From a93c356e8a1b2f18ac93b8366a4efc519d2afff2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andreas=20=C3=85kre=20Solberg?= <andreas.solberg@uninett.no> Date: Fri, 17 Oct 2008 12:13:17 +0000 Subject: [PATCH] Added danish metadata for DK WAYF git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@920 44740490-163a-0410-bde0-09ae8108e29a --- metadata-templates/saml20-idp-remote.php | 161 ++++++++++------------- 1 file changed, 70 insertions(+), 91 deletions(-) diff --git a/metadata-templates/saml20-idp-remote.php b/metadata-templates/saml20-idp-remote.php index fc05ee184..ec8efaecf 100644 --- a/metadata-templates/saml20-idp-remote.php +++ b/metadata-templates/saml20-idp-remote.php @@ -5,106 +5,85 @@ * The SAML 2.0 IdP Remote config is used by the SAML 2.0 SP to identify trusted SAML 2.0 IdPs. * */ + +$metadata = array(); - - -$metadata = array( - - 'https://openidp.feide.no' => array( - 'name' => 'Feide RnD OpenIdP', - 'description' => 'Here you can login with your account on Feide RnD OpenID. If you do not already have an account on this identity provider, you can create a new one by following the create new account link and follow the instructions.', - 'SingleSignOnService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SSOService.php', - 'SingleLogoutService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SingleLogoutService.php', - 'certFingerprint' => 'c9ed4dfb07caf13fc21e0fec1572047eb8a7a4cb' +$metadata['https://openidp.feide.no'] = array( + 'name' => array( + 'en' => 'Feide OpenIdP - guest users', + 'no' => 'Feide Gjestebrukere', ), + 'description' => 'Here you can login with your account on Feide RnD OpenID. If you do not already have an account on this identity provider, you can create a new one by following the create new account link and follow the instructions.', + 'send_metadata_email' => 'moria-support@uninett.no', + 'SingleSignOnService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SSOService.php', + 'SingleLogoutService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SingleLogoutService.php', + 'certFingerprint' => 'c9ed4dfb07caf13fc21e0fec1572047eb8a7a4cb' +); - /* - * Example simpleSAMLphp SAML 2.0 IdP - */ - 'idp-entity-id-simple' => array( - 'name' => 'Test', - 'description' => 'Description of this example entry', - - 'SingleSignOnService' => 'https://idp.example.org/simplesaml/saml2/idp/SSOService.php', - 'SingleLogoutService' => 'https://idp.example.org/simplesaml/saml2/idp/SingleLogoutService.php', - 'certFingerprint' => '3fa158e8abfd4b5203315b08c0b791b6ee4715f6' +$metadata['max.feide.no'] = array( + 'name' => array( + 'en' => 'Feide Test environment', + 'no' => 'Feide testmiljø', ), + 'description' => 'Feide test environment (max.feide.no). Authenticate with your identity from a school or university in Norway.', + 'send_metadata_email' => 'moria-support@uninett.no', + 'SingleSignOnService' => 'https://max.feide.no/amserver/SSORedirect/metaAlias/idp', + 'SingleLogoutService' => 'https://max.feide.no/amserver/IDPSloRedirect/metaAlias/idp', + 'certFingerprint' => '5dd3196bdb2fb7e75380fe234a3f4f2d1e8d6d84', + 'base64attributes' => TRUE, + 'hint.cidr' => '158.38.0.0/16' +); - /* - * Example simpleSAMLphp SAML 2.0 IdP - */ - 'idp-entity-id' => array( - 'name' => 'Test', - 'description' => 'Description of this example entry', - - 'SingleSignOnService' => 'https://idp.example.org/simplesaml/saml2/idp/SSOService.php', - 'SingleLogoutService' => 'https://idp.example.org/simplesaml/saml2/idp/SingleLogoutService.php', - 'certFingerprint' => '3fa158e8abfd4b5203315b08c0b791b6ee4715f6', - 'base64attributes' => true, - - /* - * When request.signing is true the certificate of the IdP will be used - * to verify all messages received with the HTTPRedirect binding. - * - * The certificate from the IdP must be installed in the cert directory - * before verification can be done. - */ - 'request.signing' => false, - 'certificate' => "idp.example.org.crt", - - /* - * It is possible to relax some parts of the validation of SAML2 messages. - * To relax a part, add the id to the 'saml2.relaxvalidation' array. - * - * Valid