I am processing a SAML2 token in a WIF that contains EncryptedAssertion. The markup does NOT contain the Subject Identification Key property, and as such the WIF SecurityTokenHandler fails because it is trying to get the correct X509 certificate from LocalMachineStore / Personal.
Obviously, the certificate used to encrypt the token does not contain the SKI extension, and, of course, the token generation code (Java) does not seem to require it. To avoid the need to change the generation code, is there a way to force WIF SecuityTokenResolver to NOT check the received token for SKI, but just use the local storage certificate directly to decrypt the token?
source share