- <dd class="value"><p>The <span class="fixed">RelyingParty</span> element is used to specify one or more relying parties that this origin must recognize. This includes any federations the origin is a member of, any targets that have established bilateral agreements with the origin, or any other trust structure that origin must be aware of. In addition to its attributes, this element may contain a <a href="#confHSNameMapping"><span class="fixed">HSNameMapping</span></a> element to specify a naming mechanism for assertions sent to this relying party. The HS and AA both perform validation against federation metadata to ensure that targets cannot construct requests that cause another target's relying party information to be used.</p>
-<p>The proper <span class="fixed">RelyingParty</span> element to handle a given attribute request is selected by the following algorithm. If at any point a match is found, processing is complete; only one relying party will be used for any given request.</p>
-<ol type="1">
-<li>If the requesting provider is unauthenticated -- due to a lack of SSL client authentication because the AA is not protected by an <span class="fixed">https://</span> URL -- the default relying party is always used.</li>
-<li>If the requesting provider is Shibboleth 1.1 or less, the default relying party is used.</li>
-<li>If a <span class="fixed">RelyingParty</span> element's <span class="fixed">providerId</span> attribute matches the name sent by the target, then that element is used.</li>
-<li>A metadata lookup is performed using the <span class="fixed">sites.xml</span> files supplied by <a href="#confFederationProvider"><span class="fixed">FederationProvider</span></a> elements to determine whether the target is a member of a common federation. If there is a <span class="fixed">RelyingParty</span> element that has the same providerId as the URN of the the federation, it is used. If not, the default relying party handles the request.</li>
-</ol>
-<ul>
-<li class="mandatory"><span class="fixed">name</span>: Each <span class="fixed">RelyingParty</span> element is differentiated by a URN specified in the <span class="fixed">name</span> attribute. A target will send a value for this attribute with the attribute request; if the URN sent matches the <span class="fixed">name</span>, this element will be used in the transaction. If there is no direct match, the origin uses metadata to try to find a federation that the service provider is a member of.</li>
-<li><span class="fixed">AAsigningCredential</span>: This attribute must equal the identifier of one of the <a href="#confFileResolver><span class="fixed">FileResolver</span></a> Id's. A separate set of credentials may be specified for the AA's signing of assertions/SSL session identification using this attribute, as opposed to the HS' signing of assertions. If this is not specified for this <span class="fixed">RelyingParty</span> element, but a <span class="fixed">signingCredential</span> attribute is, that set of credentials will be used instead. Ensure that the appropriate signing key is selected for each; an incorrect signing key will lead to trust failures.</li>
-<li><span class="fixed">AAUrl</span>: Different AA's may be specified for different relying parties using this attribute. It over-rides, is populated, and operates in the same manner as the <span class="fixed">AAUrl</span> attribute of the <a href="#confShibbolethOriginConfig"><span class="fixed">ShibbolethOriginConfig</span></a> element.</li>
-<li><span class="fixed">defaultAuthMethod</span>: The value of this attribute represents the mechanism by which the user's authentication was performed. It is used to populate <span class="fixed">authenticationMethod</span> in SAML assertions passed to this relying party if no other authentication method is passed to the HS. For a brief list of authentication methods, consult the same attribute as part of the <a href="#confShibbolethOriginConfig"><span class="fixed">ShibbolethOriginConfig</span></a> element.</li>
-<li><span class="fixed">passThruErrors</span>: This boolean attribute determines whether the origin will relay errors in flows to this target for use in displaying these errors to the browser in the case of an unsuccessful transaction.</li>
-<li><span class="fixed">providerId</span>: If the origin must assert under a different name to this relying party, specify a <span class="fixed">providerId</span> attribute which will over-ride the one specified in <a href="#confShibbolethOriginConfig"><span class="fixed">ShibbolethOriginConfig</span></a>.</li>
-<li><span class="fixed">signAttrAssertions</span>: If this boolean attribute has a value of <span class="fixed">true</span>, the attribute assertion within the SAML response will be signed. This is mostly useful for using the attribute assertion in contexts outside of the response and defaults to <span class="fixed">false</span>.</li>
-<li><span class="fixed">signAttrResponses</span>: If this boolean attribute has a value of <span class="fixed">true</span>, the attribute response itself will be signed in addition to the security and authentication provided by the SSL session. SAML responses contain one or more assertions. Defaults to <span class="fixed">false</span>; if true, an <span class="fixed">https://</span> AAUrl may be redundant.</li>
-<li><span class="fixed">signAuthAssertions</span>: If this boolean attribute has a value of <span class="fixed">true</span>, the authentication assertion within the SAML response will be signed. This is mostly useful for using the authentication assertion in contexts outside of the response and defaults to <span class="fixed">false</span>.</li>
-<li><span class="fixed">signAuthResponses</span>: If this boolean attribute has a value of <span class="fixed">false</span>, the authentication response will not be signed. SAML responses contain one or more assertions. Defaults to <span class="fixed">true</span>.</li>
-<li><span class="fixed">signingCredential</span>: This attribute must equal the identifier of one of the <a href="#confFileResolver><span class="fixed">FileResolver</span></a> Id's. This allows the origin to use different signing keys and certificates for exchanges with different federations or targets. Ensure that the appropriate signing key is selected for each; an incorrect signing key will lead to trust failures.</li>
-</ul>
-</dd>
+ <dd class="value"><p>The <span class="fixed">RelyingParty</span> element
