Skip to content
Snippets Groups Projects
Commit a93c356e authored by Andreas Åkre Solberg's avatar Andreas Åkre Solberg
Browse files

Added danish metadata for DK WAYF

git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@920 44740490-163a-0410-bde0-09ae8108e29a
parent 83981512
No related branches found
No related tags found
No related merge requests found
......@@ -5,106 +5,85 @@
* The SAML 2.0 IdP Remote config is used by the SAML 2.0 SP to identify trusted SAML 2.0 IdPs.
*
*/
$metadata = array();
$metadata = array(
'https://openidp.feide.no' => array(
'name' => 'Feide RnD OpenIdP',
'description' => 'Here you can login with your account on Feide RnD OpenID. If you do not already have an account on this identity provider, you can create a new one by following the create new account link and follow the instructions.',
'SingleSignOnService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SingleLogoutService.php',
'certFingerprint' => 'c9ed4dfb07caf13fc21e0fec1572047eb8a7a4cb'
$metadata['https://openidp.feide.no'] = array(
'name' => array(
'en' => 'Feide OpenIdP - guest users',
'no' => 'Feide Gjestebrukere',
),
'description' => 'Here you can login with your account on Feide RnD OpenID. If you do not already have an account on this identity provider, you can create a new one by following the create new account link and follow the instructions.',
'send_metadata_email' => 'moria-support@uninett.no',
'SingleSignOnService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SingleLogoutService.php',
'certFingerprint' => 'c9ed4dfb07caf13fc21e0fec1572047eb8a7a4cb'
);
/*
* Example simpleSAMLphp SAML 2.0 IdP
*/
'idp-entity-id-simple' => array(
'name' => 'Test',
'description' => 'Description of this example entry',
'SingleSignOnService' => 'https://idp.example.org/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://idp.example.org/simplesaml/saml2/idp/SingleLogoutService.php',
'certFingerprint' => '3fa158e8abfd4b5203315b08c0b791b6ee4715f6'
$metadata['max.feide.no'] = array(
'name' => array(
'en' => 'Feide Test environment',
'no' => 'Feide testmiljø',
),
'description' => 'Feide test environment (max.feide.no). Authenticate with your identity from a school or university in Norway.',
'send_metadata_email' => 'moria-support@uninett.no',
'SingleSignOnService' => 'https://max.feide.no/amserver/SSORedirect/metaAlias/idp',
'SingleLogoutService' => 'https://max.feide.no/amserver/IDPSloRedirect/metaAlias/idp',
'certFingerprint' => '5dd3196bdb2fb7e75380fe234a3f4f2d1e8d6d84',
'base64attributes' => TRUE,
'hint.cidr' => '158.38.0.0/16'
);
/*
* Example simpleSAMLphp SAML 2.0 IdP
*/
'idp-entity-id' => array(
'name' => 'Test',
'description' => 'Description of this example entry',
'SingleSignOnService' => 'https://idp.example.org/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://idp.example.org/simplesaml/saml2/idp/SingleLogoutService.php',
'certFingerprint' => '3fa158e8abfd4b5203315b08c0b791b6ee4715f6',
'base64attributes' => true,
/*
* When request.signing is true the certificate of the IdP will be used
* to verify all messages received with the HTTPRedirect binding.
*
* The certificate from the IdP must be installed in the cert directory
* before verification can be done.
*/
'request.signing' => false,
'certificate' => "idp.example.org.crt",
/*
* It is possible to relax some parts of the validation of SAML2 messages.
* To relax a part, add the id to the 'saml2.relaxvalidation' array.
*
* Valid ids:
* - 'unknowncondition' Disables errors when encountering unknown <Condition> nodes.
* - 'nosubject' Ignore missing <Subject> in <Assertion>.
* - 'noconditions' Ignore missing <Conditions> in <Assertion>.
* - 'noauthnstatement' Ignore missing <AuthnStatement> in <Assertion>.
* - 'noattributestatement' Ignore missing <AttributeStatement> in <Assertion>.
