diff --git a/conf/attribute-filter.xml b/conf/attribute-filter.xml
index f8c41ba..9b49de0 100644
--- a/conf/attribute-filter.xml
+++ b/conf/attribute-filter.xml
@@ -13,7 +13,9 @@
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:mace:shibboleth:2.0:afp http://shibboleth.net/schema/idp/shibboleth-afp.xsd">
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/conf/attribute-resolver.xml b/conf/attribute-resolver.xml
index d752e07..b23a80c 100644
--- a/conf/attribute-resolver.xml
+++ b/conf/attribute-resolver.xml
@@ -36,40 +36,28 @@
-
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
-
-
-
+
+
-
-
-
- uid
-
-
-
-
-
-
-
@@ -82,5 +70,21 @@
member
+
+
+
+
+
+ givenName sn displayName mail uid
+
diff --git a/conf/authn/krb5-authn-config.xml b/conf/authn/krb5-authn-config.xml
index d3590a2..3230134 100644
--- a/conf/authn/krb5-authn-config.xml
+++ b/conf/authn/krb5-authn-config.xml
@@ -21,10 +21,10 @@
The keytab bean must be an absolute file pathname and not a reference to a classpath resource,
so if idp.home is not a path, don't use it in the value.
-->
-
+
+
+
+
diff --git a/conf/authn/password-authn-config.xml b/conf/authn/password-authn-config.xml
index f27051b..48b2c3d 100644
--- a/conf/authn/password-authn-config.xml
+++ b/conf/authn/password-authn-config.xml
@@ -14,8 +14,8 @@
-
-
+
+
diff --git a/conf/idp.properties b/conf/idp.properties
index 7d45f69..1f32c81 100644
--- a/conf/idp.properties
+++ b/conf/idp.properties
@@ -2,7 +2,7 @@
idp.additionalProperties= /conf/ldap.properties, /conf/saml-nameid.properties, /conf/services.properties, /conf/authn/duo.properties
# Set the entityID of the IdP
-idp.entityID= https://idp-dev.testbed.tier.internet2.edu/idp/shibboleth
+idp.entityID= https://idp.testbed.tier.internet2.edu/idp/shibboleth
# Set the scope used in the attribute resolver for scoped attributes
idp.scope= testbed.tier.internet2.edu
@@ -26,8 +26,8 @@ idp.scope= testbed.tier.internet2.edu
#idp.sealer.aliasBase = secret
idp.sealer.storeResource= %{idp.home}/credentials/sealer.jks
idp.sealer.versionResource= %{idp.home}/credentials/sealer.kver
-idp.sealer.storePassword= Gr34tPass!
-idp.sealer.keyPassword= Gr34tPass!
+idp.sealer.storePassword= changeit
+idp.sealer.keyPassword= changeit
# Settings for public/private signing and encryption key(s)
# During decryption key rollover, point the ".2" properties at a second
diff --git a/conf/ldap.properties b/conf/ldap.properties
index 37b270e..6d75df0 100644
--- a/conf/ldap.properties
+++ b/conf/ldap.properties
@@ -5,9 +5,9 @@
#idp.authn.LDAP.authenticator = anonSearchAuthenticator
## Connection properties ##
-idp.authn.LDAP.ldapURL = ldap://localhost:10389
-#idp.authn.LDAP.useStartTLS = true
-#idp.authn.LDAP.useSSL = false
+idp.authn.LDAP.ldapURL = ldap://ldap.testbed.tier.internet2.edu
+idp.authn.LDAP.useStartTLS = false
+idp.authn.LDAP.useSSL = false
# Time in milliseconds that connects will block
#idp.authn.LDAP.connectTimeout = PT3S
# Time in milliseconds to wait for responses
@@ -27,13 +27,13 @@ idp.authn.LDAP.returnAttributes = passwordExpirationTime,loginGr
# Search DN resolution, used by anonSearchAuthenticator, bindSearchAuthenticator
# for AD: CN=Users,DC=example,DC=org
-idp.authn.LDAP.baseDN = ou=people,dc=example,dc=org
+idp.authn.LDAP.baseDN = ou=People,dc=testbed,dc=tier,dc=internet2,dc=edu
#idp.authn.LDAP.subtreeSearch = false
idp.authn.LDAP.userFilter = (uid={user})
# bind search configuration
# for AD: idp.authn.LDAP.bindDN=adminuser@domain.com
-idp.authn.LDAP.bindDN = uid=myservice,ou=system
-idp.authn.LDAP.bindDNCredential = myServicePassword
+idp.authn.LDAP.bindDN =
+idp.authn.LDAP.bindDNCredential =
# Format DN resolution, used by directAuthenticator, adAuthenticator
# for AD use idp.authn.LDAP.dnFormat=%s@domain.com