+ is used to specify one or more relying parties that this origin must
+ recognize. This includes any federations the origin is a member of, any
+ targets that have established bilateral agreements with the origin, or
+ any other trust structure that origin must be aware of. In addition to
+ its attributes, this element may contain a <a
+ href="#confHSNameMapping"><span class="fixed">HSNameMapping</span></a>
+ element to specify a naming mechanism for assertions sent to this
+ relying party. The HS and AA both perform validation against federation
+ metadata to ensure that targets cannot construct requests that cause
+ another target's relying party information to be used.</p>
+ <p>The proper <span class="fixed">RelyingParty</span> element to handle
+ a given attribute request is selected by the following algorithm. If at
+ any point a match is found, processing is complete; only one relying
+ party will be used for any given request.</p>
+ <ol type="1">
+ <li>If the requesting provider is unauthenticated -- due to a lack of
+ SSL client authentication because the AA is not protected by an <span
+ class="fixed">https://</span> URL -- the default relying party is
+ always used.</li>
+ <li>If the requesting provider is Shibboleth 1.1 or less, the default
+ relying party is used.</li>
+ <li>If a <span class="fixed">RelyingParty</span> element's <span
+ class="fixed">providerId</span> attribute matches the name sent by the
+ target, then that element is used.</li>
+ <li>A metadata lookup is performed using the <span
+ class="fixed">sites.xml</span> files supplied by <a
+ href="#confFederationProvider"><span
+ class="fixed">FederationProvider</span></a> elements to determine
+ whether the target is a member of a common federation. If there is a
+ <span class="fixed">RelyingParty</span> element that has the same
+ providerId as the URN of the the federation, it is used. If not, the
+ default relying party handles the request.</li>
+ </ol>
+ <ul>
+ <li class="mandatory"><span class="fixed">name</span>: Each <span
+ class="fixed">RelyingParty</span> element is differentiated by a URN
+ specified in the <span class="fixed">name</span> attribute. A target
+ will send a value for this attribute with the attribute request; if
+ the URN sent matches the <span class="fixed">name</span>, this element
+ will be used in the transaction. If there is no direct match, the
+ origin uses metadata to try to find a federation that the service
+ provider is a member of.</li>
+ <li><span class="fixed">AAsigningCredential</span>: This attribute
+ must equal the identifier of one of the <a
+ href="#confFileResolver><span class="fixed">FileResolver</span></a>
+ Id's. A separate set of credentials may be specified for the AA's
+ signing of assertions/SSL session identification using this attribute,
+ as opposed to the HS' signing of assertions. If this is not specified
+ for this <span class="fixed">RelyingParty</span> element, but a <span
+ class="fixed">signingCredential</span> attribute is, that set of
+ credentials will be used instead. Ensure that the appropriate signing
+ key is selected for each; an incorrect signing key will lead to trust
+ failures.</li>
+ <li><span class="fixed">AAUrl</span>: Different AA's may be specified
+ for different relying parties using this attribute. It over-rides, is
+ populated, and operates in the same manner as the <span
+ class="fixed">AAUrl</span> attribute of the <a
+ href="#confShibbolethOriginConfig"><span
+ class="fixed">ShibbolethOriginConfig</span></a> element.</li>
+ <li><span class="fixed">defaultAuthMethod</span>: The value of this
+ attribute represents the mechanism by which the user's authentication
+ was performed. It is used to populate <span
+ class="fixed">authenticationMethod</span> in SAML assertions passed to
+ this relying party if no other authentication method is passed to the
+ HS. For a brief list of authentication methods, consult the same
+ attribute as part of the <a href="#confShibbolethOriginConfig"><span
+ class="fixed">ShibbolethOriginConfig</span></a> element.</li>
+ <li><span class="fixed">passThruErrors</span>: This boolean attribute
+ determines whether the origin will relay errors in flows to this
+ target for use in displaying these errors to the browser in the case
+ of an unsuccessful transaction.</li>
+ <li><span class="fixed">providerId</span>: If the origin must assert
+ under a different name to this relying party, specify a <span
+ class="fixed">providerId</span> attribute which will over-ride the one
+ specified in <a href="#confShibbolethOriginConfig"><span
+ class="fixed">ShibbolethOriginConfig</span></a>.</li>
+ <li><span class="fixed">signAttrAssertions</span>: If this boolean
+ attribute has a value of <span class="fixed">true</span>, the
+ attribute assertion within the SAML response will be signed. This is
+ mostly useful for using the attribute assertion in contexts outside of
+ the response and defaults to <span class="fixed">false</span>.</li>
+ <li><span class="fixed">signAttrResponses</span>: If this boolean
+ attribute has a value of <span class="fixed">true</span>, the
+ attribute response itself will be signed in addition to the security
+ and authentication provided by the SSL session. SAML responses
+ contain one or more assertions. Defaults to <span
+ class="fixed">false</span>; if true, an <span
+ class="fixed">https://</span> AAUrl may be redundant.</li>
+ <li><span class="fixed">signAuthAssertions</span>: If this boolean
+ attribute has a value of <span class="fixed">true</span>, the
+ authentication assertion within the SAML response will be signed.
+ This is mostly useful for using the authentication assertion in
+ contexts outside of the response and defaults to <span
+ class="fixed">false</span>.</li>
+ <li><span class="fixed">signAuthResponses</span>: If this boolean
+ attribute has a value of <span class="fixed">false</span>, the
+ authentication response will not be signed. SAML responses contain
+ one or more assertions. Defaults to <span
+ class="fixed">true</span>.</li>
+ <li><span class="fixed">signingCredential</span>: This attribute must
+ equal the identifier of one of the <a href="#confFileResolver><span
+ class="fixed">FileResolver</span></a> Id's. This allows the origin to
+ use different signing keys and certificates for exchanges with
+ different federations or targets. Ensure that the appropriate signing
+ key is selected for each; an incorrect signing key will lead to trust
+ failures.</li>
+ </ul>
+ </dd>