Changes between Version 13 and Version 14 of SpSetup


Ignore:
Timestamp:
05/14/15 16:31:44 (10 years ago)
Author:
dabantz@…
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • SpSetup

    v13 v14  
    124124If the computed fingerprints match the actual fingerprints, you are done. You may now safely use the certificate to verify the signature on the metadata file. 
    125125}}} 
     126 
     1272.3 Set SP to find an IdP; within shibboleth2.xml 
     128 
     129A simple case is for your service to rely on (just) the UA IdP; that is, the SP will redirect users' browser to the UA IdP for authentication and attributes: 
     130{{{ 
     131            <SSO entityID="urn:mace:incommon:alaska.edu" 
     132                 discoveryProtocol="SAMLDS" discoveryURL="https://ds.example.org/DS/WAYF"> 
     133              SAML2 SAML1 
     134            </SSO> 
     135 
     136 
     137}}} 
     138 
     139Setting up for federated access to your service - allowing users to choose from among a list of different Identity Providers - is outside the scope of this document. 
     140See https://wiki.shibboleth.net/confluence/display/SHIB2/DiscoveryService 
     141 
    126142 3. Setup EntityID for SP. Note the entityID for the SP is _NOT_ a URL. It is a unique string that identifies your SP and is usually based off of the hostname of the system. It may also be a CNAME for the system. 
    127143  * Linux: 
     
    133149[root@idmt-1 shibboleth]# vi shibboleth2.xml 
    134150    <!-- The ApplicationDefaults element is where most of Shibboleth's SAML bits are defined. --> 
    135     <ApplicationDefaults entityID="https://idmt-1.alaska.edu/shibboleth" 
     151    <ApplicationDefaults entityID="{entityid of your service}" 
    136152                         REMOTE_USER="eppn persistent-id targeted-id"> 
    137153