTo="ARQc44754f-ada2-4731-ace5-6429c385f1ec" IssueInstant="2026-03-20T13:27:16.260Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_52c2ac71-cc97-41ec-a3f7-01d408ed3cfd"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>C40AQkVpzE1l/BmnsvRFiCu544IMVCHYv0liWnHhjCk=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>RhNK9RPIL16eedb1kuogU4w4mU5Dk7Ch33ICuZp9iyYbJm1wFm97rM6KQkIZEfujl/MEaCUXbD2Od0NHdn9dPYSI48z3mAPJg3PKT57r+YocCYYOpo68VfKC10lNT76nzHwIVEbSt4mH2dOkm+koMrFYFLgsIvuzHtfEjP6oJdXtKv/RVnXsCuv8rRlPdGBdFN3RcUU036xNq3mFv5MvXR9p/DeRdwAP9olXjjSe/d1C7AfR6Y//OukR34CqPi8jqd+e9AxIAv0nyv7Ho80sQP3YD4ZsmyJ/a8cVzz4UXOfKKlDJH6bfVR0p+maaZ2Izu1Y7nS7Y0Ein4w9wM/r8GA==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_7a40c073-a4a9-4e68-a32d-3ee170c2d925" IssueInstant="2026-03-20T13:27:16.260Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">gladiator@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQc44754f-ada2-4731-ace5-6429c385f1ec" NotOnOrAfter="2026-03-20T13:28:14.260Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:27:14.260Z" NotOnOrAfter="2026-03-20T13:28:14.260Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:27:16.261Z" SessionIndex="T078EmAOIjn15qslwqQIjFUq::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:27:16.261Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Lorenz Kock</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">gladiator@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-client</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">impersonation</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-realms</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-groups</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-identity-providers</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-identity-providers</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:27:16 [https-jsse-nio-443-exec-590] INFO c.b.s.c.SamlResponseController - Relay State: 36a0278b-690f-452d-a6de-12f7fed499b2
2026-03-20 13:27:16 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:27:16 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:27:16 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:27:16 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:29:41.729Z' against 'skewed now' time '2026-03-20T13:34:44.110178573Z'
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:30:41.729Z' against 'skewed now' time '2026-03-20T13:24:44.110178573Z'
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:30:41.729Z' against 'skewed now' time '2026-03-20T13:24:44.110269194Z'
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ27fbedf-f1f1-4f4c-a58d-7aa0d5d74aac
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] WARN o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Valid InResponseTo was not available from the validation context, unable to evaluate SubjectConfirmationData@InResponseTo
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.o.s.s.a.SAML20AssertionValidator - No subject confirmation methods were met for assertion with ID 'ID_9bf8c38d-cbb9-45cb-9602-12a126755e92'
2026-03-20 13:29:44 [https-jsse-nio-443-exec-580] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Found 2 validation errors in SAML response [ID_a8f005f7-5e11-4ea0-ab76-6a78f896ddc2]
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:29:47.554Z' against 'skewed now' time '2026-03-20T13:34:49.714850702Z'
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:30:47.554Z' against 'skewed now' time '2026-03-20T13:24:49.714850702Z'
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:30:47.554Z' against 'skewed now' time '2026-03-20T13:24:49.715078248Z'
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ20574c7-5b05-42b1-900b-00b55421f65f
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQ20574c7-5b05-42b1-900b-00b55421f65f
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [ID_734daefc-8d13-486e-a5c2-bab0c2a17cae]
2026-03-20 13:29:49 [https-jsse-nio-443-exec-590] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@30aec817, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=91.66.138.30, SessionId=277B6F19FAB43F0F5559CF226312C612], Granted Authorities=[ROLE_USER]]
