1 <?xml version="1.0" encoding="UTF-8"?>
3 <xsd:schema targetNamespace="urn:mace:shibboleth:2.0:idp:profile-handler" xmlns:xsd="http://www.w3.org/2001/XMLSchema"
4 xmlns="urn:mace:shibboleth:2.0:idp:profile-handler" xmlns:service="urn:mace:shibboleth:2.0:services"
5 elementFormDefault="qualified">
7 <xsd:include schemaLocation="classpath:/schema/shibboleth-2.0-profile-handler.xsd" />
9 <xsd:import namespace="urn:mace:shibboleth:2.0:services"
10 schemaLocation="classpath:/schema/shibboleth-2.0-services.xsd" />
14 This schema specifies the configuration options for Shibboleth IdP profile handlers.
18 <xsd:complexType name="IdPProfileHandlerManager">
20 <xsd:documentation>Definition for the basic Shibboleth profile handler manager service.</xsd:documentation>
23 <xsd:extension base="service:ReloadableServiceType" />
27 <xsd:element name="ProfileHandlerGroup">
29 <xsd:documentation>Root of a profile handler configuration file.</xsd:documentation>
33 <xsd:element name="ErrorHandler" type="ErrorHandlerType" />
34 <xsd:element name="ProfileHandler" type="RequestHandlerType" minOccurs="0" maxOccurs="unbounded" />
35 <xsd:element name="AuthenticationHandler" type="AuthenticationHandlerType" minOccurs="0"
36 maxOccurs="unbounded" />
41 <xsd:complexType name="Status">
43 <xsd:documentation>Basic handler that returns a general status of the IdP.</xsd:documentation>
46 <xsd:extension base="RequestURIMappedProfileHandlerType" />
50 <xsd:complexType name="SAML2SSO">
52 <xsd:documentation>Configuration type for SAML 2 SSO profile handlers.</xsd:documentation>
55 <xsd:extension base="SAML2ProfileHandler">
56 <xsd:attribute name="authenticationManagerPath" type="xsd:string" default="/AuthnEngine">
59 The context relative path to the authentication manager used by this profile handler. This
60 should match the URL pattern given in the web.xml
64 <xsd:attribute name="decodingBinding" type="xsd:anyURI"
65 default="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST">
68 The URI of the binding used when decoding requests from relying parties.
72 <xsd:attribute name="securityPolicyFactoryId" type="xsd:string"
73 default="shibboleth.SAML2SSOMessageSecurityPolicyFactory">
76 The component ID of the security policy factory to use with the profile handler.
78 This setting should not be changed from its default unless the deployer fully understands
79 the inter-relationship between IdP components.
83 <xsd:attribute name="outboundBindingEnumeration"
84 default="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST">
87 An ordered list of outbound bindings supported by this profile handler. The order provided
88 establishs the precedence given the bindings such that, from the left to right, the first
89 binding also supported by the relying party will be used.
93 <xsd:list itemType="xsd:anyURI" />
100 <xsd:complexType name="SAML2AttributeQuery">
102 <xsd:documentation>Configuration type for SAML 2 Attribute Query profile handlers.</xsd:documentation>
105 <xsd:extension base="SAML2ProfileHandler">
106 <xsd:attribute name="securityPolicyFactoryId" type="xsd:string"
107 default="shibboleth.SAML2AttributeQueryMessageSecurityPolicyFactory">
110 The component ID of the security policy factory to use with the profile handler.
112 This setting should not be changed from its default unless the deployer fully understands
113 the inter-relationship between IdP components.
118 </xsd:complexContent>
121 <xsd:complexType name="SAML2ProfileHandler" abstract="true">
123 <xsd:documentation>Base type for SAML 2 profile handlers.</xsd:documentation>
126 <xsd:extension base="SAMLProfileHandler" />
127 </xsd:complexContent>
130 <xsd:complexType name="ShibbolethSSO">
132 <xsd:documentation>Configuration type for Shibboleth 1 SSO profile handlers.</xsd:documentation>
135 <xsd:extension base="SAML1ProfileHandler">
136 <xsd:attribute name="authenticationManagerPath" type="xsd:string" default="/AuthnEngine">
139 The context relative path to the authentication manager used by this profile handler. This
140 should match the URL pattern given in the web.xml
144 <xsd:attribute name="outboundBindingEnumeration"
145 default="urn:oasis:names:tc:SAML:1.0:profiles:browser-post">
148 An ordered list of outbound bindings supported by this profile handler. The order provided
149 establishs the precedence given the bindings such that, from the left to right, the first
150 binding also supported by the relying party will be used.
