1 <?xml version="1.0" encoding="UTF-8"?>
3 <xsd:schema targetNamespace="urn:mace:shibboleth:2.0:idp:profile-handler" xmlns:xsd="http://www.w3.org/2001/XMLSchema"
4 xmlns="urn:mace:shibboleth:2.0:idp:profile-handler" xmlns:service="urn:mace:shibboleth:2.0:services"
5 elementFormDefault="qualified">
7 <xsd:include schemaLocation="classpath:/schema/shibboleth-2.0-profile-handler.xsd" />
9 <xsd:import namespace="urn:mace:shibboleth:2.0:services"
10 schemaLocation="classpath:/schema/shibboleth-2.0-services.xsd" />
14 This schema specifies the configuration options for Shibboleth IdP profile handlers.
18 <xsd:complexType name="IdPProfileHandlerManager">
20 <xsd:documentation>Definition for the basic Shibboleth profile handler manager service.</xsd:documentation>
23 <xsd:extension base="service:ReloadableServiceType" />
27 <xsd:element name="ProfileHandlerGroup">
29 <xsd:documentation>Root of a profile handler configuration file.</xsd:documentation>
33 <xsd:element name="ErrorHandler" type="ErrorHandlerType" />
34 <xsd:element name="ProfileHandler" type="RequestHandlerType" minOccurs="0" maxOccurs="unbounded" />
35 <xsd:element name="AuthenticationHandler" type="AuthenticationHandlerType" minOccurs="0"
36 maxOccurs="unbounded" />
41 <xsd:complexType name="Status">
43 <xsd:documentation>Basic handler that returns a general status of the IdP.</xsd:documentation>
46 <xsd:extension base="RequestURIMappedProfileHandlerType" />
50 <xsd:complexType name="SAML2SSO">
52 <xsd:documentation>Configuration type for SAML 2 Attribute Query profile handlers.</xsd:documentation>
55 <xsd:extension base="SAML2ProfileHandler">
56 <xsd:attribute name="authenticationManagerPath" type="xsd:string" default="/AuthnManager">
59 The context relative path to the authentication manager used by this profile handler. This
60 should match the URL pattern given in the web.xml
64 <xsd:attribute name="decodingBinding" type="xsd:anyURI"
65 default="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST">
68 The URI of the binding used when decoding requests from relying parties.
72 <xsd:attribute name="securityPolicyFactoryId" type="xsd:string"
73 default="shibboleth.SAML2SSOMessageSecurityPolicyFactory">
76 The component ID of the security policy factory to use with the profile handler.
78 This setting should not be changed from its default unless the deployer fully understands
79 the inter-relationship between IdP components.
87 <xsd:complexType name="SAML2AttributeQuery">
89 <xsd:documentation>Configuration type for SAML 2 Attribute Query profile handlers.</xsd:documentation>
92 <xsd:extension base="SAML2ProfileHandler">
93 <xsd:attribute name="securityPolicyFactoryId" type="xsd:string"
94 default="shibboleth.SAML2AttributeQueryMessageSecurityPolicyFactory">
97 The component ID of the security policy factory to use with the profile handler.
99 This setting should not be changed from its default unless the deployer fully understands
100 the inter-relationship between IdP components.
105 </xsd:complexContent>
108 <xsd:complexType name="SAML2ProfileHandler" abstract="true">
110 <xsd:documentation>Base type for SAML 2 profile handlers.</xsd:documentation>
113 <xsd:extension base="SAMLProfileHandler" />
114 </xsd:complexContent>
117 <xsd:complexType name="SAML1AttributeQuery">
119 <xsd:documentation>Configuration type for SAML 1 Attribute Query profile handlers.</xsd:documentation>
122 <xsd:extension base="SAML1ProfileHandler" />
123 </xsd:complexContent>
126 <xsd:complexType name="SAML1ProfileHandler" abstract="true">
128 <xsd:documentation>Base type for SAML 1 profile handlers.</xsd:documentation>
131 <xsd:extension base="SAMLProfileHandler" />
132 </xsd:complexContent>
135 <xsd:complexType name="SAMLProfileHandler" abstract="true">
137 <xsd:documentation>Base type for Shibboleth IdP SAML profile handlers.</xsd:documentation>
140 <xsd:extension base="IdPProfileHandlerType">
141 <xsd:attribute name="messageDecoderFactoryId" type="xsd:string"
142 default="shibboleth.MessageDecoderFactory">
145 The component ID of the message decoder to use with the profile handler.
147 This setting should not be changed from its default unless the deployer fully understands
148 the inter-relationship between IdP components.
152 <xsd:attribute name="messageEncoderFactoryId" type="xsd:string"
153 default="shibboleth.MessageEncoderFactory">
156 The component ID of the message encoder to use with the profile handler.
158 This setting should not be changed from its default unless the deployer fully understands
159 the inter-relationship between IdP components.
163 <xsd:attribute name="idGeneratorId" type="xsd:string" default="shibboleth.IdGenerator">
166 The component ID of a generator used to generated things like response and assertion IDs.
168 This setting should not be changed from its default unless the deployer fully understands
169 the inter-relationship between IdP components.
174 </xsd:complexContent>
177 <xsd:complexType name="IdPProfileHandlerType" abstract="true">
179 <xsd:documentation>Base type for IdP profile handlers.</xsd:documentation>
182 <xsd:extension base="ShibbolethProfileHandlerType" />
183 </xsd:complexContent>
186 <xsd:complexType name="RemoteUser">
188 <xsd:extension base="AuthenticationHandlerType">
189 <xsd:attribute name="protectedServletPath" type="xsd:string" default="/Authn/RemoteUser">
192 The servlet context path to the
193 edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserAuthServlet instance
194 protected by the container or web server.
199 </xsd:complexContent>
202 <xsd:complexType name="AuthenticationHandlerType" abstract="true">
204 <xsd:documentation>Base type for authentication handler types.</xsd:documentation>
207 <xsd:element name="AuthenticationMethod" type="xsd:string" maxOccurs="unbounded">
210 The authentication methods supported by this handler. In SAML these methods represent the SAML 2
211 authentication contexts class and declaration reference URIs.
216 <xsd:attribute name="authenticationDuration" type="xsd:positiveInteger" default="30">
219 The length of time, in minutes, that an authentication performed by this handler should be
220 considered active. After which time a user, previously authenticated by this handler, must
221 re-authenticate in order to assert the authentication method again.