For a Shibboleth Identity Provider to join one of the Tuakiri Federations (Test/Dev or Pilot/Production), the following steps have to be done:
There will be two federations available:
Federation name |
Tuakiri |
Tuakiri TEST |
---|---|---|
Metadata name |
|
|
Metadata distribution point |
https://directory.tuakiri.ac.nz/metadata/metadata-tuakiri.signed.xml |
https://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-signed.xml |
Metadata signing certificate |
https://directory.tuakiri.ac.nz/metadata/tuakiri-metadata-cert.pem |
https://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-cert.pem |
Federation Registry URL |
||
Discovery Service / WAYF URL |
Go to the respecting Federation Registry URL and:
https://idp.example.org
)$IDP_HOME/credentials/idp.pem
).urn:oasis:names:tc:SAML:2.0:nameid-format:transient
is already selected. If supporting SAML1, select also urn:mace:shibboleth:1.0:nameIdentifier
.The code snippets in this section have values for Tuakiri TEST/DEV federation. Please update them accordingly as per the table above - which boils down to removing the "test" component from the file names / URLs in all of the cases.
NOTE: Check what your IdP home directory is: the directory is typically called shibboleth-idp
- and on Debian and Ubuntu systems, it's commonly /usr/local/shibboleth-idp
, while on RedHat and CentOS it's /opt/shibboleth-idp
. The snippets below are referring to the IdP home directory as $IDP_HOME
$IDP_HOME/credentials
:
wget http://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-cert.pem -O $IDP_HOME/credentials/tuakiri-test-metadata-cert.pem |
$IDP_HOME/conf/relying-party.xml
ChainingMetadataProvider
:
<!-- Tuakiri Test --> <metadata:MetadataProvider id="Tuakiri-TEST" xsi:type="FileBackedHTTPMetadataProvider" xmlns="urn:mace:shibboleth:2.0:metadata" metadataURL="http://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-signed.xml" backingFile="/usr/local/shibboleth-idp/metadata/tuakiri-test-metadata.xml"> <metadata:MetadataFilter xsi:type="ChainingFilter" xmlns="urn:mace:shibboleth:2.0:metadata"> <metadata:MetadataFilter xsi:type="SignatureValidation" xmlns="urn:mace:shibboleth:2.0:metadata" trustEngineRef="shibboleth.MetadataTrustEngine" requireSignedMetadata="true" /> </metadata:MetadataFilter> </metadata:MetadataProvider> |
<security:TrustEngine id="shibboleth.MetadataTrustEngine" xsi:type="security:StaticExplicitKeySignature">
element:
<security:Credential id="Tuakiri-Test-FederationCredentials-" xsi:type="security:X509Filesystem"> <security:Certificate>/usr/local/shibboleth-idp/credentials/tuakiri-test-metadata-cert.pem</security:Certificate> </security:Credential> |
Remember to uncomment the |
http://directory.test.tuakiri.ac.nz/attribute-filter/<institution-domain>.xml |
<srv:Service id="shibboleth.AttributeFilterEngine"
in $IDP_HOME/conf/service.xml
(note that the URL varies for each IdP and has to be obtained from the federation administrators):
<srv:ConfigurationResource xsi:type="resource:FileBackedHttpResource" url="http://directory.test.tuakiri.ac.nz/attribute-filter/<institution-domain>.xml" file="/opt/shibboleth-idp/conf/tuakiri-test-attribute-filter.xml" /> |
Note: if your |
configurationResourcePollingFrequency="PT2H0M0.000S"
and configurationResourcePollingRetryAttempts="10"
attributes to the <srv:Service id="shibboleth.AttributeFilterEngine"
element.
<srv:Service id="shibboleth.AttributeFilterEngine" + configurationResourcePollingFrequency="PT2H0M0.000S" configurationResourcePollingRetryAttempts="10" xsi:type="attribute-afp:ShibbolethAttributeFilteringEngine"> |
Now your IdP should be able to access service provides within the Tuakiri (Test/Dev) federation.