2026-03-20 13:29:49 [https-jsse-nio-443-exec-533] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_734daefc-8d13-486e-a5c2-bab0c2a17cae" InResponseTo="ARQ20574c7-5b05-42b1-900b-00b55421f65f" IssueInstant="2026-03-20T13:29:49.554Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_734daefc-8d13-486e-a5c2-bab0c2a17cae"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>eKJQbixbnMSMMjqla6HclkBzBjY2XXXTGvG3dswkdIQ=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>bwK/QmM5kTCauyBIEesjxOco0/ZuAnuvsVJOAYFNR0/A2UgBKY5+YvH6WKZjVac+wULzkDE8mbRrA+xEGjsuT+TcouohUpuTNeUSOvdDo5Gy6Uwrj3ZBbRlaLx13gKz9X2WyQHrf5g0hsuaWtLX3fjXMvFZNkGOj5ntFOgrq4mDT8ApX3nFTqaBY1DhXb4FV6N5EkQ0YkNBNrwUYdm1IE7bHQlUah4TcI3CzgbnkOXzuZ6xU6D75ySgKb0GfQnMGtbNKMqWHIV2lxT+6ukyJSk1Rnv3yrhyitU9yJ4dkHamC0/QMevkuOENYFUlFetycydN8+sdYOIzj4kZC326jGA==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>MIICmzCCAYMCBgGdAaImejANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDDAZtYXN0ZXIwHhcNMjYwMzE4MTU0NjM3WhcNMzYwMzE4MTU0ODE3WjARMQ8wDQYDVQQDDAZtYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5//Js17BFQ2R9s7+iJmov15C8SwOkcH3J2SNMwZbt+tGR3sJA01TFnLoeVPLZWd4bas5XgaLkBC4/pUBzZB7LvFLNXxHvvl1Fo7yBOGrBtnUTnLwln/LL7yVJM36xUEQ+kuf5BTh7WLC22ozKcWkVuBNWmQZ2T2djFNAtIJW2npOAm4S0yRJN1QSqGiTck5Mjev8PMM51DGnisxkTULEcPNa5l/QOGUHCs4KzD2tH5U2PSqMs53AA030S5jWhxQRa5uGU3j/1JCUc6vWjMYEO3+kMb6C98iz2fZoRPRPqBa2n0BJp2kPjzg0umZOaJ4DSdNXJJ9wltcgzrar7CzQZAgMBAAEwDQYJKoZIhvcNAQELBQADggEBALNU+sp5Zhd6c5WLU4gG7J+0OjRWdmxm5YDsmFsfzgc8eo521uLyXEB+FOGHStDM0suhUUzsJvQ8FXeFg/m/BUerJlmykw+YmHazmg3bB8Xwl5+tkOZPLtOUFg0eXu9v00CqNfYQibugfa4pdH1sPO8Ins0RtBesg9mkqzcbEli1vVWAjqIfeTMVbXNOZSTsJTpOCUALlDyuivrHXOE/rwQ+p+gOMgc5rw87GkKUNTnpC/NKX+GPL+HK6cwNCaxkp/MBpLmBBl9yAxw1kc2tgRxAas90ZyRz0EB7TpuAP3HXt9vXKTCmf1g6bOvzFk3hcxdBVvET0EN8RtUc6p72SfE=</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_db7d7ac6-82ca-4c3e-bc98-24343e333a10" IssueInstant="2026-03-20T13:29:49.554Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">gladiator@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQ20574c7-5b05-42b1-900b-00b55421f65f" NotOnOrAfter="2026-03-20T13:30:47.554Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:29:47.554Z" NotOnOrAfter="2026-03-20T13:30:47.554Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:29:49.555Z" SessionIndex="T078EmAOIjn15qslwqQIjFUq::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:29:49.555Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Lorenz Kock</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">gladiator@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-client</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">impersonation</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-realms</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-groups</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-identity-providers</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-identity-providers</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:29:49 [https-jsse-nio-443-exec-533] INFO c.b.s.c.SamlResponseController - Relay State: 77876fb9-9f58-41e7-94be-7eb43d446cf1
2026-03-20 13:29:49 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:29:49 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:29:49 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:29:49 [https-jsse-nio-443-exec-533] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:30:48 [https-jsse-nio-443-exec-574] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Found 3 validation errors in SAML response [ID_581f6881-530b-4289-8b60-bf7850f6a02c]
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:30:55 [https-jsse-nio-443-exec-508] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Found 3 validation errors in SAML response [ID_cb797b79-d237-463c-b644-1781fe669ab3]
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:31:20.392Z' against 'skewed now' time '2026-03-20T13:36:22.528014875Z'
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:32:20.392Z' against 'skewed now' time '2026-03-20T13:26:22.528014875Z'
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:32:20.392Z' against 'skewed now' time '2026-03-20T13:26:22.528144935Z'
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQ875596e-a67d-4d55-9671-baba27b5dc6d
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQ875596e-a67d-4d55-9671-baba27b5dc6d
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [ID_49f9da29-0df2-4682-ac94-250887a5ec5e]
2026-03-20 13:31:22 [https-jsse-nio-443-exec-508] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@51cb4537, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=91.66.138.30, SessionId=732BF6280412E936BA37084D63F62FDA], Granted Authorities=[ROLE_USER]]
