diff --git a/lib/SimpleSAML/Metadata/MetaDataStorageHandlerSAML2Meta.php b/lib/SimpleSAML/Metadata/MetaDataStorageHandlerSAML2Meta.php
index 904a71d4ee445e7b7b5a5edae0d3cc17c2ef13c4..b7f6b5d3d4c4879bb6047dd05e09544dcebaffa2 100644
--- a/lib/SimpleSAML/Metadata/MetaDataStorageHandlerSAML2Meta.php
+++ b/lib/SimpleSAML/Metadata/MetaDataStorageHandlerSAML2Meta.php
@@ -20,13 +20,14 @@ require_once('SimpleSAML/Metadata/MetaDataStorageHandler.php');
 class SimpleSAML_Metadata_MetaDataStorageHandlerSAML2Meta extends SimpleSAML_Metadata_MetaDataStorageHandler {
 
 
-	static var $cachedfiles = array();
+	private static $cachedfiles;
 
 	/* This constructor is included in case it is needed in the the
 	 * future. Including it now allows us to write parent::__construct() in
 	 * the subclasses of this class.
 	 */
 	protected function __construct() {
+		if (!isset($this->cachedfiles)) $this->cachedfiles = array();
 	}
 
 
@@ -57,16 +58,17 @@ class SimpleSAML_Metadata_MetaDataStorageHandlerSAML2Meta extends SimpleSAML_Met
 		$metadatasetfile = $config->getBaseDir() . '' . 
 			$config->getValue('metadatadir') . 'xml/' . $settofile[$set] . '.xml';
 		
-		if (array_key_exists($metadatasetfile, $cachedfiles)) {
-			$metadata = self::$cachedfiles[$metadatasetfile];
+		if (array_key_exists($metadatasetfile, $this->cachedfiles)) {
+			$metadataxml = self::$cachedfiles[$metadatasetfile];
 		} else {
 			if (!file_exists($metadatasetfile)) throw new Exception('Could not find SAML 2.0 Metadata file :'. $metadatasetfile);
 		
 			// for now testing with the shib aai metadata...
 			//$metadataxml = file_get_contents("http://www.switch.ch/aai/federation/SWITCHaai/metadata.switchaai_signed.xml");
-			$metadata = file_get_contents($metadatasetfile);
+			$metadataxml = file_get_contents($metadatasetfile);
+			self::$cachedfiles[$metadatasetfile] = $metadataxml;
 		}
-
+		
 		$metadata = null;
 		switch ($set) {
 			case 'saml20-idp-remote' : $metadata = $this->getmetadata_saml20idpremote($metadataxml); break;
@@ -78,11 +80,16 @@ class SimpleSAML_Metadata_MetaDataStorageHandlerSAML2Meta extends SimpleSAML_Met
 			case 'shib13-sp-remote' : throw new Exception('Meta data parsing for Shib 1.3 SP Remote not yet implemented.');
 			case 'shib13-sp-hosted' : throw new Exception('Meta data parsing for Shib 1.3 SP Hosted not yet implemented.');
 		}
-
 		
 		if (!is_array($metadata)) {
 			throw new Exception('Could not load metadata set [' . $set . '] from file: ' . $metadatasetfile);
 		}
+		
+		echo '<pre>';
+		print_r($metadata);
+		echo '</pre>';
+		exit();
+		
 		foreach ($metadata AS $key => $entry) { 
 			$this->metadata[$set][$key] = $entry;
 			$this->metadata[$set][$key]['entityid'] = $key;
@@ -90,7 +97,6 @@ class SimpleSAML_Metadata_MetaDataStorageHandlerSAML2Meta extends SimpleSAML_Met
 			if (isset($entry['host'])) {
 				$this->hostmap[$set][$entry['host']] = $key;
 			}
-			
 		}
 
 	}
@@ -116,7 +122,24 @@ class SimpleSAML_Metadata_MetaDataStorageHandlerSAML2Meta extends SimpleSAML_Met
 				$metadata[$entityid] = array('entityid' => $entityid);				
 				$metadata_entry = SimpleSAML_XML_Parser::fromSimpleXMLElement($idpentity);
 				
-				$metadata[$entityid]['SingleSignOnService'] = $metadata_entry->getValue("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:SingleSignOnService[@Binding='urn:mace:shibboleth:1.0:profiles:AuthnRequest']/@Location", true);
+				$metadata[$entityid]['SingleSignOnService'] = $metadata_entry->getValue("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:SingleSignOnService[@Binding='urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect']/@Location", true);
+
+				$metadata[$entityid]['SingleLogoutService'] = $metadata_entry->getValue("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:SingleLogoutService[@Binding='urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect']/@Location", true);
+				
+				$metadata[$entityid]['certFingerprint'] = SimpleSAML_Utilities::cert_fingerprint($metadata_entry->getValue("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:KeyDescriptor[@use='signing']/ds:KeyInfo/ds:X509Data/ds:X509Certificate", true));
+				
+				$seek_base64 = $metadata_entry->getValue("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:Extensions/saml2:Attribute[@Name='urn:mace:feide.no:simplesamlphp:base64encode']/saml2:AttributeValue");
+				$metadata[$entityid]['base64encode'] = (isset($seek_base64) ? ($seek_base64 === 'true') : false);
+				
+
+				
+				$metadata[$entityid]['name'] = $metadata_entry->getValueAlternatives(
+					array("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:Extensions/saml2:Attribute[@Name='urn:mace:feide.no:simplesamlphp:name']/saml2:AttributeValue",
+					"/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:Organization/saml2meta:OrganizationDisplayName"
+					));
+					
+				$metadata[$entityid]['description'] = $metadata_entry->getValue("/saml2meta:EntityDescriptor/saml2meta:IDPSSODescriptor/saml2meta:Extensions/saml2:Attribute[@Name='urn:mace:feide.no:simplesamlphp:description']/saml2:AttributeValue");
+												
 
