Skip to content
Snippets Groups Projects
Commit 6765b786 authored by Tim van Dijen's avatar Tim van Dijen
Browse files

Update docs

parent 78b782e1
No related branches found
No related tags found
No related merge requests found
SimpleSAMLphp Service Provider QuickStart # SimpleSAMLphp Service Provider QuickStart
=========================================
[TOC] [TOC]
This guide will describe how to configure SimpleSAMLphp as a service provider (SP). You should previously have installed SimpleSAMLphp as described in [the SimpleSAMLphp installation instructions](simplesamlphp-install). This guide will describe how to configure SimpleSAMLphp as a service
provider (SP). You should previously have installed SimpleSAMLphp as
described in the [SimpleSAMLphp installation instructions](installation).
[installation]: simplesamlphp-install
Configuring the SP Configuring the SP
------------------ ------------------
...@@ -21,13 +22,17 @@ $config = [ ...@@ -21,13 +22,17 @@ $config = [
/* This is the name of this authentication source, and will be used to access it later. */ /* This is the name of this authentication source, and will be used to access it later. */
'default-sp' => [ 'default-sp' => [
'saml:SP', 'saml:SP',
'entityID' => 'https://sp1.example.org/',
], ],
]; ];
``` ```
For more information about additional options available for the SP, see the [`saml:SP` reference](./saml:sp). For more information about additional options available for the SP,
see the [`saml:SP` reference](./saml:sp).
If you want multiple Service Providers in the same site and installation, you can add more entries in the `authsources.php` configuration. If so remember to set the EntityID explicitly. Here is an example: If you want multiple Service Providers in the same site and installation,
you can add more entries in the `authsources.php` configuration. If so
remember to set the EntityID explicitly. Here is an example:
```php ```php
'sp1' => [ 'sp1' => [
...@@ -42,13 +47,17 @@ If you want multiple Service Providers in the same site and installation, you ca ...@@ -42,13 +47,17 @@ If you want multiple Service Providers in the same site and installation, you ca
### Enabling a certificate for your Service Provider ### Enabling a certificate for your Service Provider
Some Identity Providers / Federations may require that your Service Providers holds a certificate. If you enable a certificate for your Service Provider, it may be able to sign requests and response sent to the Identity Provider, as well as receiving encrypted responses. Some Identity Providers / Federations may require that your Service Providers
holds a certificate. If you enable a certificate for your Service Provider,
it may be able to sign requests and response sent to the Identity Provider,
as well as receiving encrypted responses.
Create a self-signed certificate in the `cert/` directory. Create a self-signed certificate in the `cert/` directory.
cd cert ```bash
openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out saml.crt -keyout saml.pem cd cert
openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out saml.crt -keyout saml.pem
```
Then edit your `authsources.php` entry, and add references to your certificate: Then edit your `authsources.php` entry, and add references to your certificate:
...@@ -63,8 +72,12 @@ Then edit your `authsources.php` entry, and add references to your certificate: ...@@ -63,8 +72,12 @@ Then edit your `authsources.php` entry, and add references to your certificate:
Adding IdPs to the SP Adding IdPs to the SP
--------------------- ---------------------
The service provider you are configuring needs to know about the identity providers you are going to connect to it. This is configured by metadata stored in `metadata/saml20-idp-remote.php`. The service provider you are configuring needs to know about the identity
This is a minimal example of a `metadata/saml20-idp-remote.php` metadata file: providers you are going to connect to it. This is configured by metadata
stored in `metadata/saml20-idp-remote.php`.
This is a minimal example of a `metadata/saml20-idp-remote.php`
metadata file:
```php ```php
<?php <?php
...@@ -75,20 +88,26 @@ $metadata['https://example.com'] = [ ...@@ -75,20 +88,26 @@ $metadata['https://example.com'] = [
]; ];
``` ```
`example.pem` under your `cert/` directory contains the certificate the identity provider uses for signing assertions. `example.pem` under your `cert/` directory contains the certificate the
identity provider uses for signing assertions.
For more information about available options in the idp-remote metadata files, see the [IdP remote reference](simplesamlphp-reference-idp-remote). For more information about available options in the idp-remote metadata
files, see the [IdP remote reference](simplesamlphp-reference-idp-remote).
