diff --git a/www/saml2/idp/SingleLogoutService.php b/www/saml2/idp/SingleLogoutService.php index e34a3f8ef43325cd073060c93d3071e7f0b373db..acec6b53f675c0c7c6b7d74531bc7cf8a386b149 100644 --- a/www/saml2/idp/SingleLogoutService.php +++ b/www/saml2/idp/SingleLogoutService.php @@ -276,46 +276,6 @@ if ($config->getBoolean('debug', false)) -/* Check whether we should authenticate with an AuthSource. Any time the auth-option matches a - * valid AuthSource, we assume that this is the case. - */ -$auth = $idpMetadata->getString('auth'); -if(SimpleSAML_Auth_Source::getById($idpMetadata->getString('auth')) !== NULL) { - /* Authenticate with an AuthSource. */ - $authSource = TRUE; - $authority = $idpmetadata['auth']; -} else { - $authSource = FALSE; - $authority = SimpleSAML_Utilities::getAuthority($idpmetadata); -} - -/** - * If there exists a local valid session with the SAML 2.0 module as an authority, - * initiate SAML 2.0 SP Single LogOut, with the RelayState equal this URL. - */ -if ($session->getAuthority() == 'saml2') { - - $bridgedId = SimpleSAML_Utilities::generateID(); - $returnTo = SimpleSAML_Utilities::selfURLNoQuery() . '?LogoutID=' . $bridgedId; - - /* Save the $logoutInfo until we return from the SP. */ - saveLogoutInfo($bridgedId); - - SimpleSAML_Utilities::redirect('/' . $config->getBaseURL() . 'saml2/sp/initSLO.php', - array('RelayState' => $returnTo) - ); -} - -if ($session->getAuthority() == 'shib13') { - /** - * TODO: Show warning to inform the user that he is logged on through an Shibboleth 1.3 IdP that - * do not support logout. - */ -} - - - - /* * Logout procedure is done and we send a Logout Response back to the SP */