You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+68Lines changed: 68 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,6 +143,9 @@ Or also we can provide those data in the setting file at the 'x509cert' and the
143
143
144
144
Sometimes we could need a signature on the metadata published by the SP, in this case we could use the x.509 cert previously mentioned or use a new x.509 cert: metadata.crt and metadata.key.
145
145
146
+
Use `sp_new.crt` if you are in a key rollover process and you want to
147
+
publish that x509certificate on Service Provider metadata.
148
+
146
149
If you want to create self-signed certs, you can do it at the https://www.samltool.com/self_signed_certs.php service, or using the command:
147
150
148
151
```bash
@@ -253,6 +256,15 @@ This is the settings.json file:
253
256
// the certs folder. But we can also provide them with the following parameters
254
257
"x509cert":"",
255
258
"privateKey":""
259
+
260
+
/*
261
+
* Key rollover
262
+
* If you plan to update the SP x509cert and privateKey
263
+
* you can define here the new x509cert and it will be
264
+
* published on the SP metadata so Identity Providers can
265
+
* read them and get ready for rollover.
266
+
*/
267
+
// 'x509certNew': '',
256
268
},
257
269
258
270
// Identity Provider Data that we want connected with our SP.
@@ -296,6 +308,22 @@ This is the settings.json file:
296
308
*/
297
309
// "certFingerprint": "",
298
310
// "certFingerprintAlgorithm": "sha1",
311
+
312
+
/* In some scenarios the IdP uses different certificates for
313
+
* signing/encryption, or is under key rollover phase and
314
+
* more than one certificate is published on IdP metadata.
315
+
* In order to handle that the toolkit offers that parameter.
316
+
* (when used, 'x509cert' and 'certFingerprint' values are
317
+
* ignored).
318
+
*/
319
+
// 'x509certMulti': {
320
+
// 'signing': [
321
+
// '<cert1-string>'
322
+
// ],
323
+
// 'encryption': [
324
+
// '<cert2-string>'
325
+
// ]
326
+
// }
299
327
}
300
328
}
301
329
```
@@ -449,6 +477,23 @@ json_data_file.close()
449
477
auth = OneLogin_Saml2_Auth(req, settings_data)
450
478
```
451
479
480
+
#### Metadata Based Configuration
481
+
482
+
The method above requires a little extra work to manually specify attributes about the IdP. (And your SP application)
483
+
484
+
There's an easier method -- use a metadata exchange. Metadata is just an XML file that defines the capabilities of both the IdP and the SP application. It also contains the X.509 public key certificates which add to the trusted relationship. The IdP administrator can also configure custom settings for an SP based on the metadata.
485
+
486
+
Using ````parse_remote```` IdP metadata can be obtained and added to the settings withouth further ado.
If the Metadata contains several entities, the relevant EntityDescriptor can be specified when retrieving the settings from the IdpMetadataParser by its Entity Id value:
0 commit comments