Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Next »

Please follow the steps below to connect your test application to the Shibboleth Test Environment.

Step 1: Determine what type of SAML product you are running

Depending on how you integrate with Shibboleth, the steps for configuration will be different. Typically home grown applications run the Shibboleth Service Provider. Most cloud vendors or SaaS solutions will implement the SAML protocol separately.

Note: Please only perform this in your application test environment and not in production. These changes will only work if your test application is already configured with UCI's Shibboleth IDP. Please complete a Shibboleth Configuration Request if you would like to register your test application.

Shibboleth SP

To determine if your application is running the Shibboleth SP, please performing the following:

Linux

  • Does the default install directory /etc/shibboleth exist?
  • Is the shibd process running?

If the answer is yes to both, please move own to Option 1. If not, please move to Option 2.

Windows

  • Does the default install directory C:\opt\shibboleth-sp\etc\shibboleth exist?
  • Does the Shibboleth SP appear in your Services Management Window?

If the answer is yes to both, please move own to Option 1. If not, please move to Option 2

Step 2: Configuring your SAML SP 

Option 1: Shibboleth SP Software  

Download the Shibboleth Test Environment Metadata

Download the Shibboleth Test Metadata and place it in your shibboleth home directory (/etc/shibboleth or C:\opt\shibboleth-sp\etc\shibboleth).

Update the entityID configuration in your shibboleth2.xml

In your shibboleth2.xml, which is located in your shibboleth home directory there should be a section that looks similar to the below.

            <SSO entityID="urn:mace:incommon:uci.edu">
              SAML2
            </SSO>

If the value of entityID is not "urn:mace:incommon:uci.edu" please go ahead and update that value.

Update the metadata configuration in your shibboleth2.xml

In your shibboleth2.xml, which is located in your shibboleth home directory there should be a section that looks similar to the below.

 

        <MetadataProvider type="XML" validate="true"
                    url="http://md.incommon.org/InCommon/InCommon-metadata-idp-only.xml"
              backingFilePath="InCommon-metadata-idp-only.xml" maxRefreshDelay="7200">
            <MetadataFilter type="RequireValidUntil" maxValidityInterval="2419200"/>
            <MetadataFilter type="Signature" certificate="inc-md-cert.pem" verifyBackup="false"/>
            <DiscoveryFilter type="Blacklist" matcher="EntityAttributes" trimTags="true"
              attributeName="http://macedir.org/entity-category"
              attributeNameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
              attributeValue="http://refeds.org/category/hide-from-discovery" />
        </MetadataProvider>

Comment the code block out and add the following and save your file

        <MetadataProvider type="XML" validate="true" path="metadata.xml"/>

Restart Shibboleth

Restart your Shibboleth process

Test your application

Navigate to your test application and attempt to login. You should be at https://login2.uci.edu.

 

Option 2: Configuring your Cloud/SaaS product using SAML 

Please note that these steps are generic as all Cloud/SaaS solution configurations are slightly different.

Update your entityID

If the value of entityID is not "urn:mace:incommon:uci.edu" please go ahead and update that value.

Update your Shibboleth Metadata

Download the Shibboleth Test Metadata and replace the existing metadata file in your Cloud/SaaS SAML configuration.

Update your endpoints

If your Cloud/SaaS SAML configuration has references to https://shib.service.uci.edu/idp/profile/SAML2/POST/SSO or https://shib.service.uci.edu/idp/profile/SAML2/Redirect/SSO, please replace them with https://shib-staging.service.uci.edu/idp/profile/SAML2/POST/SSO or https://shib-staging.service.uci.edu/idp/profile/SAML2/Redirect/SSO

Test your application

Navigate to your test application and attempt to login. You should be at https://login2.uci.edu.

 

 

  • No labels