2026-03-20 13:31:22 [https-jsse-nio-443-exec-578] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_49f9da29-0df2-4682-ac94-250887a5ec5e" InResponseTo="ARQ875596e-a67d-4d55-9671-baba27b5dc6d" IssueInstant="2026-03-20T13:31:22.392Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_49f9da29-0df2-4682-ac94-250887a5ec5e"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>0dtNM1vGiR1C6rU9hhEUuXVs56kMOBf3XkqcXVqosKc=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>BS5feO5EGzsGF/64JzBv4UPv31zCcvyJHVD0l9eEvNo2nDCHnNjlqckYeUtDKmZWDncHQXaoy0Lypsv3KeI3Mokcmt9zbxjF0xDymquwW/6xJxigvgpij+0ClaomTqMz9N8jcgNPEtyyyk6BGLes1JiphflD896moAPDkf/Kej8y5Hzmvy7Y/xORmC8w4GCbPMpSG8bZTfn+ZooEFsqxdejVPI9hPueo9JOCIxSXj/MrojZtFw6MGzpzE6BrmL0ZZgF9jx8RUkCn/WtTX0sJ4Uara83wUScgzkTUMG01hPOYBSFUaNmEin2lxrIdwvQ/WuagiMZMuJCYg6QfyJ7T4Q==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_c0b567df-f627-4563-9c73-0a35b65098d8" IssueInstant="2026-03-20T13:31:22.392Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">bla@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQ875596e-a67d-4d55-9671-baba27b5dc6d" NotOnOrAfter="2026-03-20T13:32:20.392Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:31:20.392Z" NotOnOrAfter="2026-03-20T13:32:20.392Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:31:22.392Z" SessionIndex="DNCa9HV-EBHhplFptQ0EQ7ro::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:31:22.392Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string"> </saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">bla@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:31:22 [https-jsse-nio-443-exec-578] INFO c.b.s.c.SamlResponseController - Relay State: edd4aec0-5162-4740-a67f-f4816b5e8756
2026-03-20 13:31:22 [https-jsse-nio-443-exec-578] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:22 [https-jsse-nio-443-exec-578] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:22 [https-jsse-nio-443-exec-578] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:22 [https-jsse-nio-443-exec-578] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:31:46.428Z' against 'skewed now' time '2026-03-20T13:36:48.569874508Z'
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:32:46.428Z' against 'skewed now' time '2026-03-20T13:26:48.569874508Z'
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:32:46.428Z' against 'skewed now' time '2026-03-20T13:26:48.569985893Z'
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQfc621bc-c394-49e0-9083-f89a85093345
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQfc621bc-c394-49e0-9083-f89a85093345
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [ID_f582d800-169b-424c-9cb3-39f81be1885d]
2026-03-20 13:31:48 [https-jsse-nio-443-exec-590] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@30aec817, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=91.66.138.30, SessionId=37910AEC6C73FA5142234490FC15B23B], Granted Authorities=[ROLE_USER]]
2026-03-20 13:31:48 [https-jsse-nio-443-exec-580] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_f582d800-169b-424c-9cb3-39f81be1885d" InResponseTo="ARQfc621bc-c394-49e0-9083-f89a85093345" IssueInstant="2026-03-20T13:31:48.428Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_f582d800-169b-424c-9cb3-39f81be1885d"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>FkLNbYgHHDMD0EKMXczo95lUN52uwNyqx+nWd1GxqvY=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>AZYSI4d6H7AtyH/S8f39RaEWHm3LTP8oM4YVMEtcE4jm3nU6vb/H/k+7QPfGSOQYULjvjXJgFykURbywROC1ryItt1IRmJ2xLE3TC+wnhRHinKIJAmtC46tCzFHJlJ2hON1rmDSoI211xPZB+B/fgMFGRm63mvqyaaec/ejvo0T4h6GV8k3VwhXVK4qVX4Rh9KW0QnqihsUXqfE/MxSDrzW7q73hEe3XjUGC2lGnr3AxsRwTEcHggOJy7nmb92IVOYPuD7ISh+2rD4yD9HT+bS8b5+ZmoF48zt6PNcFwgZFgzprQE6LGjrMrSyfMy1mxWonT2yzR4eJDILQI5UJF5w==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_1fc82f4b-84b5-4dd8-b84b-749515075062" IssueInstant="2026-03-20T13:31:48.428Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">gladiator@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQfc621bc-c394-49e0-9083-f89a85093345" NotOnOrAfter="2026-03-20T13:32:46.428Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:31:46.428Z" NotOnOrAfter="2026-03-20T13:32:46.428Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:31:48.428Z" SessionIndex="T078EmAOIjn15qslwqQIjFUq::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:31:48.428Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Lorenz Kock</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">gladiator@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-client</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">impersonation</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-realms</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-groups</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-identity-providers</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-identity-providers</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:31:48 [https-jsse-nio-443-exec-580] INFO c.b.s.c.SamlResponseController - Relay State: 32f49455-982b-473c-ab1e-d8d016e5c11d
