<ShibbolethTargetConfig xmlns="urn:mace:shibboleth:target:config:1.0"
- logger="@-LOGDIR-@/shibboleth.logger">
+ logger="@-PKGSYSCONFDIR-@/shibboleth.logger" clockSkew="180">
<Extensions>
- <Library path="@-LIBEXECDIR-@/xmlproviders.so" fatal="true"/>
+ <Library path="@-LIBEXECDIR-@/xmlproviders.so" fatal="true"/>
</Extensions>
<SHAR logger="@-PKGSYSCONFDIR-@/shar.logger">
- <Extensions>
- <Library path="@-LIBEXECDIR-@/shib-mysql-ccache.so" fatal="false"/>
- </Extensions>
-
+ <Extensions>
+ <Library path="@-LIBEXECDIR-@/shib-mysql-ccache.so" fatal="false"/>
+ </Extensions>
+
+ <!-- only one listener can be defined. -->
<UnixListener address="/tmp/shar-socket"/>
+ <!-- <TCPListener address="127.0.0.1" port="12345" acl="127.0.0.1"/> -->
+
<!--
- <TCPListener address="127.0.0.1" port="12345" acl="127.0.0.1"/>
+ See deploy guide for details, but:
+ cacheTimeout - how long before expired sessions are purged from the cache
+ AATimeout - how long to wait for an AA to respond
+ AAConnectTimeout - how long to wait while connecting to an AA
+ defaultLifetime - if attributes come back without guidance, how long should they last?
+ strictValidity - if we have expired attrs, and can't get new ones, keep using them?
+ propagateErrors - suppress errors while getting attrs or let user see them?
+ retryInterval - if propagateErrors is false and query fails, how long to wait before trying again
-->
-
<!--
<MemorySessionCache cleanupInterval="300" cacheTimeout="3600" AATimeout="30" AAConnectTimeout="15"
- defaultLifetime="1800" retryInterval="300" strictValidity="true" propagateErrors="false"/>
+ defaultLifetime="1800" retryInterval="300" strictValidity="false" propagateErrors="true"/>
-->
-
<MySQLSessionCache cleanupInterval="300" cacheTimeout="3600" AATimeout="30" AAConnectTimeout="15"
- defaultLifetime="1800" retryInterval="300" strictValidity="true" propagateErrors="false"
- mysqlTimeout="14400">
- <Argument>--language=@-PREFIX-@/share/english</Argument>
- <Argument>--datadir=@-PREFIX-@/data</Argument>
+ defaultLifetime="1800" retryInterval="300" strictValidity="false" propagateErrors="true"
+ mysqlTimeout="14400">
+ <Argument>--language=@-PREFIX-@/share/english</Argument>
+ <Argument>--datadir=@-PREFIX-@/data</Argument>
</MySQLSessionCache>
</SHAR>
<SHIRE logger="@-PKGSYSCONFDIR-@/shire.logger">
- <!-- To customize behavior, map hostnames and path components to application names. -->
- <!-- Can be either a pointer to an external file or an inline configuration. -->
+ <!--
+ To customize behavior, map hostnames and path components to applicationId and other settings.
+ Can be either a pointer to an external file or an inline configuration.
+ -->
<!--
<RequestMapProvider type="edu.internet2.middleware.shibboleth.target.provider.XMLRequestMap"
- uri="@-PKGSYSCONFDIR-@/applications.xml"/>
+ uri="@-PKGSYSCONFDIR-@/applications.xml"/>
-->
- <RequestMap>
- <Host name="example.com" scheme="https">
- <Path name="admin" applicationId="foo-admin" requireSession="true" exportAssertion="true"/>
- </Host>
- </RequestMap>
+ <RequestMapProvider type="edu.internet2.middleware.shibboleth.target.provider.XMLRequestMap">
+ <RequestMap applicationId="default">
+ <!--
+ This requires a session for documents in /secure on the containing host with http and
+ https on the default ports. Note that the name and port in the <Host> elements MUST match
+ Apache's ServerName and Port directives or the IIS Site mapping in the <ISAPI> element
+ below.
+ -->
+ <Host name="localhost" scheme="https">
+ <Path name="secure" requireSession="true" exportAssertion="true"/>
+ </Host>
+ <Host name="localhost" scheme="http">
+ <Path name="secure" requireSession="true" exportAssertion="true"/>
+ </Host>
+ </RequestMap>
+ </RequestMapProvider>
<Implementation>
- <ISAPI>
- <Site InstanceID="1" Host="foo.com"/>
+ <ISAPI normalizeRequest="true">
+ <!-- Maps IIS IID values to the host scheme/name/port. -->
+ <Site id="1" scheme="http" name="localhost" port="80"/>
</ISAPI>
- <Apache apacheConfig="false"/>
</Implementation>
</SHIRE>
- <Applications xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion" providerId="https://wayf.internet2.edu/InQueue/ServiceProvider">
+ <Applications xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion"
+ id="default" providerId="https://example.org/shibboleth/target">
- <!--
- Controls session lifetimes, address checks, cookie handling, WAYF, and the SHIRE location.
- You MUST supply a unique shireURL value for each of your applications. The value can be a
- relative path, a URL with no hostname (https:///path) or a full URL. The system will compute
- the value that applies based on the resource. Using shireSSL="true" will force the protocol
- to be https. You should also add "; secure" to the cookieProps in that case.
- -->
- <Sessions lifetime="7200" timeout="3600" normalizeRequest="true" checkAddress="true"
- shireURL="/Shibboleth.shire" shireSSL="false" cookieName="shib-default-app" cookieProps="; path=/"
- wayfURL="https://wayf.internet2.edu/InQueue/WAYF"/>
+ <!--
+ Controls session lifetimes, address checks, cookie handling, WAYF, and the SHIRE location.
+ You MUST supply a unique shireURL value for each of your applications. The value can be a
+ relative path, a URL with no hostname (https:///path) or a full URL. The system will compute
+ the value that applies based on the resource. Using shireSSL="true" will force the protocol
+ to be https. You should also add "; secure" to the cookieProps in that case.
+ The default wayfURL is the InQueue federation's service. Change to https://localhost/shibboleth/HS
+ for internal testing against your own origin.
+ -->
+ <Sessions lifetime="7200" timeout="3600" checkAddress="true" checkReplay="true"
+ shireURL="/Shibboleth.shire" shireSSL="false" wayfURL="https://wayf.internet2.edu/InQueue/WAYF"/>
- <!-- You should customize the pages! You can add attributes with values that can be plugged in. -->
+ <!-- You should customize the pages! You can add attributes with values that can be plugged in. -->
<Errors shire="@-PKGSYSCONFDIR-@/shireError.html"
- rm="@-PKGSYSCONFDIR-@/rmError.html"
+ rm="@-PKGSYSCONFDIR-@/rmError.html"
access="@-PKGSYSCONFDIR-@/accessError.html"
- supportContact="admin@change.this"
- logoLocation="/logo.gif"/>
+ supportContact="root@localhost"
+ logoLocation="/shibtarget/logo.jpg"
+ styleSheet="/shibtarget/main.css"/>
<Policy signRequest="false" signedResponse="false" signedAssertions="false">
- <!-- use designators to request specific attributes or none to ask for all -->
+ <!-- use designators to request specific attributes or none to ask for all -->
<!--
<saml:AttributeDesignator AttributeName="urn:mace:dir:attribute-def:eduPersonScopedAffiliation"
AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"/>
<!-- Metadata consists of site/operational metadata, trust, revocation providers. Can be external or inline. -->
<FederationProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLMetadata"
- uri="@-PKGSYSCONFDIR-@/sites.xml"/>
- <TrustProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLTrust"
- uri="@-PKGSYSCONFDIR-@/trust.xml"/>
- <!--
- <RevocationProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLRevocation"
- uri="@-PKGSYSCONFDIR-@/trust.xml"/>
- -->
-
- <!--
+ uri="@-PKGSYSCONFDIR-@/sites.xml"/>
<FederationProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLMetadata">
