+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-
-<!-- A single-entity "Federation". An IdP and SP in example.org.
- Endpoints are hosted on a single server named shibboleth.example.org
- and have a URL like: "http://shibboleth.example.org:8080/shibboleth/SSO"
-
- Notes:
- This file must agree with IdP.xml and SP.xml.
- The Endpoint URLs must agree with Servlet mappings in web.xml
- [in the project source, web.xml is webAppConfig/IdP-SP.xml]
--->
-
-<!-- A single Entity Federation (a Group with one member) -->
-<EntitiesDescriptor
- xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
- xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
- xsi:schemaLocation="urn:oasis:names:tc:SAML:2.0:metadata ../schemas/sstc-saml-schema-metadata-2.0.xsd urn:mace:shibboleth:metadata:1.0 ../schemas/shibboleth-metadata-1.0.xsd"
- Name="urn:mace:inqueue"
- validUntil="2010-01-01T00:00:00Z">
-
- <!-- Then Entity, an organization named example.org -->
- <EntityDescriptor entityID="urn:mace:inqueue:example.org">
-
- <!-- The login function of the IdP, previously called the "Handle Server"
- Accepts a local logon and generates an Authentication Assertion.
- -->
- <IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0">
- <Extensions>
- <shib:Scope xmlns:shib="urn:mace:shibboleth:metadata:1.0">example.org</shib:Scope>
- </Extensions>
- <KeyDescriptor use="signing">
- <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
- <ds:KeyName>shibboleth.example.org</ds:KeyName>
- </ds:KeyInfo>
- </KeyDescriptor>
- <NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</NameIDFormat>
- <SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest"
- Location="http://shibboleth.example.org:8080/shibboleth/SSO"/>
- </IDPSSODescriptor>
-
- <!-- The Attribute Authority responds to an Attribute Request -->
- <AttributeAuthorityDescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol">
- <Extensions>
- <shib:Scope xmlns:shib="urn:mace:shibboleth:metadata:1.0">example.org</shib:Scope>
- </Extensions>
- <AttributeService Binding="urn:oasis:names:tc:SAML:1.0:bindings:SOAP-binding"
- Location="http://shibboleth.example.org:8080/shibboleth/AA"/>
- <NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</NameIDFormat>
- </AttributeAuthorityDescriptor>
-
- <!-- A recipient of Assertions in the SP.
- There may be many such recipients, as the Assertions can be
- configured to go to /shibboleth or to each Resource context directory.
- -->
- <SPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol">
- <KeyDescriptor>
- <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
- <ds:KeyName>shibboleth.example.org</ds:KeyName>
- </ds:KeyInfo>
- </KeyDescriptor>
- <NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</NameIDFormat>
- <AssertionConsumerService index="0"
- Binding="urn:oasis:names:tc:SAML:1.0:profiles:browser-post"
- Location="http://shibboleth.example.org:8080/shibboleth/Shibboleth.shire"/>
- </SPSSODescriptor>
-
- <!-- Oranization data. In this example it is meaningless. -->
- <Organization>
- <OrganizationName xml:lang="en">Example Entity</OrganizationName>
- <OrganizationDisplayName xml:lang="en">Example Entity</OrganizationDisplayName>
- <OrganizationURL xml:lang="en">http://www.example.org</OrganizationURL>
- </Organization>
- <ContactPerson contactType="technical">
- <SurName>Example Support</SurName>
- <EmailAddress>supportguy@mail.example.org</EmailAddress>
- </ContactPerson>
-
- </EntityDescriptor>
-
-</EntitiesDescriptor>
+++ /dev/null
-<SiteGroup Name="https://example.org/shibboleth" xmlns="urn:mace:shibboleth:1.0">
-
- <!--
- The following are origin and target definitions for example installations
- that can be run together on the same box after installation.
-
- The Name attributes that contain what look like URLs are just identifiers.
- The reserved "example.org" value will only work in private testing or against
- sample installations.
-
- The Location attributes have to be valid for your installation so if you want
- to use actual hostnames or change where your software lives, just modify as needed.
-
- Once you join a federation or establish trust with another installation, you will
- use (or be given in signed form) similar metadata to describe and locate sites
- and services.
-
- <OriginSite> elements are used by all versions of the Shibboleth target software
- and WAYF to determine the set of origins to accept users from and related information
- about the names of certificates they will use.
-
- <DestinationSite> elements are used by Shibboleth 1.2 origin site software to
- "verify" incoming requests from 1.2 targets. 1.1 targets are handled in a
- compatibility mode by treating the request in accordance with the
- defaultRelyingParty value. Additionally, 1.2 targets that cannot be matched to
- a known DestinationSite are also treated in this fashion.