2026-03-20 13:31:48 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:31:48 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:31:48 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:31:48 [https-jsse-nio-443-exec-580] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Processing SAML response from http://localhost:8080/realms/master
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Enveloped signature transform
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.i.SAMLSignatureProfileValidator - Saw Exclusive C14N signature transform
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableKeyAlgorithmCredentialCriterion for criteria class org.opensaml.security.criteria.KeyAlgorithmCriterion
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry located evaluable criteria class org.opensaml.security.credential.criteria.impl.EvaluableUsageCredentialCriterion for criteria class org.opensaml.security.criteria.UsageCriterion
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.saml.metadata.criteria.role.impl.EvaluableProtocolRoleDescriptorCriterion
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to verify signature and establish trust using KeyInfo-derived credentials
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Found 0 key names: []
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child with QName: {http://www.w3.org/2000/09/xmldsig#}X509Data
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.RSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DSAKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.ECKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Provider org.opensaml.xmlsec.keyinfo.impl.provider.DEREncodedKeyValueProvider doesn't handle objects of type {http://www.w3.org/2000/09/xmldsig#}X509Data, skipping
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Processing KeyInfo child {http://www.w3.org/2000/09/xmldsig#}X509Data with provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Attempting to extract credential from an X509Data
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 1 X509Certificates
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Found 0 X509CRLs
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.p.InlineX509DataProvider - Single certificate was present, treating as end-entity certificate
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - Credentials successfully extracted from child {http://www.w3.org/2000/09/xmldsig#}X509Data by provider org.opensaml.xmlsec.keyinfo.impl.provider.InlineX509DataProvider
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.k.i.BasicProviderKeyInfoCredentialResolver - A total of 1 credentials were resolved
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.c.c.i.EvaluableCredentialCriteriaRegistry - Registry could not locate evaluable criteria for criteria class org.opensaml.xmlsec.keyinfo.KeyInfoCriterion
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.SignatureValidationProvider - Using a validation provider of implementation: org.opensaml.xmlsec.signature.support.impl.provider.ApacheSantuarioSignatureValidationProviderImpl
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Attempting to validate signature using key from supplied credential
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Accessing XMLSignature object
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validating signature with signature algorithm URI: http://www.w3.org/2001/04/xmldsig-more#rsa-sha256
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Validation credential key algorithm 'RSA', key instance class 'sun.security.rsa.RSAPublicKeyImpl'
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.p.ApacheSantuarioSignatureValidationProviderImpl - Signature validated with key from supplied credential
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Signature validation using candidate credential was successful
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully verified signature using KeyInfo-derived credential
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Attempting to establish trust of KeyInfo-derived credential
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.t.i.ExplicitKeyTrustEvaluator - Successfully validated untrusted credential against trusted key
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.x.s.s.i.BaseSignatureTrustEngine - Successfully established trust of KeyInfo-derived credential
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Assertion Issuer of : http://localhost:8080/realms/master
