1 <?xml version="1.0" encoding="UTF-8"?>
3 <xsd:schema targetNamespace="urn:mace:shibboleth:2.0:idp:profile-handler" xmlns:xsd="http://www.w3.org/2001/XMLSchema"
4 xmlns="urn:mace:shibboleth:2.0:idp:profile-handler" xmlns:service="urn:mace:shibboleth:2.0:services"
5 elementFormDefault="qualified">
7 <xsd:include schemaLocation="classpath:/schema/shibboleth-2.0-profile-handler.xsd" />
9 <xsd:import namespace="urn:mace:shibboleth:2.0:services"
10 schemaLocation="classpath:/schema/shibboleth-2.0-services.xsd" />
14 This schema specifies the configuration options for Shibboleth IdP profile handlers.
18 <xsd:complexType name="IdPProfileHandlerManager">
20 <xsd:documentation>Definition for the basic Shibboleth profile handler manager service.</xsd:documentation>
23 <xsd:extension base="service:ReloadableServiceType" />
27 <xsd:element name="ProfileHandlerGroup">
29 <xsd:documentation>Root of a profile handler configuration file.</xsd:documentation>
33 <xsd:element name="ErrorHandler" type="ErrorHandlerType" />
34 <xsd:element name="ProfileHandler" type="RequestHandlerType" minOccurs="0" maxOccurs="unbounded" />
35 <xsd:element name="LoginHandler" type="LoginHandlerType" minOccurs="0"
36 maxOccurs="unbounded" />
41 <xsd:complexType name="Status">
43 <xsd:documentation>Basic handler that returns a general status of the IdP.</xsd:documentation>
46 <xsd:extension base="RequestURIMappedProfileHandlerType" />
50 <xsd:complexType name="SAML2SSO">
52 <xsd:documentation>Configuration type for SAML 2 SSO profile handlers.</xsd:documentation>
55 <xsd:extension base="SAML2ProfileHandler">
56 <xsd:attribute name="authenticationManagerPath" type="xsd:string" default="/AuthnEngine">
59 The context relative path to the authentication manager used by this profile handler. This
60 should match the URL pattern given in the web.xml
68 <xsd:complexType name="SAML2AttributeQuery">
70 <xsd:documentation>Configuration type for SAML 2 Attribute Query profile handlers.</xsd:documentation>
73 <xsd:extension base="SAML2ProfileHandler" />
77 <xsd:complexType name="SAML2ProfileHandler" abstract="true">
79 <xsd:documentation>Base type for SAML 2 profile handlers.</xsd:documentation>
82 <xsd:extension base="SAMLProfileHandler" />
86 <xsd:complexType name="ShibbolethSSO">
88 <xsd:documentation>Configuration type for Shibboleth 1 SSO profile handlers.</xsd:documentation>
91 <xsd:extension base="SAML1ProfileHandler">
92 <xsd:attribute name="authenticationManagerPath" type="xsd:string" default="/AuthnEngine">
95 The context relative path to the authentication manager used by this profile handler. This
96 should match the URL pattern given in the web.xml
101 </xsd:complexContent>
104 <xsd:complexType name="SAML1AttributeQuery">
106 <xsd:documentation>Configuration type for SAML 1 Attribute Query profile handlers.</xsd:documentation>
109 <xsd:extension base="SAML1ProfileHandler" />
110 </xsd:complexContent>
113 <xsd:complexType name="SAML1ProfileHandler" abstract="true">
115 <xsd:documentation>Base type for SAML 1 profile handlers.</xsd:documentation>
118 <xsd:extension base="SAMLProfileHandler" />
119 </xsd:complexContent>
122 <xsd:complexType name="SAMLProfileHandler" abstract="true">
124 <xsd:documentation>Base type for Shibboleth IdP SAML profile handlers.</xsd:documentation>
127 <xsd:extension base="IdPProfileHandlerType">
128 <xsd:attribute name="idGeneratorId" type="xsd:string" default="shibboleth.IdGenerator">
131 The component ID of a generator used to generated things like response and assertion IDs.
133 This setting should not be changed from its default unless the deployer fully understands
134 the inter-relationship between IdP components.
138 <xsd:attribute name="inboundBinding" type="xsd:anyURI" use="required">
141 The SAML message binding used by inbound messages.
145 <xsd:attribute name="outboundBindingEnumeration" >
148 An ordered list of outbound bindings supported by this profile handler. The order provided
149 establishes the precedence given the bindings such that, from the left to right, the first
150 binding also supported by the relying party will be used.
154 <xsd:list itemType="xsd:anyURI" />
158 </xsd:complexContent>
161 <xsd:complexType name="IdPProfileHandlerType" abstract="true">
163 <xsd:documentation>Base type for IdP profile handlers.</xsd:documentation>
166 <xsd:extension base="ShibbolethProfileHandlerType" />
167 </xsd:complexContent>
170 <xsd:complexType name="RemoteUser">
172 <xsd:extension base="LoginHandlerType">
173 <xsd:attribute name="protectedServletPath" type="xsd:string" default="/Authn/RemoteUser">
176 The servlet context path to the
177 edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserAuthServlet instance
178 protected by the container or web server.
183 </xsd:complexContent>
186 <xsd:complexType name="UsernamePassword">
188 <xsd:extension base="LoginHandlerType">
189 <xsd:attribute name="jaasConfigurationLocation" type="xsd:anyURI">
192 Location of the JAAS configuration. If this attribute is used it will usually contain a file
193 URL to a configuration on the local filesystem. However, this attribute need not be used and
194 this information can be set within the VM in any manner supported by the JVM/container
199 <xsd:attribute name="authenticationServletURL" type="xsd:string" default="/Authn/UserPassword">
202 The servlet context path to the
203 edu.internet2.middleware.shibboleth.idp.authn.provider.UsernamePasswordAuthenticationServlet
204 that will authenticate the user.
209 </xsd:complexContent>
212 <xsd:complexType name="LoginHandlerType" abstract="true">
214 <xsd:documentation>Base type for authentication handler types.</xsd:documentation>
217 <xsd:element name="AuthenticationMethod" type="xsd:string" maxOccurs="unbounded">
220 The authentication methods supported by this handler. In SAML these methods represent the SAML 2
221 authentication contexts class and declaration reference URIs.
226 <xsd:attribute name="authenticationDuration" type="xsd:positiveInteger" default="30">
229 The length of time, in minutes, that an authentication performed by this handler should be
230 considered active. After which time a user, previously authenticated by this handler, must
231 re-authenticate in order to assert the authentication method again.