1 <?xml version="1.0" encoding="UTF-8"?>
3 <!-- Test SP configuration file for Example State University
4 There is one Metadata Entity: urn:mace:inqueue:example.org
5 It has both IdP and SP Roles.
6 It has one server: //shibboleth.example.org:8080
7 The endpoints are in the /shibboleth context on the server
10 Must agreed with referenced external ExampleMetadata file.
11 Endpoints must agree with Servlet mappings in web.xml
12 Certificates must be generated for these names
13 The "hosts" file maps shibboleth.example.org to 127.0.0.1
16 <ShibbolethTargetConfig xmlns="urn:mace:shibboleth:target:config:1.0"
17 logger="/conf/shibboleth.logger"
21 <TCPListener address="127.0.0.1" port="1600" acl="127.0.0.1"/>
22 <MemorySessionCache cleanupInterval="300" cacheTimeout="3600" AATimeout="30" AAConnectTimeout="15"
23 defaultLifetime="1800" retryInterval="300" strictValidity="false" propagateErrors="true"/>
27 <RequestMapProvider type="edu.internet2.middleware.shibboleth.serviceprovider.XMLRequestMap">
28 <RequestMap applicationId="default">
29 <Host name="shibboleth.example.org" scheme="https">
30 <Path name="secure" requireSession="true" exportAssertion="true" />
32 <Host name="shibboleth.example.org" port="8080" scheme="http">
33 <Path name="secure" requireSession="true" exportAssertion="true"/>
39 <Applications xmlns:saml="urn:oasis:names:tc:SAML:1.0:assertion"
40 id="default" providerId="http://shibboleth.example.org/shibboleth">
43 Controls session lifetimes, address checks, cookie handling, WAYF, and the SHIRE location.
44 You MUST supply a unique shireURL value (and a wayfURL that can be the same) for each of your
45 applications. The value can be a relative path, a URL with no hostname (https:///path) or a
46 full URL. The system will compute the value that applies based on the resource. Using
47 shireSSL="true" will force the protocol to be https. You should also add a cookieProps
48 setting of "; secure" in that case. The default wayfURL is the InQueue federation's service.
49 Change to https://localhost/shibboleth/HS for internal testing against your own origin.
51 <Sessions lifetime="7200" timeout="3600" checkAddress="true"
52 wayfURL="http://shibboleth.example.org:8080/shibboleth/HS"
53 shireURL="http://shibboleth.example.org:8080/shibboleth/Shibboleth.shire"
57 You should customize these pages! You can add attributes with values that can be plugged
60 <Errors shire="shibboleth/shireError.html"
61 rm="shibboleth/rmError.html"
62 access="shibboleth/accessError.html"
63 supportContact="root@localhost"
64 logoLocation="/shibboleth/logo.jpg"
65 styleSheet="/shibboleth/main.css"/>
67 <!-- Indicates what credentials to use when communicating -->
68 <CredentialUse TLS="defcreds" Signing="defcreds">
69 <!-- RelyingParty elements customize credentials for specific origins or federations -->
71 <RelyingParty Name="urn:mace:inqueue" TLS="inqueuecreds" Signing="inqueuecreds"/>
75 <saml:AttributeDesignator AttributeName="urn:mace:dir:attribute-def:eduPersonScopedAffiliation"
76 AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"/>
77 <saml:AttributeDesignator AttributeName="urn:mace:dir:attribute-def:eduPersonTargetedID"
78 AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"/>
80 <!-- AAP can be inline or in a separate file -->
81 <AAPProvider type="edu.internet2.middleware.shibboleth.serviceprovider.XMLAAP"
84 <!-- Metadata consists of site/operational metadata, trust, revocation providers. Can be external or inline. -->
85 <FederationProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLMetadata"
86 uri="/conf/ExampleMetadata.xml"/>
89 Revocation using X.509 CRLs is an optional feature in some trust metadata or you may
90 supply your own revocation information locally.
93 <RevocationProvider type="edu.internet2.middleware.shibboleth.common.provider.XMLRevocation"
94 uri="/conf/IQ-trust.xml"/>
97 <!-- zero or more SAML Audience condition matches -->
98 <saml:Audience>urn:mace:shibdev</saml:Audience>
103 <!-- Define all the private keys and certificates here that you reference from <CredentialUse>. -->
104 <CredentialsProvider type="edu.internet2.middleware.shibboleth.common.Credentials">
105 <Credentials xmlns="urn:mace:shibboleth:credentials:1.0">
106 <FileResolver Id="defcreds">
108 <Path>/conf/localhost.key</Path>
110 <Certificate format="PEM">
111 <Path>/conf/localhost.crt</Path>
115 </CredentialsProvider>
117 </ShibbolethTargetConfig>