If you have the metadata of the remote IdP as an XML file, you can use the built-in XML to SimpleSAMLphp metadata converter, which by default is available as `/admin/metadata-converter.php` in your SimpleSAMLphp installation. If you have the metadata of the remote IdP as an XML file, you can use the
built-in XML to SimpleSAMLphp metadata converter, which by default is
available at `/module.php/admin/federation/metadata-converter` in
your SimpleSAMLphp installation.
Note that the idp-remote file lists all IdPs you trust. You should remove all IdPs that you don't use. Note that the idp-remote file lists all IdPs you trust.
You should remove all IdPs that you don't use.
Setting the default IdP Setting the default IdP
----------------------- -----------------------
An option in the authentication source allows you to configure which IdP should be used. An option in the authentication source allows you to configure which IdP should
This is the `idp` option. be used. This is the `idp` option.
```php ```php
<?php <?php
...@@ -109,36 +128,46 @@ $config = [ ...@@ -109,36 +128,46 @@ $config = [
Exchange metadata with the IdP Exchange metadata with the IdP
------------------------------ ------------------------------
In order to complete the connection between your SP and an IdP, you must exchange the metadata of your SP with the IdP. In order to complete the connection between your SP and an IdP, you must
The metadata of your SP can be found in the *Federation* tab of the web interface. Copy the SAML 2.0 XML Metadata document exchange the metadata of your SP with the IdP. The metadata of your SP can be
automatically generated by SimpleSAMLphp and send it to the administrator of the IdP. You can also send them the dedicated found in the *Federation* tab of the web interface. Copy the SAML 2.0 XML
URL of your metadata, so that they can fetch it periodically and obtain automatically any changes that you may perform to Metadata document automatically generated by SimpleSAMLphp and send it to the
your SP. administrator of the IdP. You can also send them the dedicated URL of your
metadata, so that they can fetch it periodically and obtain automatically any
You will also need to add the metadata of the IdP. Ask them to provide you with their metadata, and parse it using the *XML to changes that you may perform to your SP.
SimpleSAMLphp metadata converter* tool available also in the *Federation* tab of the web interface. Copy the resulting
parsed metadata and paste it with a text editor into the `metadata/saml20-idp-remote.php` file in your SimpleSAMLphp You will also need to add the metadata of the IdP. Ask them to provide you with
directory. their metadata, and parse it using the *XML to SimpleSAMLphp metadata converter*
tool available also in the *Federation* tab of the web interface. Copy the
If you intend to add your SP to a federation, the procedure for managing trust in federations will differ, but the common part is that you would need to provide the *SAML 2.0 metadata of your SP*, and register that with the federation administration. resulting parsed metadata and paste it with a text editor into the
You will probably be required too to consume the federation metadata periodically. Read more about `metadata/saml20-idp-remote.php` file in your SimpleSAMLphp directory.
[automated metadata management](./metarefresh:simplesamlphp-automated_metadata) to learn more about that.
If you intend to add your SP to a federation, the procedure for managing trust
in federations will differ, but the common part is that you would need to
provide the *SAML 2.0 metadata of your SP*, and register that with the
federation administration. You will probably be required too to consume
the federation metadata periodically. Read more about
[automated metadata management](./metarefresh:simplesamlphp-automated_metadata)
to learn more about that.
Test the SP Test the SP
----------------------------- -----------
After the metadata is configured on the IdP, you should be able to test the configuration. After the metadata is configured on the IdP, you should be able to test the
The admin module of SimpleSAMLphp has a tab to test authentication sources. configuration. The admin module of SimpleSAMLphp has a tab to test
There you should a list of authentication sources, including the one you have created for the SP. authentication sources. There you should a list of authentication sources,
including the one you have created for the SP.
After you click the link for that authentication source, you will be redirected to the IdP. After you click the link for that authentication source, you will be
After entering your credentials, you should be redirected back to the test page. redirected to the IdP. After entering your credentials, you should be
redirected back to the test page.
The test page should contain a list of your attributes: The test page should contain a list of your attributes:
![Screenshot of the status page after a user has succesfully authenticated](resources/simplesamlphp-sp/screenshot-example.png) ![Screenshot of the status page after a user has succesfully authenticated](resources/simplesamlphp-sp/screenshot-example.png)
For a better looking, more advanced Discovery Service with tabs and live search, you may want to use the `discopower` module. For a better looking, more advanced Discovery Service with tabs and live
search, you may want to use the `discopower` module.
