</RequestMapper>
<!--
- The Applications element is where most of Shibboleth's SAML bits are defined.
+ The ApplicationDefaults element is where most of Shibboleth's SAML bits are defined.
Resource requests are mapped by the RequestMapper to an applicationId that
points into to this section.
-->
- <Applications id="default" policyId="default" entityID="https://sp.example.org/shibboleth"
+ <ApplicationDefaults id="default" policyId="default"
+ entityID="https://sp.example.org/shibboleth"
homeURL="https://sp.example.org/index.html"
REMOTE_USER="eppn persistent-id targeted-id"
- localLogout="@-PKGSYSCONFDIR-@/localLogout.html"
- globalLogout="@-PKGSYSCONFDIR-@/globalLogout.html
- authType="TLS"
- artifactEndpointIndex="1"
- signing="false"
- encryption="false"
- requireConfidentiality="true"
- requireTransportAuth="true"
- signedAssertions="false"
- chunkedEncoding="false"
- connectTimeout="15" timeout="30"
+ signing="false" encryption="false"
>
<!--
metadata="@-PKGSYSCONFDIR-@/metadataError.html"
access="@-PKGSYSCONFDIR-@/accessError.html"
ssl="@-PKGSYSCONFDIR-@/sslError.html"
+ localLogout="@-PKGSYSCONFDIR-@/localLogout.html"
+ globalLogout="@-PKGSYSCONFDIR-@/globalLogout.html"
supportContact="root@localhost"
logoLocation="/shibboleth-sp/logo.jpg"
styleSheet="/shibboleth-sp/main.css"/>
</Certificate>
</CredentialResolver>
- <!-- Advanced resolver allowing for multiple keypairs. -->
- <!--
- <CredentialResolver type="Chaining">
- <CredentialResolver type="File">
- <Key>
- <Name>DefaultKey</Name>
- <Path>@-PKGSYSCONFDIR-@/sp-example.key</Path>
- </Key>
- <Certificate>
- <Path>@-PKGSYSCONFDIR-@/sp-example.crt</Path>
- </Certificate>
- </CredentialResolver>
- <CredentialResolver type="File">
- <Key>
- <Name>SpecialKey</Name>
- <Path>@-PKGSYSCONFDIR-@/special.key</Path>
- </Key>
- <Certificate>
- <Path>@-PKGSYSCONFDIR-@/special.crt</Path>
- </Certificate>
- </CredentialResolver>
- </CredentialResolver>
- -->
-
</Applications>
<!-- Each policy defines a set of rules to use to secure messages. -->