Solved

Thumbprint SAML .. How to create one

Posted on 2014-11-18
4
229 Views
Last Modified: 2014-11-19
I created a C# Web Application which uses SAML.

<keys>
            <add thumbprint="5635c661a1e77a0f4a46abd3234678631869"/>
          </keys>

Open in new window


The application contains this line. How can i generate my own thumbprint key?
Do i need the HTTPS certificate for this? Is the SAML thumbprint a property of the HTTPS certificate?

Thanks in advanced
0
Comment
Question by:A. Amien
  • 2
4 Comments
 
LVL 79

Accepted Solution

by:
David Johnson, CD, MVP earned 250 total points
ID: 40451480
It is the thumbprint of the Certificate you are using
0
 
LVL 62

Assisted Solution

by:btan
btan earned 250 total points
ID: 40451529
if you have the https cert.pem, you can get from openssl e.g. openssl x509 -in cert.pem -sha1 -noout -fingerprint (assuming it is sha1 for digest) or you can simply see and verify the thumbprint in the Certificate Information window for the .cer or .crt file in the web service
0
 

Author Comment

by:A. Amien
ID: 40451790
Thanks for the replies

This is the same thumbprint which can be found in IE? Tools --> Internet Options -> Certificates
0
 
LVL 62

Expert Comment

by:btan
ID: 40452226
Yes, the IE options leads you to the cert store where you can click on the certificate, see the "Details" > "Field" named "Thumbprint" and the "Thumbprint Algorithm"
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Botnet detection help me please 21 115
How to take over, control, & secure a network 9 81
md5 password 3 61
php extract($_REQUEST) 5 47
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
The purpose of this video is to demonstrate how to set up the WordPress backend so that each page automatically generates a Mailchimp signup form in the sidebar. This will be demonstrated using a Windows 8 PC. Tools Used are Photoshop, Awesome…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question