Skip to content
Permalink
release
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
Latest commit 85c6ae2 Aug 1, 2016 History
0 contributors

Users who have contributed to this file

92 lines (75 sloc) 4.71 KB
<?xml version="1.0" encoding="UTF-8"?>
<beans xmlns="http://www.springframework.org/schema/beans"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:util="http://www.springframework.org/schema/util"
xmlns:c="http://www.springframework.org/schema/c" xmlns:p="http://www.springframework.org/schema/p"
xmlns:context="http://www.springframework.org/schema/context"
xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd
http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd
http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util.xsd"
default-init-method="initialize"
default-destroy-method="destroy">
<!-- SAML2 -->
<bean id="shibboleth.SAML2.Artifact.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml-soap" />
<bean id="shibboleth.SAML2.Logout.ArtifactServiceIndex" class="java.lang.String"
c:_0="%{idp.artifact.endpointIndex:2}" />
<bean id="shibboleth.SAML2.Logout.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml2-slo" />
<bean id="shibboleth.SAML2.AttributeQuery.ArtifactServiceIndex" class="java.lang.String"
c:_0="%{idp.artifact.endpointIndex:2}" />
<bean id="shibboleth.SAML2.AttributeQuery.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml-soap" />
<bean id="shibboleth.SAML2.BrowserSSO.ArtifactServiceIndex" class="java.lang.String"
c:_0="%{idp.artifact.endpointIndex:2}" />
<bean id="shibboleth.SAML2.BrowserSSO.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml2-sso" />
<bean id="shibboleth.SAML2.ECP.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml2-ecp" />
<!-- SAML2 - Liberty -->
<bean id="shibboleth.SAML2.SSOS.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml2-ssos" /><!-- TODO -->
<!-- SAML1 -->
<bean id="shibboleth.SAML1.Artifact.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml-soap" />
<bean id="shibboleth.SAML1.AttributeQuery.ArtifactServiceIndex" class="java.lang.String"
c:_0="%{idp.artifact.endpointIndex:2}" />
<bean id="shibboleth.SAML1.AttributeQuery.InboundFlowId" class="java.lang.String"
c:_0="security-policy/saml-soap" />
<bean id="shibboleth.SAML1.BrowserSSO.ArtifactServiceIndex" class="java.lang.String"
c:_0="%{idp.artifact.endpointIndex:2}" />
<bean id="shibboleth.SAML1.BrowserSSO.InboundFlowId" class="java.lang.String"
c:_0="security-policy/shibboleth-sso" />
<bean id="shibboleth.MetadataPKIXValidationInformationResolver"
class="net.shibboleth.idp.saml.security.impl.MetadataPKIXValidationInformationResolver"
c:resolver-ref="shibboleth.RoleDescriptorResolver" />
<!-- Trust Engines -->
<bean id="shibboleth.SignatureTrustEngine"
class="org.opensaml.xmlsec.signature.support.impl.ChainingSignatureTrustEngine">
<constructor-arg>
<list>
<bean class="org.opensaml.xmlsec.signature.support.impl.ExplicitKeySignatureTrustEngine"
c:resolver-ref="shibboleth.MetadataCredentialResolver"
c:keyInfoResolver-ref="shibboleth.KeyInfoCredentialResolver" />
<bean class="org.opensaml.xmlsec.signature.support.impl.PKIXSignatureTrustEngine"
c:resolver-ref="shibboleth.MetadataPKIXValidationInformationResolver"
c:keyInfoResolver-ref="shibboleth.KeyInfoCredentialResolver" />
</list>
</constructor-arg>
</bean>
<bean id="shibboleth.X509TrustEngine" class="org.opensaml.security.trust.impl.ChainingTrustEngine">
<constructor-arg>
<list>
<bean class="org.opensaml.security.trust.impl.ExplicitKeyTrustEngine"
c:resolver-ref="shibboleth.MetadataCredentialResolver" />
<bean class="org.opensaml.security.x509.impl.PKIXX509CredentialTrustEngine"
c:resolver-ref="shibboleth.MetadataPKIXValidationInformationResolver" />
</list>
</constructor-arg>
</bean>
<!--
This bean isn't used, but is required in order to allow SignatureValidationFilters in a legacy
config to be parsed (and then ignored).
-->
<bean id="shibboleth.MetadataSignatureValidationStaticCriteria"
class="net.shibboleth.idp.profile.spring.relyingparty.metadata.filter.impl.SignatureValidationCriteriaSetFactoryBean" />
</beans>