Example configuration uses pem instead of a java keystore for loading credentials.
authorwassa <wassa@ab3bd59b-922f-494d-bb5f-6f0a3c29deca>
Wed, 25 May 2005 20:52:55 +0000 (20:52 +0000)
committerwassa <wassa@ab3bd59b-922f-494d-bb5f-6f0a3c29deca>
Wed, 25 May 2005 20:52:55 +0000 (20:52 +0000)
git-svn-id: https://subversion.switch.ch/svn/shibboleth/java-idp/trunk@1578 ab3bd59b-922f-494d-bb5f-6f0a3c29deca

src/conf/dist.idp.xml

index b626c25..4c1cb86 100644 (file)
        <!-- This configuration section determines the keys/certs to be used when signing SAML assertions -->
        <!-- The credentials listed here are used when referenced within <RelyingParty/> elements above -->
        <Credentials xmlns="urn:mace:shibboleth:credentials:1.0">
-               <KeyStoreResolver Id="inqueue_cred" storeType="JKS">
-                       <Path>$SHIB_HOME$/etc/keystore.jks</Path>
-                       <KeyAlias>example</KeyAlias>
-                       <CertAlias>example</CertAlias>
-                       <StorePassword>example</StorePassword>
-                       <KeyPassword>example</KeyPassword>
-               </KeyStoreResolver>
+               <FileResolver Id="inqueue_cred">
+                       <Key>
+                               <Path>$SHIB_HOME$/etc/idp-example.key</Path>
+                       </Key>
+                       <Certificate>
+                               <Path>$SHIB_HOME$/etc/idp-example.crt</Path>
+                       </Certificate>
+               </FileResolver>
        </Credentials>