Skip to content
Snippets Groups Projects
Unverified Commit 540b529c authored by Thijs Kinkhorst's avatar Thijs Kinkhorst Committed by GitHub
Browse files

Merge pull request #993 from ghalse/patch/openssl-bits

Update OpenSSL RSA bit length in docs
parents 6e84c115 4da9282c
No related branches found
No related tags found
No related merge requests found
...@@ -11,7 +11,7 @@ This is used for SSL client authentication when contacting the IdP. ...@@ -11,7 +11,7 @@ This is used for SSL client authentication when contacting the IdP.
To generate a private key and certificate, you may use the `openssl` commandline utility: To generate a private key and certificate, you may use the `openssl` commandline utility:
openssl req -newkey rsa:2048 -new -x509 -days 3652 -nodes -out sp.example.org.crt -keyout sp.example.org.pem openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out sp.example.org.crt -keyout sp.example.org.pem
You can then add the private key and certificate to the SP configuration. You can then add the private key and certificate to the SP configuration.
When this is done, you can add the metadata of your SP to the IdP, and test the authentication. When this is done, you can add the metadata of your SP to the IdP, and test the authentication.
......
...@@ -42,7 +42,7 @@ Edit `config.php`, and enable the SAML 2.0 IdP: ...@@ -42,7 +42,7 @@ Edit `config.php`, and enable the SAML 2.0 IdP:
You must generate a certificate for your IdP. You must generate a certificate for your IdP.
Here is an example of an openssl command to generate a new key and a self signed certificate to use for signing SAML messages: Here is an example of an openssl command to generate a new key and a self signed certificate to use for signing SAML messages:
openssl req -newkey rsa:2048 -new -x509 -days 3652 -nodes -out googleappsidp.crt -keyout googleappsidp.pem openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out googleappsidp.crt -keyout googleappsidp.pem
The certificate above will be valid for 10 years. The certificate above will be valid for 10 years.
......
...@@ -127,7 +127,7 @@ Here is an example of an `openssl`-command which can be used to generate a new p ...@@ -127,7 +127,7 @@ Here is an example of an `openssl`-command which can be used to generate a new p
This key and certificate can be used to sign SAML messages: This key and certificate can be used to sign SAML messages:
openssl req -newkey rsa:2048 -new -x509 -days 3652 -nodes -out example.org.crt -keyout example.org.pem openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out example.org.crt -keyout example.org.pem
The certificate above will be valid for 10 years. The certificate above will be valid for 10 years.
......
...@@ -50,7 +50,7 @@ Some Identity Providers / Federations may require that your Service Providers ho ...@@ -50,7 +50,7 @@ Some Identity Providers / Federations may require that your Service Providers ho
Create a self-signed certificate in the `cert/` directory. Create a self-signed certificate in the `cert/` directory.
cd cert cd cert
openssl req -newkey rsa:2048 -new -x509 -days 3652 -nodes -out saml.crt -keyout saml.pem openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out saml.crt -keyout saml.pem
Then edit your `authsources.php` entry, and add references to your certificate: Then edit your `authsources.php` entry, and add references to your certificate:
......
...@@ -11,7 +11,7 @@ First you must create the new key that you are going to use. ...@@ -11,7 +11,7 @@ First you must create the new key that you are going to use.
To create a self signed certificate, you may use the following command: To create a self signed certificate, you may use the following command:
cd cert cd cert
openssl req -newkey rsa:2048 -new -x509 -days 3652 -nodes -out new.crt -keyout new.pem openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out new.crt -keyout new.pem
Add the new key to SimpleSAMLphp Add the new key to SimpleSAMLphp
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment