You are not impacted if you meet any of the following criteria:
- You do not use SAML for Enterprise Authentication with the Elastic Runtime Tile or have any service plans using SAML with the Single Sign-On Service Tile.
- You are already using SHA256 or SHA512 for your SAML Signature Algorithm.
- Your Identity Provider does not perform validation of the SAML authentication request signature or accepts more secure protocols than the protocol configured.
- Okta does not validate the signature of SAML authentication requests.
- ADFS appears to accept SHA256 signed authentication requests when SHA1 is configured.
If you have not yet upgraded to PCF 2.0, you can follow the instructions below:
http://docs.pivotal.io/pivotalcf/opsguide/auth-sso.html#configure-saml-for-pcf
https://docs.pivotal.io/p-identity/index.html#sso
If you have already upgraded to PCF 2.0, you can follow the instructions below:
Option 1 - Update your Identity Provider metadata:
http://docs.pivotal.io/pivotalcf/opsguide/auth-sso.html#configure-saml-for-pcf
https://docs.pivotal.io/p-identity/index.html#sso
- You have previously disabled signing of the SAML authentication request on the ERT or SSO configurations and configured a working integration with your Identity Provider.
- You have configured your Identity Provider to dynamically check SAML metadata via an URL, and your Identity Provider dynamically adjusts its expected SAML signature algorithm for authentication requests based upon URL metadata.
- Change your ERT configuration for SAML Signature Algorithm to SHA256 or higher.

- Exchange SAML metadata with your Identity Provider. You can refer to applicable steps via one of the links below:
- Refer to the ERT Guides specific to your Identity Provider.
- Refer to the SSO Guide specific to your Identity Provider.
- Change your Identity Provider’s expected SAML signature algorithm to the SAML Signature Algorithm that you are using for PAS (SHA256 or SHA512)
- For ADFS, the option looks like the picture below:

- For CA Siteminder, the option looks like the picture below:

If you have already upgraded to PCF 2.0, you can follow the instructions below:
Option 1 - Update your Identity Provider metadata:
- Exchange SAML metadata with your Identity Provider. You can refer to applicable steps via one of the links below:
- Refer to the ERT Guides specific to your Identity Provider.
- Refer to the SSO Guide specific to your Identity Provider.
Option 2 - Manually change your Identity Provider’s expected signature algorithm
Option 3 - Disable Signed Authentication Requests
- If your identity provider does not automatically begin accepting the new SHA256 signed authentication requests, move on to option 2.
- Change your Identity Provider’s expected SAML signature algorithm to the SAML Signature Algorithm you are using for PAS (SHA256 or SHA512).
- For ADFS, the option looks like below:

- For CA Siteminder, the option looks like below:

- Disable signing of the requests coming from PAS and SSO.
- For ERT, under Authentication and Enterprise SSO, under the SAML Identity Provider configurations, you can uncheck “Sign Authentication Requests”

- For SSO, within the Service Plan, you can navigate to the “Configure SAML Service Provider” section and turn off “Perform signed authentication requests”

- If your Identity Provider is still attempting to validate the signature even though none is being sent, you can disable validation of signed authentication requests in your Identity Provider’s configurations.
- For ADFS, this is managed through the
`Set-AdfsRelyingPartyTrust -TargetName "<Relying Party Trust Name>" -SignedSamlRequestsRequired $false`
command. You can view the current settings with `Get-AdfsRelyingPartyTrust -Name "<Relying Party Trust Name>"
`

- For CA Siteminder, you can uncheck “Required Signed Authentication Requests” for the applicable partnership.
