Page History
...
Location in zip file | Location on SP | Description |
---|---|---|
sso/apache/sp-metadata.xml-sample |
– as long as your Apache configuration sets | To be shared dynamically with your site's IdP (i.e. make it available as a document at the document root and share that URL with your IdP's maintainers/admins); or omit from the SP's (i.e. your) web server, and instead share it securely with the IdP admins whenever it changes (if it does) In either case, populate the entityID, public key certificate, and consumer service location with yours. |
sso/shibboleth/shibboleth2.xml-sample | /etc/shibboleth/shibboleth2.xml | Populate the entityID attribute in Populate the entityID attribute in Populate the The The private key should be stored in a "safe" location. If it is password-protected, that should be reflected in the |
sso/shibboleth/attribute-map.xml-sample | /etc/shibboleth/attribute-map.xml | Populate the idP's attribute name for the user; to be mapped to the attribute id "userId" |
sso/apache/sp.conf-sample | /etc/httpd/conf.d/sp.conf | Populate the |
sso/tomcat/server.xml-sample | /opt/shrine/tomcat/conf/server.xml | Most likely the following 3 attributes of You will need to populate Once done, Merge the contents of |
|
| Set Shrine configuration options for using SSO for login/logout. In
You should use either file and merge it into the existing |
Next Steps:
Fast forward to SHRINE 4.0.0 Appendix A.8 - Starting and Stopping the Software
or
Read the "More Details" pages that follow, starting with SHRINE 4.0.0 Appendix A.3 - More Details : Shibboleth Configurationor jump to SHRINE 4.0.0 Appendix A.8 - Starting and Stopping the Software