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.SAML20AssertionValidator - Matched valid issuer: http://localhost:8080/realms/master
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.SAML20AssertionValidator - No Conditions were indicated as required
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotBefore '2026-03-20T13:32:31.869Z' against 'skewed now' time '2026-03-20T13:37:34.029679135Z'
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.SAML20AssertionValidator - Evaluating Conditions NotOnOrAfter '2026-03-20T13:33:31.869Z' against 'skewed now' time '2026-03-20T13:27:34.029679135Z'
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Evaluating the Assertion's AudienceRestriction/Audience values against the list of valid audiences: [saml-box]
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AudienceRestrictionConditionValidator - Matched valid audience: saml-box
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.SAML20AssertionValidator - Assertion contains at least 1 SubjectConfirmation, proceeding with subject confirmation
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData NotOnOrAfter '2026-03-20T13:33:31.869Z' against 'skewed now' time '2026-03-20T13:27:34.029766540Z'
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@Recipient of : https://saml-box.com/login/saml2/sso
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid recipient: https://saml-box.com/login/saml2/sso
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Evaluating SubjectConfirmationData@InResponseTo of: ARQa53c312-2f5a-47b5-8a69-13dcde150faf
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.o.s.s.a.i.AbstractSubjectConfirmationValidator - Matched valid InResponseTo: ARQa53c312-2f5a-47b5-8a69-13dcde150faf
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.s.s.s.p.s.a.BaseOpenSamlAuthenticationProvider - Successfully processed SAML Response [ID_d2ce5a0c-7c0c-4b87-875c-53477f6d4af6]
2026-03-20 13:32:34 [https-jsse-nio-443-exec-568] DEBUG o.s.s.s.p.s.w.a.Saml2WebSsoAuthenticationFilter - Set SecurityContextHolder to Saml2Authentication [Principal=org.springframework.security.saml2.provider.service.authentication.DefaultSaml2AuthenticatedPrincipal@30aec817, Credentials=[PROTECTED], Authenticated=true, Details=WebAuthenticationDetails [RemoteIpAddress=91.66.138.30, SessionId=8C9957B9DE6B298CDAC5CB76235CA74F], Granted Authorities=[ROLE_USER]]
2026-03-20 13:32:34 [https-jsse-nio-443-exec-574] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_d2ce5a0c-7c0c-4b87-875c-53477f6d4af6" InResponseTo="ARQa53c312-2f5a-47b5-8a69-13dcde150faf" IssueInstant="2026-03-20T13:32:33.869Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_d2ce5a0c-7c0c-4b87-875c-53477f6d4af6"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>WyS3ymqonCcw7XIYS6pHZyXZvv9bySKIvvkwGIr/dRQ=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>jLdgJ3TKu/L2RBfV9NiSRhcytABktrHbJVFj4LzwMCRdi7dTPRDHy1AFxm7SbUsI6TarHYX0swSn/TUecTYFXwpSkaOCD/TEY/oQSOhD/tPiHUYmmwEuXBC8ExZEvnbJ/R1zGoO0VHr+68Jptg+wpmr0HzSXZZkUf+QFEfp5XHj9W3psGpBTxuZZ1jYr9bk8NEr/dJmYw0UARM0IjQQkrN06QNfuA1HaoH1G1GwZB2t146LY6UG3Q9XIfWu8o+N+PLGoQ8cuESRtg4/nnV7NFW0N3G1fYFl7IYjc5rDK+aJpQrfTXJtdrC7REaZesXt0FS6CwVSgxc0T+xm3eoVZVg==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>MIICmzCCAYMCBgGdAaImejANBgkqhkiG9w0BAQsFADARMQ8wDQYDVQQDDAZtYXN0ZXIwHhcNMjYwMzE4MTU0NjM3WhcNMzYwMzE4MTU0ODE3WjARMQ8wDQYDVQQDDAZtYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5//Js17BFQ2R9s7+iJmov15C8SwOkcH3J2SNMwZbt+tGR3sJA01TFnLoeVPLZWd4bas5XgaLkBC4/pUBzZB7LvFLNXxHvvl1Fo7yBOGrBtnUTnLwln/LL7yVJM36xUEQ+kuf5BTh7WLC22ozKcWkVuBNWmQZ2T2djFNAtIJW2npOAm4S0yRJN1QSqGiTck5Mjev8PMM51DGnisxkTULEcPNa5l/QOGUHCs4KzD2tH5U2PSqMs53AA030S5jWhxQRa5uGU3j/1JCUc6vWjMYEO3+kMb6C98iz2fZoRPRPqBa2n0BJp2kPjzg0umZOaJ4DSdNXJJ9wltcgzrar7CzQZAgMBAAEwDQYJKoZIhvcNAQELBQADggEBALNU+sp5Zhd6c5WLU4gG7J+0OjRWdmxm5YDsmFsfzgc8eo521uLyXEB+FOGHStDM0suhUUzsJvQ8FXeFg/m/BUerJlmykw+YmHazmg3bB8Xwl5+tkOZPLtOUFg0eXu9v00CqNfYQibugfa4pdH1sPO8Ins0RtBesg9mkqzcbEli1vVWAjqIfeTMVbXNOZSTsJTpOCUALlDyuivrHXOE/rwQ+p+gOMgc5rw87GkKUNTnpC/NKX+GPL+HK6cwNCaxkp/MBpLmBBl9yAxw1kc2tgRxAas90ZyRz0EB7TpuAP3HXt9vXKTCmf1g6bOvzFk3hcxdBVvET0EN8RtUc6p72SfE=</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_8a42a98f-6e2f-445c-98be-f4b18449769f" IssueInstant="2026-03-20T13:32:33.869Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">gladiator@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQa53c312-2f5a-47b5-8a69-13dcde150faf" NotOnOrAfter="2026-03-20T13:33:31.869Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:32:31.869Z" NotOnOrAfter="2026-03-20T13:33:31.869Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:32:33.869Z" SessionIndex="T078EmAOIjn15qslwqQIjFUq::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:32:33.869Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Lorenz