Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/shib-idp-conftree
base: 3.4-default
Choose a base ref
...
head repository: docker/shib-idp-conftree
compare: 4.1-default
Choose a head ref
Can’t automatically merge. Don’t worry, you can still create the pull request.
  • 9 commits
  • 88 files changed
  • 1 contributor

Commits on Oct 5, 2019

  1. InCommon customizations

    pcaskey committed Oct 5, 2019
    Copy the full SHA
    8bf9894 View commit details

Commits on Oct 22, 2019

  1. Update saml-nameid.properties

    pcaskey committed Oct 22, 2019
    Copy the full SHA
    2c76402 View commit details

Commits on Feb 6, 2020

  1. initial 4.0 default

    pcaskey committed Feb 6, 2020
    Copy the full SHA
    1f3d90b View commit details

Commits on Feb 19, 2020

  1. Copy the full SHA
    04c8a9c View commit details

Commits on Mar 10, 2020

  1. update to beta2

    pcaskey committed Mar 10, 2020
    Copy the full SHA
    5009381 View commit details
  2. Copy the full SHA
    4efc501 View commit details
  3. merge fix 2

    pcaskey committed Mar 10, 2020
    Copy the full SHA
    e0fcf67 View commit details

Commits on Mar 11, 2020

  1. update to 4.0.0 (release)

    pcaskey committed Mar 11, 2020
    Copy the full SHA
    f8d3464 View commit details

Commits on Mar 30, 2021

  1. initial 4.1 config

    pcaskey committed Mar 30, 2021
    Copy the full SHA
    54b4708 View commit details
Showing with 2,203 additions and 3,252 deletions.
  1. +1 −0 README.md
  2. +1 −1 conf/access-control.xml
  3. +55 −0 conf/admin/admin.properties
  4. +0 −74 conf/admin/general-admin.xml
  5. +14 −1 conf/admin/metrics.xml
  6. +11 −7 conf/{intercept/impersonate-intercept-config.xml → attribute-registry.xml}
  7. +0 −319 conf/attribute-resolver-full.xml
  8. +0 −94 conf/attribute-resolver-ldap.xml
  9. +11 −22 conf/attribute-resolver.xml
  10. +9 −0 conf/attributes/custom/README
  11. +10 −3 conf/{authn/x509-internal-authn-config.xml → attributes/default-rules.xml}
  12. +50 −0 conf/attributes/eduCourse.xml
  13. +266 −0 conf/attributes/eduPerson.xml
  14. +510 −0 conf/attributes/inetOrgPerson.xml
  15. +67 −0 conf/attributes/samlSubject.xml
  16. +22 −4 conf/audit.xml
  17. +91 −51 conf/authn/authn-comparison.xml
  18. +213 −0 conf/authn/authn.properties
  19. +0 −29 conf/authn/duo-authn-config.xml
  20. +0 −30 conf/authn/duo.properties
  21. +0 −70 conf/authn/external-authn-config.xml
  22. +0 −37 conf/authn/function-authn-config.xml
  23. +0 −158 conf/authn/general-authn.xml
  24. +0 −37 conf/authn/ipaddress-authn-config.xml
  25. +0 −27 conf/authn/jaas-authn-config.xml
  26. +0 −11 conf/authn/jaas.config
  27. +0 −31 conf/authn/krb5-authn-config.xml
  28. +0 −135 conf/authn/ldap-authn-config.xml
  29. +0 −101 conf/authn/mfa-authn-config.xml
  30. +42 −19 conf/authn/password-authn-config.xml
  31. +0 −75 conf/authn/remoteuser-authn-config.xml
  32. +0 −63 conf/authn/remoteuser-internal-authn-config.xml
  33. +0 −74 conf/authn/spnego-authn-config.xml
  34. +0 −44 conf/authn/x509-authn-config.xml
  35. +0 −44 conf/c14n/attribute-sourced-subject-c14n-config.xml
  36. +0 −27 conf/c14n/simple-subject-c14n-config.xml
  37. +40 −0 conf/c14n/subject-c14n.properties
  38. +59 −17 conf/c14n/subject-c14n.xml
  39. +0 −37 conf/c14n/x500-subject-c14n-config.xml
  40. +0 −108 conf/cas-protocol.xml
  41. +4 −0 conf/errors.xml
  42. +105 −0 conf/examples/attribute-resolver-ldap.xml
  43. +11 −11 conf/global.xml
  44. +68 −50 conf/idp.properties
  45. +0 −121 conf/intercept/consent-intercept-config.xml
  46. +0 −63 conf/intercept/context-check-intercept-config.xml
  47. +0 −31 conf/intercept/expiring-password-intercept-config.xml
  48. +0 −40 conf/intercept/profile-intercept.xml
  49. +8 −4 conf/ldap.properties
  50. +4 −5 conf/logback.xml
  51. +4 −5 conf/logback.xml.dist
  52. +4 −5 conf/logback.xml.tmp3
  53. +36 −25 conf/metadata-providers.xml
  54. +9 −7 conf/relying-party.xml
  55. +1 −7 conf/saml-nameid.properties
  56. +21 −4 conf/services.properties
  57. +11 −53 conf/services.xml
  58. +0 −29 conf/session-manager.xml
  59. +23 −23 credentials/idp-backchannel.crt
  60. BIN credentials/idp-backchannel.p12
  61. +23 −23 credentials/idp-encryption.crt
  62. +37 −37 credentials/idp-encryption.key
  63. +22 −22 credentials/idp-signing.crt
  64. +37 −37 credentials/idp-signing.key
  65. BIN credentials/sealer.jks
  66. +1 −1 credentials/sealer.kver
  67. +13 −0 credentials/secrets.properties
  68. +11 −6 edit-webapp/css/logout.css
  69. +16 −0 flows/authn/conditions/account-locked/account-locked-flow.xml
  70. +35 −0 flows/authn/conditions/conditions-flow.xml
  71. +16 −0 flows/authn/conditions/expired-password/expired-password-flow.xml
  72. +33 −0 flows/authn/conditions/expiring-password/expiring-password-flow.xml
  73. +25 −0 flows/user/prefs/prefs-flow.xml
  74. +0 −251 metadata/idp-metadata.xml
  75. +73 −0 views/admin/hello.vm
  76. +0 −96 views/admin/unlock-keys.vm
  77. +0 −83 views/duo.vm
  78. +2 −0 views/error.vm
  79. +0 −159 views/intercept/attribute-release.vm
  80. +0 −54 views/intercept/expiring-password.vm
  81. +0 −90 views/intercept/impersonate.vm
  82. +0 −67 views/intercept/terms-of-use.vm
  83. +5 −3 views/login-error.vm
  84. +9 −9 views/login.vm
  85. +10 −2 views/logout-complete.vm
  86. +2 −2 views/logout-propagate.vm
  87. +52 −28 views/logout.vm
  88. +0 −49 views/spnego-unavailable.vm
1 change: 1 addition & 0 deletions README.md
@@ -14,3 +14,4 @@ to complete a deployment.
* Internal Testing - (TEST) branch/repo that uses the "test bed" which is something that I2 provides (LDAP) and an element to make all integrations. Appropriate for Jenkins and testing environments
* `release` branch
* External Testing - (RELEASE) branch/repo (ultimately will live in Subversion?) for end users

2 changes: 1 addition & 1 deletion conf/access-control.xml
@@ -34,7 +34,7 @@
</entry>

<!--
<entry key="AccessByUser">
<entry key="AccessByAdminUser">
<bean parent="shibboleth.PredicateAccessControl">
<constructor-arg>
<bean parent="shibboleth.Conditions.SubjectName" c:collection="#{'jdoe'}" />
55 changes: 55 additions & 0 deletions conf/admin/admin.properties
@@ -0,0 +1,55 @@
# Configure properties controlling administrative features

#idp.status.logging = Status
#idp.status.accessPolicy = AccessByIPAddress
#idp.status.authenticated = false
#idp.status.nonBrowserSupported = false
#idp.status.resolveAttributes = false

#idp.reload.logging = Reload
#idp.reload.accessPolicy = AccessByIPAddress
#idp.reload.authenticated = false
#idp.reload.nonBrowserSupported = false
#idp.reload.resolveAttributes = false

#idp.resolvertest.logging = ResolverTest
#idp.resolvertest.accessPolicy = AccessByIPAddress
#idp.resolvertest.authenticated = false
#idp.resolvertest.nonBrowserSupported = false
#idp.resolvertest.resolveAttributes = false

#idp.mdquery.logging = MetadataQuery
#idp.mdquery.accessPolicy = AccessByIPAddress
#idp.mdquery.authenticated = false
#idp.mdquery.nonBrowserSupported = false
#idp.mdquery.resolveAttributes = false

#idp.metrics.logging = Metrics
#idp.metrics.authenticated = false
#idp.metrics.nonBrowserSupported = false
#idp.metrics.resolveAttributes = false
# See admin/metrics.xml for other configuration

#idp.hello.logging = Hello
#idp.hello.accessPolicy = AccessByAdminUser
#idp.hello.authenticated = true
#idp.hello.nonBrowserSupported = false
#idp.hello.resolveAttributes = true

#idp.lockout.logging = Lockout
#idp.lockout.accessPolicy = AccessDenied
#idp.lockout.authenticated = false
#idp.lockout.nonBrowserSupported = false
#idp.lockout.resolveAttributes = false

#idp.storage.logging = Storage
#idp.storage.accessPolicy = AccessDenied
#idp.storage.authenticated = false
#idp.storage.nonBrowserSupported = false
#idp.storage.resolveAttributes = false

#idp.unlock-keys.logging = UnlockKeys
#idp.unlock-keys.accessPolicy = AccessDenied
#idp.unlock-keys.authenticated = true
#idp.unlock-keys.nonBrowserSupported = false
#idp.unlock-keys.resolveAttributes = false
74 changes: 0 additions & 74 deletions conf/admin/general-admin.xml

This file was deleted.

15 changes: 14 additions & 1 deletion conf/admin/metrics.xml
@@ -26,8 +26,11 @@
<ref bean="shibboleth.metrics.MetadataGaugeSet" />
<ref bean="shibboleth.metrics.NameIdentifierGaugeSet" />
<ref bean="shibboleth.metrics.RelyingPartyGaugeSet" />
<ref bean="shibboleth.metrics.AttributeRegistryGaugeSet" />
<ref bean="shibboleth.metrics.AttributeResolverGaugeSet" />
<ref bean="shibboleth.metrics.AttributeFilterGaugeSet" />
<ref bean="shibboleth.metrics.CASServiceRegistryGaugeSet" />
<ref bean="shibboleth.metrics.ManagedBeanGaugeSet" />

<!--
<bean class="com.codahale.metrics.jvm.CachedThreadStatesGaugeSet"
@@ -57,10 +60,20 @@
<entry key="metadata" value-ref="shibboleth.metrics.MetadataGaugeSet" />
<entry key="nameid" value-ref="shibboleth.metrics.NameIdentifierGaugeSet" />
<entry key="relyingparty" value-ref="shibboleth.metrics.RelyingPartyGaugeSet" />
<entry key="registry" value-ref="shibboleth.metrics.AttributeRegistryGaugeSet" />
<entry key="resolver" value-ref="shibboleth.metrics.AttributeResolverGaugeSet" />
<entry key="filter" value-ref="shibboleth.metrics.AttributeFilterGaugeSet" />
<entry key="cas" value-ref="shibboleth.metrics.CASServiceRegistryGaugeSet" />
<entry key="bean" value-ref="shibboleth.metrics.ManagedBeanGaugeSet" />
</util:map>


<!-- Add any desired properties into set to expose them as IdP metrics. -->
<!--
<util:set id="shibboleth.metrics.ExposedProperties">
<value>idp.entityID</value>
</util:set>
-->

<!-- If you don't specify an alternate access policy, this named policy will be enforced. -->
<bean id="shibboleth.metrics.DefaultAccessPolicy" class="java.lang.String" c:_0="AccessByIPAddress" />

@@ -13,13 +13,17 @@
default-destroy-method="destroy">

<!--
Names of access control policies defined in access-control.xml to control impersonation.
The general policy runs first and determines whether to offer the impersonation option.
The specific policy runs second and determines whether to allow the requested impersonation.
The system comes preconfigured to load rules directly from resource files
configured in services.xml so they're monitored for changes.
You can add mappings here, add more XML resource files, or drop property
files into the directory noted below, but they won't be monitored for changes
themselves.
-->

<bean id="shibboleth.impersonate.GeneralPolicy" class="java.lang.String" c:_0="GeneralImpersonationPolicy" />

<bean id="shibboleth.impersonate.SpecificPolicy" class="java.lang.String" c:_0="SpecificImpersonationPolicy" />

<!-- Default directory for custom mappings. -->
<bean parent="shibboleth.TranscodingRuleLoader"
c:dir="%{idp.home}/conf/attributes/custom"
c:extensions="#{{'.txt', '.props', '.properties', '.rule'}}" />

</beans>