- -->
-
- <OriginSite Name="https://example.org/shibboleth/origin">
- <Alias>Localhost Test Deployment</Alias>
- <Contact Type="technical" Name="Your Name Here" Email="root@localhost"/>
- <HandleService Location="https://localhost/shibboleth/HS" Name="CN=localhost, O=Shibboleth Project, C=US"/>
- <AttributeAuthority Location="https://localhost/shibboleth/AA" Name="CN=localhost, O=Shibboleth Project, C=US"/>
- <Domain>localhost</Domain>
- </OriginSite>
-
- <DestinationSite Name="https://example.org/shibboleth/target">
- <Alias>Localhost Test Deployment</Alias>
- <Contact Type="technical" Name="Your Name Here" Email="root@localhost"/>
- <AssertionConsumerServiceURL Location="https://localhost/Shibboleth.shire"/>
- <AttributeRequester Name="CN=localhost, O=Shibboleth Project, C=US"/>
- </DestinationSite>
-</SiteGroup>
+++ /dev/null
------BEGIN CERTIFICATE-----
-MIICtjCCAh+gAwIBAgIBADANBgkqhkiG9w0BAQQFADA+MQswCQYDVQQGEwJVUzEb
-MBkGA1UEChMSU2hpYmJvbGV0aCBQcm9qZWN0MRIwEAYDVQQDEwlsb2NhbGhvc3Qw
-HhcNMDQwMzI5MDIyMTIxWhcNMzEwODE1MDIyMTIxWjA+MQswCQYDVQQGEwJVUzEb
-MBkGA1UEChMSU2hpYmJvbGV0aCBQcm9qZWN0MRIwEAYDVQQDEwlsb2NhbGhvc3Qw
-gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANlZ1L1mKzYbUVKiMQLhZlfGDyYa
-/jjCiaXP0WhLNgvJpOTeajvsrApYNnFX5MLNzuC3NeQIjXUNLN2Yo2MCSthBIOL5
-qE5dka4z9W9zytoflW1LmJ8vXpx8Ay/meG4z//J5iCpYVEquA0xl28HUIlownZUF
-7w7bx0cF/02qrR23AgMBAAGjgcMwgcAwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0E
-HxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFJZiO1qs
-yAyc3HwMlL9pJpN6fbGwMGYGA1UdIwRfMF2AFJZiO1qsyAyc3HwMlL9pJpN6fbGw
-oUKkQDA+MQswCQYDVQQGEwJVUzEbMBkGA1UEChMSU2hpYmJvbGV0aCBQcm9qZWN0
-MRIwEAYDVQQDEwlsb2NhbGhvc3SCAQAwDQYJKoZIhvcNAQEEBQADgYEAtc1nWrwY
-Mc1aGcpfBGP6Exx2oOLs6k5GU+nOMN6j8PbJiGKNtmUvW7IL4o5tiSYcLqtQ/jVD
-n3rFsCeDaO+1Qa8+3JBFqfhchC5Jh73C8yqCGeo9QbXyyJRY/sCxU4YjqJz/z/hW
-o/72FFuLImOT2CUdJ/FonPKo2w0NhOTP4Hc=
------END CERTIFICATE-----
+++ /dev/null
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDZWdS9Zis2G1FSojEC4WZXxg8mGv44womlz9FoSzYLyaTk3mo7
-7KwKWDZxV+TCzc7gtzXkCI11DSzdmKNjAkrYQSDi+ahOXZGuM/Vvc8raH5VtS5if
-L16cfAMv5nhuM//yeYgqWFRKrgNMZdvB1CJaMJ2VBe8O28dHBf9Nqq0dtwIDAQAB
-AoGAKsaVKdlLs9BYhuzIvIpju+6M2LEDS2Rt9qYZzm7O6i77NtfXDIgdq8OEo3Xq
-3bPnfS5Retl8DYdURyBdN4Uh+WR/BUWQjBvOaJLEEdxvuAaLyAjniVREwkc2rXTZ
-xoYYFL/XMyAEt/ye2ZbTw2u5R2i7HCYdddZWMkP1+Vabg8ECQQD7VJXWy8KFiyeC
-thJiVqG/h5IO0y25dId/n81sW2B55eK0c4+IVsqc0a45/U/y2y1wtNBmIEQQn9yY
-pDtWwzVRAkEA3WOgmvxFGTI5V1K5CLCCZzQIUYpzQDQvBu2sKYuy8dK2BMEGe9Zw
-cKVyZJuDKHBvrVI5G6CqkHuFD2PwDvwAhwJBAPdfbM/q4/4/VddAz918uV1j2a2/
-y3yDJq7GIhHp6o5wZ3AHYhnmmyw48YxgOGWntxT80zYBwhy+zAhtdX5TStECQEKL
-drP/TfnD2e6Ag/Ozso642iNAXWIYDWakvBIE1rXPYzzMlFlW3JdPc7H/+I2INlk/
-lMDUK1CggB9fJ8IpRzMCQQDQmqpWZtH6eaMAN6b/9WBdVzqzpCeTWFlL/SwhVbzI
-s+k2zvC4HEAK9Y199g6SHVTQMEAE49wfhhCpY0JdCsQ/
------END RSA PRIVATE KEY-----