ids: - * - 'unknowncondition' Disables errors when encountering unknown <Condition> nodes. - * - 'nosubject' Ignore missing <Subject> in <Assertion>. - * - 'noconditions' Ignore missing <Conditions> in <Assertion>. - * - 'noauthnstatement' Ignore missing <AuthnStatement> in <Assertion>. - * - 'noattributestatement' Ignore missing <AttributeStatement> in <Assertion>. - * - * Example: - * 'saml2.relaxvalidation' => array('unknowncondition', 'noattributestatement'), - * - * Default: - * 'saml2.relaxvalidation' => array(), - */ - 'saml2.relaxvalidation' => array(), +$metadata['sam.feide.no'] = array( + 'name' => 'Feide', + 'description' => array( + 'en' => 'Authenticate with your identity from a school or university in Norway.', + 'no' => 'Logg inn med din identitet fra skolen eller universitetet du er tilknyttet (i Norge).', + ), + 'send_metadata_email' => 'moria-support@uninett.no', + 'SingleSignOnService' => 'https://sam.feide.no/amserver/SSORedirect/metaAlias/idp', + 'SingleLogoutService' => 'https://sam.feide.no/amserver/IDPSloRedirect/metaAlias/idp', + 'certFingerprint' => 'f6:72:c5:e7:04:fb:86:5e:93:6b:3b:cd:45:b0:49:2e:94:f5:f0:95', + 'base64attributes' => TRUE, + 'hint.cidr' => '158.38.0.0/16' +); +$metadata['https://wayf.wayf.dk'] = array( + 'name' => array( + 'en' => 'DK-WAYF Production server', + 'da' => 'DK-WAYF Produktionsmiljøet', ), + 'description' => 'Login with your identity from a danish school, university or library.', + 'send_metadata_email' => 'sekretariat@wayf.dk', + 'SingleSignOnService' => 'https://wayf.wayf.dk/saml2/idp/SSOService.php', + 'SingleLogoutService' => 'https://wayf.wayf.dk/saml2/idp/SingleLogoutService.php', + 'certFingerprint' => 'c215d7bf9d51c7805055239f66b957d9a72ff44b' +); +$metadata['https://betawayf.wayf.dk'] = array( + 'name' => array( + 'en' => 'DK-WAYF Quality Assurance', + 'da' => 'DK-WAYF Quality Assurance miljøet', + ), + 'description' => 'Login with your identity from a danish school, university or library.', + 'send_metadata_email' => 'sekretariat@wayf.dk', + 'SingleSignOnService' => 'https://betawayf.wayf.dk/saml2/idp/SSOService.php', + 'SingleLogoutService' => 'https://betawayf.wayf.dk/saml2/idp/SingleLogoutService.php', + 'certFingerprint' => 'c215d7bf9d51c7805055239f66b957d9a72ff44b' +); - /* - * Metadata for Feide's test environment. - */ - 'max.feide.no' => array( - 'name' => array( - 'en' => 'Feide Test environment', - 'no' => 'Feide testmiljø', - ), - 'description' => 'Feide test environment (max.feide.no). Authenticate with your identity from a school or university in Norway.', - 'send_metadata_email' => 'moria-support@uninett.no', - 'SingleSignOnService' => 'https://max.feide.no/amserver/SSORedirect/metaAlias/idp', - 'SingleLogoutService' => 'https://max.feide.no/amserver/IDPSloRedirect/metaAlias/idp', - 'certFingerprint' => '5dd3196bdb2fb7e75380fe234a3f4f2d1e8d6d84', - 'base64attributes' => true, - 'hint.cidr' => '158.38.0.0/16' +$metadata['https://testidp.wayf.dk'] = array( + 'name' => array( + 'en' => 'DK-WAYF Test Server', + 'da' => 'DK-WAYF Test Miljøet', ), - - /* - * Metadata for Feide's production environment. - */ - 'sam.feide.no' => array( - 'name' => 'Feide', - 'description' => 'Authenticate with your identity from a school or university in Norway.', - 'send_metadata_email' => 'moria-support@uninett.no', - 'SingleSignOnService' => 'https://sam.feide.no/amserver/SSORedirect/metaAlias/idp', - 'SingleLogoutService' => 'https://sam.feide.no/amserver/IDPSloRedirect/metaAlias/idp', - 'certFingerprint' => 'f6:72:c5:e7:04:fb:86:5e:93:6b:3b:cd:45:b0:49:2e:94:f5:f0:95', - 'base64attributes' => true, - 'hint.cidr' => '158.38.0.0/16' - ) + 'description' => 'Login with your identity from a danish school, university or library.', + 'send_metadata_email' => 'sekretariat@wayf.dk', + 'SingleSignOnService' => 'https://testidp.wayf.dk/saml2/idp/SSOService.php', + 'SingleLogoutService' => 'https://testidp.wayf.dk/saml2/idp/SingleLogoutService.php', + 'certFingerprint' => '04b3b08bce004c27458b3e85b125273e67ef062b' +); + - ); -?> +?> \ No newline at end of file -- GitLab