Integrating authentication with your own application Integrating authentication with your own application
---------------------------------------------------- ----------------------------------------------------
...@@ -154,7 +183,8 @@ lines of PHP code: ...@@ -154,7 +183,8 @@ lines of PHP code:
Example code: Example code:
We start off with loading a file which registers the SimpleSAMLphp classes with the autoloader. We start off with loading a file which registers the SimpleSAMLphp classes
with the autoloader.
```php ```php
require_once('../../src/_autoload.php'); require_once('../../src/_autoload.php');
...@@ -179,7 +209,9 @@ $attributes = $as->getAttributes(); ...@@ -179,7 +209,9 @@ $attributes = $as->getAttributes();
print_r($attributes); print_r($attributes);
``` ```
Each attribute name can be used as an index into $attributes to obtain the value. Every attribute value is an array - a single-valued attribute is an array of a single element. Each attribute name can be used as an index into $attributes to obtain the
value. Every attribute value is an array - a single-valued attribute is an
array of a single element.
We can also request authentication with a specific IdP: We can also request authentication with a specific IdP:
...@@ -190,21 +222,28 @@ $as->login([ ...@@ -190,21 +222,28 @@ $as->login([
``` ```
Other options are also available. Other options are also available.
Take a look in the documentation for the [SP module](./saml:sp) for a list of all parameters. Take a look in the documentation for the [SP module](./saml:sp) for a list
of all parameters.
If we are using PHP sessions in SimpleSAMLphp and in the application we are protecting, SimpleSAMLphp will close any If we are using PHP sessions in SimpleSAMLphp and in the application we are
existing session when invoked for the first time, and its own session will prevail afterwards. If you want to restore protecting, SimpleSAMLphp will close any existing session when invoked for the
your own session after calling SimpleSAMLphp, you can do so by cleaning up the session like this: first time, and its own session will prevail afterwards. If you want to restore
your own session after calling SimpleSAMLphp, you can do so by cleaning up the
session like this:
```php ```php
$session = \SimpleSAML\Session::getSessionFromRequest(); $session = \SimpleSAML\Session::getSessionFromRequest();
$session->cleanup(); $session->cleanup();
``` ```
If you don't cleanup SimpleSAMLphp's session and try to use $_SESSION afterwards, you won't be using your own session If you don't cleanup SimpleSAMLphp's session and try to use $_SESSION
and all your data is likely to get lost or inaccessible. afterwards, you won't be using your own session and all your data is
likely to get lost or inaccessible.
Note that if your application uses a [custom session handler](https://www.php.net/manual/en/function.session-set-save-handler.php), SimpleSAMLphp will use it as well. This can lead to problems because SimpleSAMLphp's stand-alone web UI uses the default PHP session handlers. Therefore, you may need to unset the custom handler before making any calls to SimpleSAMLphp: Note that if your application uses a [custom session handler](https://www.php.net/manual/en/function.session-set-save-handler.php),
SimpleSAMLphp will use it as well. This can lead to problems because
SimpleSAMLphp's stand-alone web UI uses the default PHP session handlers.
Therefore, you may need to unset the custom handler before making any calls to SimpleSAMLphp:
```php ```php
// use custom save handler // use custom save handler
...@@ -229,7 +268,11 @@ session_start(); ...@@ -229,7 +268,11 @@ session_start();
Support Support
------- -------
If you need help to make this work, or want to discuss SimpleSAMLphp with other users of the software, you are fortunate: Around SimpleSAMLphp there is a great Open source community, and you are welcome to join! The forums are open for you to ask questions, contribute answers other further questions, request improvements or contribute with code or plugins of your own. If you need help to make this work, or want to discuss SimpleSAMLphp with other
users of the software, you are fortunate: Around SimpleSAMLphp there is a great
Open source community, and you are welcome to join! The forums are open for you
to ask questions, contribute answers other further questions, request
improvements or contribute with code or plugins of your own.
- [SimpleSAMLphp homepage](https://simplesamlphp.org) - [SimpleSAMLphp homepage](https://simplesamlphp.org)
- [List of all available SimpleSAMLphp documentation](https://simplesamlphp.org/docs/) - [List of all available SimpleSAMLphp documentation](https://simplesamlphp.org/docs/)
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment