diff --git a/conf/attribute-filter.xml b/conf/attribute-filter.xml index f8c41ba..9b49de0 100644 --- a/conf/attribute-filter.xml +++ b/conf/attribute-filter.xml @@ -13,7 +13,9 @@ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="urn:mace:shibboleth:2.0:afp http://shibboleth.net/schema/idp/shibboleth-afp.xsd"> + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/conf/attribute-resolver.xml b/conf/attribute-resolver.xml index d752e07..b23a80c 100644 --- a/conf/attribute-resolver.xml +++ b/conf/attribute-resolver.xml @@ -36,40 +36,28 @@ - - - - + + + + + + + + + + + + + + + + - - - + + - - uid - - - - - - - @@ -82,5 +70,21 @@ member + + + + + + givenName sn displayName mail uid + diff --git a/conf/authn/krb5-authn-config.xml b/conf/authn/krb5-authn-config.xml index d3590a2..3230134 100644 --- a/conf/authn/krb5-authn-config.xml +++ b/conf/authn/krb5-authn-config.xml @@ -21,10 +21,10 @@ The keytab bean must be an absolute file pathname and not a reference to a classpath resource, so if idp.home is not a path, don't use it in the value. --> - + + + + diff --git a/conf/authn/password-authn-config.xml b/conf/authn/password-authn-config.xml index f27051b..48b2c3d 100644 --- a/conf/authn/password-authn-config.xml +++ b/conf/authn/password-authn-config.xml @@ -14,8 +14,8 @@ - - + + diff --git a/conf/idp.properties b/conf/idp.properties index 7d45f69..1f32c81 100644 --- a/conf/idp.properties +++ b/conf/idp.properties @@ -2,7 +2,7 @@ idp.additionalProperties= /conf/ldap.properties, /conf/saml-nameid.properties, /conf/services.properties, /conf/authn/duo.properties # Set the entityID of the IdP -idp.entityID= https://idp-dev.testbed.tier.internet2.edu/idp/shibboleth +idp.entityID= https://idp.testbed.tier.internet2.edu/idp/shibboleth # Set the scope used in the attribute resolver for scoped attributes idp.scope= testbed.tier.internet2.edu @@ -26,8 +26,8 @@ idp.scope= testbed.tier.internet2.edu #idp.sealer.aliasBase = secret idp.sealer.storeResource= %{idp.home}/credentials/sealer.jks idp.sealer.versionResource= %{idp.home}/credentials/sealer.kver -idp.sealer.storePassword= Gr34tPass! -idp.sealer.keyPassword= Gr34tPass! +idp.sealer.storePassword= changeit +idp.sealer.keyPassword= changeit # Settings for public/private signing and encryption key(s) # During decryption key rollover, point the ".2" properties at a second diff --git a/conf/ldap.properties b/conf/ldap.properties index 37b270e..6d75df0 100644 --- a/conf/ldap.properties +++ b/conf/ldap.properties @@ -5,9 +5,9 @@ #idp.authn.LDAP.authenticator = anonSearchAuthenticator ## Connection properties ## -idp.authn.LDAP.ldapURL = ldap://localhost:10389 -#idp.authn.LDAP.useStartTLS = true -#idp.authn.LDAP.useSSL = false +idp.authn.LDAP.ldapURL = ldap://ldap.testbed.tier.internet2.edu +idp.authn.LDAP.useStartTLS = false +idp.authn.LDAP.useSSL = false # Time in milliseconds that connects will block #idp.authn.LDAP.connectTimeout = PT3S # Time in milliseconds to wait for responses @@ -27,13 +27,13 @@ idp.authn.LDAP.returnAttributes = passwordExpirationTime,loginGr # Search DN resolution, used by anonSearchAuthenticator, bindSearchAuthenticator # for AD: CN=Users,DC=example,DC=org -idp.authn.LDAP.baseDN = ou=people,dc=example,dc=org +idp.authn.LDAP.baseDN = ou=People,dc=testbed,dc=tier,dc=internet2,dc=edu #idp.authn.LDAP.subtreeSearch = false idp.authn.LDAP.userFilter = (uid={user}) # bind search configuration # for AD: idp.authn.LDAP.bindDN=adminuser@domain.com -idp.authn.LDAP.bindDN = uid=myservice,ou=system -idp.authn.LDAP.bindDNCredential = myServicePassword +idp.authn.LDAP.bindDN = +idp.authn.LDAP.bindDNCredential = # Format DN resolution, used by directAuthenticator, adAuthenticator # for AD use idp.authn.LDAP.dnFormat=%s@domain.com