154 <xsd:list itemType="xsd:anyURI" />
158 </xsd:complexContent>
161 <xsd:complexType name="SAML1AttributeQuery">
163 <xsd:documentation>Configuration type for SAML 1 Attribute Query profile handlers.</xsd:documentation>
166 <xsd:extension base="SAML1ProfileHandler">
167 <xsd:attribute name="securityPolicyFactoryId" type="xsd:string"
168 default="shibboleth.SAML1AttributeQueryMessageSecurityPolicyFactory">
171 The component ID of the security policy factory to use with the profile handler.
173 This setting should not be changed from its default unless the deployer fully understands
174 the inter-relationship between IdP components.
179 </xsd:complexContent>
182 <xsd:complexType name="SAML1ProfileHandler" abstract="true">
184 <xsd:documentation>Base type for SAML 1 profile handlers.</xsd:documentation>
187 <xsd:extension base="SAMLProfileHandler" />
188 </xsd:complexContent>
191 <xsd:complexType name="SAMLProfileHandler" abstract="true">
193 <xsd:documentation>Base type for Shibboleth IdP SAML profile handlers.</xsd:documentation>
196 <xsd:extension base="IdPProfileHandlerType">
197 <xsd:attribute name="messageDecoderFactoryId" type="xsd:string"
198 default="shibboleth.MessageDecoderFactory">
201 The component ID of the message decoder to use with the profile handler.
203 This setting should not be changed from its default unless the deployer fully understands
204 the inter-relationship between IdP components.
208 <xsd:attribute name="messageEncoderFactoryId" type="xsd:string"
209 default="shibboleth.MessageEncoderFactory">
212 The component ID of the message encoder to use with the profile handler.
214 This setting should not be changed from its default unless the deployer fully understands
215 the inter-relationship between IdP components.
219 <xsd:attribute name="idGeneratorId" type="xsd:string" default="shibboleth.IdGenerator">
222 The component ID of a generator used to generated things like response and assertion IDs.
224 This setting should not be changed from its default unless the deployer fully understands
225 the inter-relationship between IdP components.
230 </xsd:complexContent>
233 <xsd:complexType name="IdPProfileHandlerType" abstract="true">
235 <xsd:documentation>Base type for IdP profile handlers.</xsd:documentation>
238 <xsd:extension base="ShibbolethProfileHandlerType" />
239 </xsd:complexContent>
242 <xsd:complexType name="RemoteUser">
244 <xsd:extension base="AuthenticationHandlerType">
245 <xsd:attribute name="protectedServletPath" type="xsd:string" default="/Authn/RemoteUser">
248 The servlet context path to the
249 edu.internet2.middleware.shibboleth.idp.authn.provider.RemoteUserAuthServlet instance
250 protected by the container or web server.
255 </xsd:complexContent>
258 <xsd:complexType name="UsernamePassword">
260 <xsd:extension base="AuthenticationHandlerType">
261 <xsd:attribute name="jaasConfigurationLocation" type="xsd:anyURI">
264 Location of the JAAS configuration. If this attribute is used it will usually contain a file
265 URL to a configuration on the local filesystem. However, this attribute need not be used and
266 this information can be set within the VM in any manner supported by the JVM/container
271 <xsd:attribute name="authenticationServletURL" type="xsd:string" default="/Authn/UserPassword">
274 The servlet context path to the
275 edu.internet2.middleware.shibboleth.idp.authn.provider.UsernamePasswordAuthenticationServlet
276 that will authenticate the user.
281 </xsd:complexContent>
284 <xsd:complexType name="AuthenticationHandlerType" abstract="true">
286 <xsd:documentation>Base type for authentication handler types.</xsd:documentation>
289 <xsd:element name="AuthenticationMethod" type="xsd:string" maxOccurs="unbounded">
292 The authentication methods supported by this handler. In SAML these methods represent the SAML 2
293 authentication contexts class and declaration reference URIs.
298 <xsd:attribute name="authenticationDuration" type="xsd:positiveInteger" default="30">
301 The length of time, in minutes, that an authentication performed by this handler should be
302 considered active. After which time a user, previously authenticated by this handler, must
303 re-authenticate in order to assert the authentication method again.