- <SiteGroup Name="urn:mace:inqueue" xmlns="urn:mace:shibboleth:1.0">
- <OriginSite Name="urn:mace:inqueue:example.edu" ErrorURL="http://wayf.internet2.edu/InQueue/error.html">
- <Alias>Example State University</Alias>
- <Contact Type="technical" Name="Alfred E. Neuman" Email="(no email)"/>
- <HandleService Location="https://wayf.internet2.edu/InQueue/HS" Name="wayf.internet2.edu"/>
- <Domain>example.edu</Domain>
- </OriginSite>
- <OriginSite Name="urn:mace:inqueue:shibdev.edu">
- <Alias>Shibboleth Development Origin</Alias>
- <Contact Type="technical" Name="Scott Cantor" Email="cantor.2@osu.edu"/>
- <HandleService Location="https://shib2.internet2.edu/shibboleth/HS" Name="shib2.internet2.edu"/>
- <Domain>shibdev.edu</Domain>
- </OriginSite>
- </SiteGroup>
+ <SiteGroup Name="https://example.org/shibboleth" xmlns="urn:mace:shibboleth:1.0">
+ <OriginSite Name="https://example.org/shibboleth/origin">
+ <Alias>Localhost Test Deployment</Alias>
+ <Contact Type="technical" Name="Your Name Here" Email="root@localhost"/>
+ <HandleService Location="https://localhost/shibboleth/HS" Name="CN=localhost, O=Shibboleth Project, C=US"/>
+ <AttributeAuthority Location="https://localhost/shibboleth/AA" Name="CN=localhost, O=Shibboleth Project, C=US"/>
+ <Domain>localhost</Domain>
+ </OriginSite>
+ </SiteGroup>
</FederationProvider>
+
+ <TrustProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLTrust"
+ uri="@-PKGSYSCONFDIR-@/trust.xml"/>
+ <!--
+ <RevocationProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLRevocation"
+ uri="@-PKGSYSCONFDIR-@/trust.xml"/>
-->
-
- <!-- zero or more SAML Audience condition matches -->
+
+ <!-- zero or more SAML Audience condition matches -->
<saml:Audience>urn:mace:inqueue</saml:Audience>
</Policy>
<CredentialUse TLS="defcreds" Signing="defcreds">
- <!-- RelyingParty elements customize credentials for specific origins or federations -->
- <!--
- <RelyingParty Name="urn:mace:inqueue" TLS="specialcreds" Signing="specialcreds"/>
+ <!-- RelyingParty elements customize credentials for specific origins or federations -->
+ <!--
+ <RelyingParty Name="urn:mace:inqueue" TLS="inqueuecreds" Signing="inqueuecreds"/>
-->
</CredentialUse>
<!-- customize behavior of specific applications -->
<!--
<Application id="foo-admin">
- <Sessions shireURL="https://foo.com/admin/Shibboleth.shire</shireURL" cookieName="shib-foo-admin"/>
+ <Sessions shireURL="https:///admin/Shibboleth.shire"/>
<Policy>
<saml:AttributeDesignator AttributeName="urn:mace:dir:attribute-def:eduPersonPrincipalName"
AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"/>
<!-- Define all your private keys and certificates here. -->
<CredentialsProvider type="edu.internet2.middleware.shibboleth.common.Credentials">
- <Credentials xmlns="urn:mace:shibboleth:credentials:1.0">
- <FileResolver Id="defcreds">
- <Key format="PEM">
- <Path>@-PKGSYSCONFDIR-@/shar.key</Path>
- </Key>
- <Certificate format="PEM">
- <Path>@-PKGSYSCONFDIR-@/shar.crt</Path>
- </Certificate>
- </FileResolver>
-
- <!--
- <FileResolver Id="specialcreds">
- <Key format="PEM">
- <Path>@-PKGSYSCONFDIR-@/supersecret.key</Path>
- </Key>
- <Certificate format="PEM">
- <Path>@-PKGSYSCONFDIR-@/supersecret.crt</Path>
- </Certificate>
- </FileResolver>
- -->
- </Credentials>
- </CredentialsProvider>
+ <Credentials xmlns="urn:mace:shibboleth:credentials:1.0">
+ <FileResolver Id="defcreds">
+ <Key format="PEM">
+ <Path>@-PKGSYSCONFDIR-@/shar.key</Path>
+ </Key>
+ <Certificate format="PEM">
+ <Path>@-PKGSYSCONFDIR-@/shar.crt</Path>
+ </Certificate>
+ </FileResolver>
+
+ <!--
+ <FileResolver Id="inqueuecreds">
+ <Key format="PEM">
+ <Path>@-PKGSYSCONFDIR-@/inqueue.key</Path>
+ </Key>
+ <Certificate format="PEM">
+ <Path>@-PKGSYSCONFDIR-@/inqueue.crt</Path>
+ </Certificate>
+ </FileResolver>
+ -->
+ </Credentials>
+ </CredentialsProvider>
</ShibbolethTargetConfig>