 			} catch (Exception $e) {
 				echo 'Error reading one metadata entry: ' . $e;
@@ -125,6 +148,7 @@ class SimpleSAML_Metadata_MetaDataStorageHandlerSAML2Meta extends SimpleSAML_Met
 		}
 		return $metadata;
 	}
+
 	
 	private function getmetadata_shib13idpremote($metadataxml) {
 		// Create a parser for the metadata document.
diff --git a/lib/SimpleSAML/Utilities.php b/lib/SimpleSAML/Utilities.php
index 8d55afbada2cfd34e80f4e81b8bf406d0b202495..163cc13226a3f67fdb7c1e6bbbed5c9c11996103 100644
--- a/lib/SimpleSAML/Utilities.php
+++ b/lib/SimpleSAML/Utilities.php
@@ -101,6 +101,11 @@ class SimpleSAML_Utilities {
 		return TRUE;
 	}
 	
+	public static function cert_fingerprint($pem) {
+		$x509data = base64_decode( $pem );
+		return strtolower( sha1( $x509data ) );
+	}
+	
 	public static function generateID() {
 	
 		$length = 42;
diff --git a/lib/SimpleSAML/XML/Parser.php b/lib/SimpleSAML/XML/Parser.php
index 9bb82e834fd23293a851fa1932989b495023a42f..f5e88866faf0facb9f7c49946e491f6a7fac9940 100644
--- a/lib/SimpleSAML/XML/Parser.php
+++ b/lib/SimpleSAML/XML/Parser.php
@@ -21,7 +21,11 @@ class SimpleSAML_XML_Parser  {
 	function __construct($xml) {
 		#parent::construct($xml);
 		$this->simplexml = new SimpleXMLElement($xml);
+		
+		$this->simplexml->registerXPathNamespace('saml2',     'urn:oasis:names:tc:SAML:2.0:assertion');
 		$this->simplexml->registerXPathNamespace('saml2meta', 'urn:oasis:names:tc:SAML:2.0:metadata');
+		$this->simplexml->registerXPathNamespace('ds',        'http://www.w3.org/2000/09/xmldsig#');
+		
 	}
 	
 	public static function fromSimpleXMLElement(SimpleXMLElement $element) {
@@ -50,6 +54,15 @@ class SimpleSAML_XML_Parser  {
 		return (string) $result[0];
 	}
 	
+	public function getValueAlternatives(array $xpath, $required = false) {
+		foreach ($xpath AS $x) {
+			$seek = $this->getValue($x);
+			if ($seek) return $seek;
+		}
+		if ($required) throw new Exception('Could not get value from XML document using multiple alternative XPath expressions.');
+			else return null;
+	}
+	
 }
 
 ?>
\ No newline at end of file
diff --git a/www/admin/metadata.php b/www/admin/metadata.php
index 2c354f6d260d9ee037e41eaccb2ff2857a9d2935..1e351eec82396443cc2609debca7d48e245d30b2 100644
--- a/www/admin/metadata.php
+++ b/www/admin/metadata.php
@@ -29,6 +29,7 @@ try {
 		$metalist = $metadata->getList('saml20-sp-hosted');
 		foreach ($metalist AS $entityid => $mentry) {
 			$results[$entityid] = SimpleSAML_Utilities::checkAssocArrayRules($mentry,
+				// TODO: UPDATE Required and optional parameter list
 				array('entityid', 'host', 'spNameQualifier', 'NameIDFormat', 'ForceAuthn'),
 				array('name', 'description')
 			);
@@ -38,6 +39,7 @@ try {
 		$metalist = $metadata->getList('saml20-idp-remote');
 		foreach ($metalist AS $entityid => $mentry) {
 			$results[$entityid] = SimpleSAML_Utilities::checkAssocArrayRules($mentry,
+				// TODO: UPDATE Required and optional parameter list
 				array('entityid', 'host', 'spNameQualifier', 'NameIDFormat', 'ForceAuthn'),
 				array('name', 'description')
 			);
@@ -51,6 +53,7 @@ try {
 		$metalist = $metadata->getList('saml20-idp-hosted');
 		foreach ($metalist AS $entityid => $mentry) {
 			$results[$entityid] = SimpleSAML_Utilities::checkAssocArrayRules($mentry,
+				// TODO: UPDATE Required and optional parameter list
 				array('entityid', 'host', 'spNameQualifier', 'NameIDFormat', 'ForceAuthn'),
 				array('name', 'description')
 			);
@@ -60,6 +63,7 @@ try {
 		$metalist = $metadata->getList('saml20-sp-remote');
 		foreach ($metalist AS $entityid => $mentry) {
 			$results[$entityid] = SimpleSAML_Utilities::checkAssocArrayRules($mentry,
+				// TODO: UPDATE Required and optional parameter list
 				array('entityid', 'host', 'spNameQualifier', 'NameIDFormat', 'ForceAuthn'),
 				array('name', 'description')
 			);