Skip to content

Commit dfabc2d

Browse files
authored
Remove limitation for SAML encryption in FIPS mode (#48948) (#49022)
Our documentation regarding FIPS 140 claimed that when using SAML in a JVM that is configured in FIPS approved only mode, one could not use encrypted assertions. This stemmed from a wrong understanding regarding the compliance of RSA-OAEP which is used as the key wrapping algorithm for encrypting the key with which the SAML Assertion is encrypted. However, as stated for instance in https://downloads.bouncycastle.org/fips-java/BC-FJA-SecurityPolicy-1.0.0.pdf RSA-OAEP is approved for key transport, so this limitation is not effective. This change removes the limitation from our FIPS 140 related documentation.
1 parent a0a484a commit dfabc2d

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

x-pack/docs/en/security/fips-140-compliance.asciidoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,5 +124,3 @@ features are not available while running in fips mode. The list is as follows:
124124
available.
125125
* The SQL CLI client cannot run in a FIPS 140-2 enabled JVM while using
126126
TLS for transport security or PKI for client authentication.
127-
* The SAML Realm cannot decrypt and consume encrypted Assertions or encrypted
128-
attributes in Attribute Statements from the SAML IdP.

0 commit comments

Comments
 (0)