Kock</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">gladiator@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-client</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">impersonation</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-events</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-users</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-realms</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-groups</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">create-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-identity-providers</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">query-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-realm</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-clients</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-identity-providers</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:32:34 [https-jsse-nio-443-exec-574] INFO c.b.s.c.SamlResponseController - Relay State: a938d609-be95-4a5b-808a-356aff25eb24
2026-03-20 13:32:34 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:32:34 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:32:34 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:32:34 [https-jsse-nio-443-exec-574] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature
2026-03-20 13:33:19 [https-jsse-nio-443-exec-567] INFO c.b.s.c.SamlResponseController - SAML Response: <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://saml-box.com/login/saml2/sso" ID="ID_49f9da29-0df2-4682-ac94-250887a5ec5e" InResponseTo="ARQ875596e-a67d-4d55-9671-baba27b5dc6d" IssueInstant="2026-03-20T13:31:22.392Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_49f9da29-0df2-4682-ac94-250887a5ec5e"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>0dtNM1vGiR1C6rU9hhEUuXVs56kMOBf3XkqcXVqosKc=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>BS5feO5EGzsGF/64JzBv4UPv31zCcvyJHVD0l9eEvNo2nDCHnNjlqckYeUtDKmZWDncHQXaoy0Lypsv3KeI3Mokcmt9zbxjF0xDymquwW/6xJxigvgpij+0ClaomTqMz9N8jcgNPEtyyyk6BGLes1JiphflD896moAPDkf/Kej8y5Hzmvy7Y/xORmC8w4GCbPMpSG8bZTfn+ZooEFsqxdejVPI9hPueo9JOCIxSXj/MrojZtFw6MGzpzE6BrmL0ZZgF9jx8RUkCn/WtTX0sJ4Uara83wUScgzkTUMG01hPOYBSFUaNmEin2lxrIdwvQ/WuagiMZMuJCYg6QfyJ7T4Q==</dsig:SignatureValue><dsig:KeyInfo><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_c0b567df-f627-4563-9c73-0a35b65098d8" IssueInstant="2026-03-20T13:31:22.392Z" Version="2.0"><saml:Issuer>http://localhost:8080/realms/master</saml:Issuer><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">bla@vater-solution.de</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="ARQ875596e-a67d-4d55-9671-baba27b5dc6d" NotOnOrAfter="2026-03-20T13:32:20.392Z" Recipient="https://saml-box.com/login/saml2/sso"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2026-03-20T13:31:20.392Z" NotOnOrAfter="2026-03-20T13:32:20.392Z"><saml:AudienceRestriction><saml:Audience>saml-box</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2026-03-20T13:31:22.392Z" SessionIndex="DNCa9HV-EBHhplFptQ0EQ7ro::4ec1c83c-8109-4da6-ab59-7a8869551ecc" SessionNotOnOrAfter="2026-03-20T23:31:22.392Z"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="Anzeigename" Name="displayName" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string"> </saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="Solution-E-Mail" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">bla@vater-solution.de</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">default-roles-master</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name="Role" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
2026-03-20 13:33:19 [https-jsse-nio-443-exec-567] INFO c.b.s.c.SamlResponseController - Relay State: edd4aec0-5162-4740-a67f-f4816b5e8756
2026-03-20 13:33:19 [https-jsse-nio-443-exec-567] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Starting to unmarshall Apache XML-Security-based SignatureImpl element
2026-03-20 13:33:19 [https-jsse-nio-443-exec-567] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Constructing Apache XMLSignature object
2026-03-20 13:33:19 [https-jsse-nio-443-exec-567] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding canonicalization and signing algorithms, and HMAC output length to Signature
2026-03-20 13:33:19 [https-jsse-nio-443-exec-567] DEBUG o.o.x.s.impl.SignatureUnmarshaller - Adding KeyInfo to Signature