Changes between Version 13 and Version 14 of SpSetup
- Timestamp:
- 05/14/15 16:31:44 (10 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
SpSetup
v13 v14 124 124 If the computed fingerprints match the actual fingerprints, you are done. You may now safely use the certificate to verify the signature on the metadata file. 125 125 }}} 126 127 2.3 Set SP to find an IdP; within shibboleth2.xml 128 129 A simple case is for your service to rely on (just) the UA IdP; that is, the SP will redirect users' browser to the UA IdP for authentication and attributes: 130 {{{ 131 <SSO entityID="urn:mace:incommon:alaska.edu" 132 discoveryProtocol="SAMLDS" discoveryURL="https://ds.example.org/DS/WAYF"> 133 SAML2 SAML1 134 </SSO> 135 136 137 }}} 138 139 Setting up for federated access to your service - allowing users to choose from among a list of different Identity Providers - is outside the scope of this document. 140 See https://wiki.shibboleth.net/confluence/display/SHIB2/DiscoveryService 141 126 142 3. Setup EntityID for SP. Note the entityID for the SP is _NOT_ a URL. It is a unique string that identifies your SP and is usually based off of the hostname of the system. It may also be a CNAME for the system. 127 143 * Linux: … … 133 149 [root@idmt-1 shibboleth]# vi shibboleth2.xml 134 150 <!-- The ApplicationDefaults element is where most of Shibboleth's SAML bits are defined. --> 135 <ApplicationDefaults entityID=" https://idmt-1.alaska.edu/shibboleth"151 <ApplicationDefaults entityID="{entityid of your service}" 136 152 REMOTE_USER="eppn persistent-id targeted-id"> 137 153