*
* Example:
* 'saml2.relaxvalidation' => array('unknowncondition', 'noattributestatement'),
*
* Default:
* 'saml2.relaxvalidation' => array(),
*/
'saml2.relaxvalidation' => array(),
$metadata['sam.feide.no'] = array(
'name' => 'Feide',
'description' => array(
'en' => 'Authenticate with your identity from a school or university in Norway.',
'no' => 'Logg inn med din identitet fra skolen eller universitetet du er tilknyttet (i Norge).',
),
'send_metadata_email' => 'moria-support@uninett.no',
'SingleSignOnService' => 'https://sam.feide.no/amserver/SSORedirect/metaAlias/idp',
'SingleLogoutService' => 'https://sam.feide.no/amserver/IDPSloRedirect/metaAlias/idp',
'certFingerprint' => 'f6:72:c5:e7:04:fb:86:5e:93:6b:3b:cd:45:b0:49:2e:94:f5:f0:95',
'base64attributes' => TRUE,
'hint.cidr' => '158.38.0.0/16'
);
$metadata['https://wayf.wayf.dk'] = array(
'name' => array(
'en' => 'DK-WAYF Production server',
'da' => 'DK-WAYF Produktionsmiljøet',
),
'description' => 'Login with your identity from a danish school, university or library.',
'send_metadata_email' => 'sekretariat@wayf.dk',
'SingleSignOnService' => 'https://wayf.wayf.dk/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://wayf.wayf.dk/saml2/idp/SingleLogoutService.php',
'certFingerprint' => 'c215d7bf9d51c7805055239f66b957d9a72ff44b'
);
$metadata['https://betawayf.wayf.dk'] = array(
'name' => array(
'en' => 'DK-WAYF Quality Assurance',
'da' => 'DK-WAYF Quality Assurance miljøet',
),
'description' => 'Login with your identity from a danish school, university or library.',
'send_metadata_email' => 'sekretariat@wayf.dk',
'SingleSignOnService' => 'https://betawayf.wayf.dk/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://betawayf.wayf.dk/saml2/idp/SingleLogoutService.php',
'certFingerprint' => 'c215d7bf9d51c7805055239f66b957d9a72ff44b'
);
/*
* Metadata for Feide's test environment.
*/
'max.feide.no' => array(
'name' => array(
'en' => 'Feide Test environment',
'no' => 'Feide testmiljø',
),
'description' => 'Feide test environment (max.feide.no). Authenticate with your identity from a school or university in Norway.',
'send_metadata_email' => 'moria-support@uninett.no',
'SingleSignOnService' => 'https://max.feide.no/amserver/SSORedirect/metaAlias/idp',
'SingleLogoutService' => 'https://max.feide.no/amserver/IDPSloRedirect/metaAlias/idp',
'certFingerprint' => '5dd3196bdb2fb7e75380fe234a3f4f2d1e8d6d84',
'base64attributes' => true,
'hint.cidr' => '158.38.0.0/16'
$metadata['https://testidp.wayf.dk'] = array(
'name' => array(
'en' => 'DK-WAYF Test Server',
'da' => 'DK-WAYF Test Miljøet',
),
/*
* Metadata for Feide's production environment.
*/
'sam.feide.no' => array(
'name' => 'Feide',
'description' => 'Authenticate with your identity from a school or university in Norway.',
'send_metadata_email' => 'moria-support@uninett.no',
'SingleSignOnService' => 'https://sam.feide.no/amserver/SSORedirect/metaAlias/idp',
'SingleLogoutService' => 'https://sam.feide.no/amserver/IDPSloRedirect/metaAlias/idp',
'certFingerprint' => 'f6:72:c5:e7:04:fb:86:5e:93:6b:3b:cd:45:b0:49:2e:94:f5:f0:95',
'base64attributes' => true,
'hint.cidr' => '158.38.0.0/16'
)
'description' => 'Login with your identity from a danish school, university or library.',
'send_metadata_email' => 'sekretariat@wayf.dk',
'SingleSignOnService' => 'https://testidp.wayf.dk/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://testidp.wayf.dk/saml2/idp/SingleLogoutService.php',
'certFingerprint' => '04b3b08bce004c27458b3e85b125273e67ef062b'
);
);
?>
?>
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment