Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: docker/shib-idp-conftree
base: 3.4-default
Choose a base ref
...
head repository: docker/shib-idp-conftree
compare: 5.0-default
Choose a head ref
Can’t automatically merge. Don’t worry, you can still create the pull request.
  • 10 commits
  • 103 files changed
  • 1 contributor

Commits on Oct 5, 2019

  1. InCommon customizations

    pcaskey committed Oct 5, 2019
    Copy the full SHA
    8bf9894 View commit details

Commits on Oct 22, 2019

  1. Update saml-nameid.properties

    pcaskey committed Oct 22, 2019
    Copy the full SHA
    2c76402 View commit details

Commits on Feb 6, 2020

  1. initial 4.0 default

    pcaskey committed Feb 6, 2020
    Copy the full SHA
    1f3d90b View commit details

Commits on Feb 19, 2020

  1. Copy the full SHA
    04c8a9c View commit details

Commits on Mar 10, 2020

  1. update to beta2

    pcaskey committed Mar 10, 2020
    Copy the full SHA
    5009381 View commit details
  2. Copy the full SHA
    4efc501 View commit details
  3. merge fix 2

    pcaskey committed Mar 10, 2020
    Copy the full SHA
    e0fcf67 View commit details

Commits on Mar 11, 2020

  1. update to 4.0.0 (release)

    pcaskey committed Mar 11, 2020
    Copy the full SHA
    f8d3464 View commit details

Commits on Mar 30, 2021

  1. initial 4.1 config

    pcaskey committed Mar 30, 2021
    Copy the full SHA
    54b4708 View commit details

Commits on Oct 12, 2023

  1. Copy the full SHA
    53828be View commit details
Showing with 3,957 additions and 3,997 deletions.
  1. +1 −0 README.md
  2. +2 −2 conf/access-control.xml
  3. +89 −0 conf/admin/admin.properties
  4. +0 −74 conf/admin/general-admin.xml
  5. +19 −1 conf/admin/metrics.xml
  6. +8 −0 conf/attribute-filter.xml
  7. +11 −7 conf/{intercept/impersonate-intercept-config.xml → attribute-registry.xml}
  8. +0 −319 conf/attribute-resolver-full.xml
  9. +0 −94 conf/attribute-resolver-ldap.xml
  10. +15 −23 conf/attribute-resolver.xml
  11. +9 −0 conf/attributes/custom/README
  12. +11 −3 conf/{authn/x509-internal-authn-config.xml → attributes/default-rules.xml}
  13. +57 −0 conf/attributes/eduCourse.xml
  14. +309 −0 conf/attributes/eduPerson.xml
  15. +525 −0 conf/attributes/inetOrgPerson.xml
  16. +73 −0 conf/attributes/samlSubject.xml
  17. +382 −0 conf/attributes/schac.xml
  18. +26 −4 conf/audit.xml
  19. +91 −51 conf/authn/authn-comparison.xml
  20. +227 −0 conf/authn/authn.properties
  21. +0 −29 conf/authn/duo-authn-config.xml
  22. +0 −30 conf/authn/duo.properties
  23. +0 −70 conf/authn/external-authn-config.xml
  24. +0 −37 conf/authn/function-authn-config.xml
  25. +0 −158 conf/authn/general-authn.xml
  26. +0 −37 conf/authn/ipaddress-authn-config.xml
  27. +0 −27 conf/authn/jaas-authn-config.xml
  28. +0 −11 conf/authn/jaas.config
  29. +0 −31 conf/authn/krb5-authn-config.xml
  30. +0 −135 conf/authn/ldap-authn-config.xml
  31. +0 −101 conf/authn/mfa-authn-config.xml
  32. +33 −49 conf/authn/password-authn-config.xml
  33. +0 −75 conf/authn/remoteuser-authn-config.xml
  34. +0 −63 conf/authn/remoteuser-internal-authn-config.xml
  35. +0 −74 conf/authn/spnego-authn-config.xml
  36. +0 −44 conf/authn/x509-authn-config.xml
  37. +0 −44 conf/c14n/attribute-sourced-subject-c14n-config.xml
  38. +0 −27 conf/c14n/simple-subject-c14n-config.xml
  39. +40 −0 conf/c14n/subject-c14n.properties
  40. +59 −17 conf/c14n/subject-c14n.xml
  41. +0 −37 conf/c14n/x500-subject-c14n-config.xml
  42. +0 −108 conf/cas-protocol.xml
  43. +3 −6 conf/credentials.xml
  44. +5 −0 conf/errors.xml
  45. +108 −0 conf/examples/attribute-resolver-ldap.xml
  46. +14 −11 conf/global.xml
  47. +104 −57 conf/idp.properties
  48. +0 −121 conf/intercept/consent-intercept-config.xml
  49. +0 −63 conf/intercept/context-check-intercept-config.xml
  50. +0 −31 conf/intercept/expiring-password-intercept-config.xml
  51. +0 −40 conf/intercept/profile-intercept.xml
  52. +15 −8 conf/ldap.properties
  53. +27 −7 conf/logback.xml
  54. +31 −7 conf/logback.xml.dist
  55. +31 −7 conf/logback.xml.tmp3
  56. +36 −25 conf/metadata-providers.xml
  57. +13 −6 conf/relying-party.xml
  58. +3 −9 conf/saml-nameid.properties
  59. +16 −9 conf/services.properties
  60. +11 −53 conf/services.xml
  61. +0 −29 conf/session-manager.xml
  62. +100 −0 credentials/beta1-keys
  63. +23 −23 credentials/idp-backchannel.crt
  64. BIN credentials/idp-backchannel.p12
  65. +23 −23 credentials/idp-encryption.crt
  66. +37 −37 credentials/idp-encryption.key
  67. +22 −22 credentials/idp-signing.crt
  68. +37 −37 credentials/idp-signing.key
  69. BIN credentials/sealer.jks
  70. +1 −1 credentials/sealer.kver
  71. +16 −0 credentials/secrets.properties
  72. +0 −150 edit-webapp/css/consent.css
  73. +14 −6 edit-webapp/css/logout.css
  74. +0 −165 edit-webapp/css/main.css
  75. +802 −0 edit-webapp/css/placeholder.css
  76. BIN edit-webapp/images/dummylogo-mobile.png
  77. BIN edit-webapp/images/dummylogo.png
  78. BIN edit-webapp/images/placeholder-logo.png
  79. +31 −0 edit-webapp/index.jsp
  80. +16 −0 flows/authn/conditions/account-locked/account-locked-flow.xml
  81. +35 −0 flows/authn/conditions/conditions-flow.xml
  82. +16 −0 flows/authn/conditions/expired-password/expired-password-flow.xml
  83. +33 −0 flows/authn/conditions/expiring-password/expiring-password-flow.xml
  84. +5 −1 messages/messages.properties
  85. +0 −251 metadata/idp-metadata.xml
  86. +68 −0 views/admin/hello.vm
  87. +0 −96 views/admin/unlock-keys.vm
  88. +17 −22 views/client-storage/client-storage-read.vm
  89. +17 −20 views/client-storage/client-storage-write.vm
  90. +0 −83 views/duo.vm
  91. +25 −24 views/error.vm
  92. +0 −159 views/intercept/attribute-release.vm
  93. +0 −54 views/intercept/expiring-password.vm
  94. +0 −90 views/intercept/impersonate.vm
  95. +0 −67 views/intercept/terms-of-use.vm
  96. +6 −6 views/login-error.vm
  97. +74 −112 views/login.vm
  98. +36 −34 views/logout-complete.vm
  99. +29 −30 views/logout-propagate.vm
  100. +70 −59 views/logout.vm
  101. +0 −49 views/spnego-unavailable.vm
  102. +0 −45 views/user-prefs.js
  103. +0 −60 views/user-prefs.vm
1 change: 1 addition & 0 deletions README.md
@@ -14,3 +14,4 @@ to complete a deployment.
* Internal Testing - (TEST) branch/repo that uses the "test bed" which is something that I2 provides (LDAP) and an element to make all integrations. Appropriate for Jenkins and testing environments
* `release` branch
* External Testing - (RELEASE) branch/repo (ultimately will live in Subversion?) for end users

4 changes: 2 additions & 2 deletions conf/access-control.xml
@@ -34,7 +34,7 @@
</entry>

<!--
<entry key="AccessByUser">
<entry key="AccessByAdminUser">
<bean parent="shibboleth.PredicateAccessControl">
<constructor-arg>
<bean parent="shibboleth.Conditions.SubjectName" c:collection="#{'jdoe'}" />
@@ -47,7 +47,7 @@
<entry key="AccessByAttribute">
<bean parent="shibboleth.PredicateAccessControl">
<constructor-arg>
<bean class="net.shibboleth.idp.profile.logic.SimpleAttributePredicate">
<bean parent="shibboleth.Conditions.SimpleAttribute">
<property name="attributeValueMap">
<map>
<entry key="eduPersonEntitlement">
89 changes: 89 additions & 0 deletions conf/admin/admin.properties
@@ -0,0 +1,89 @@
# Configure properties controlling administrative features

#idp.status.logging = Status
#idp.status.accessPolicy = AccessByIPAddress
#idp.status.authenticated = false
#idp.status.nonBrowserSupported = false
#idp.status.defaultAuthenticationMethods =
#idp.status.resolveAttributes = false
#idp.status.postAuthenticationFlows =

#idp.reload.logging = Reload
#idp.reload.accessPolicy = AccessByIPAddress
#idp.reload.authenticated = false
#idp.reload.nonBrowserSupported = false
#idp.reload.defaultAuthenticationMethods =
#idp.reload.resolveAttributes = false
#idp.reload.postAuthenticationFlows =

#idp.resolvertest.logging = ResolverTest
#idp.resolvertest.accessPolicy = AccessByIPAddress
#idp.resolvertest.authenticated = false
#idp.resolvertest.nonBrowserSupported = false
#idp.resolvertest.defaultAuthenticationMethods =
#idp.resolvertest.resolveAttributes = false
#idp.resolvertest.postAuthenticationFlows =

#idp.dumpconfig.logging = DumpConfig
#idp.dumpconfig.accessPolicy = AccessByIPAddress
#idp.dumpconfig.authenticated = false
#idp.dumpconfig.nonBrowserSupported = false
#idp.dumpconfig.defaultAuthenticationMethods =
#idp.dumpconfig.resolveAttributes = false
#idp.dumpconfig.postAuthenticationFlows =

#idp.mdquery.logging = MetadataQuery
#idp.mdquery.accessPolicy = AccessByIPAddress
#idp.mdquery.authenticated = false
#idp.mdquery.nonBrowserSupported = false
#idp.mdquery.defaultAuthenticationMethods =
#idp.mdquery.resolveAttributes = false
#idp.mdquery.postAuthenticationFlows =

#idp.metrics.logging = Metrics
#idp.metrics.authenticated = false
#idp.metrics.nonBrowserSupported = false
#idp.metrics.defaultAuthenticationMethods =
#idp.metrics.resolveAttributes = false
#idp.metrics.postAuthenticationFlows =
# See admin/metrics.xml for other configuration

#idp.hello.logging = Hello
#idp.hello.accessPolicy = AccessByAdminUser
#idp.hello.authenticated = true
#idp.hello.nonBrowserSupported = false
#idp.hello.defaultAuthenticationMethods =
#idp.hello.resolveAttributes = true
#idp.hello.postAuthenticationFlows =

#idp.lockout.logging = Lockout
#idp.lockout.accessPolicy = AccessDenied
#idp.lockout.authenticated = false
#idp.lockout.nonBrowserSupported = false
#idp.lockout.defaultAuthenticationMethods =
#idp.lockout.resolveAttributes = false
#idp.lockout.postAuthenticationFlows =

#idp.revocation.logging = Revocation
#idp.revocation.accessPolicy = AccessDenied
#idp.revocation.authenticated = false
#idp.revocation.nonBrowserSupported = false
#idp.revocation.defaultAuthenticationMethods =
#idp.revocation.resolveAttributes = false
#idp.revocation.postAuthenticationFlows =

#idp.storage.logging = Storage
#idp.storage.accessPolicy = AccessDenied
#idp.storage.authenticated = false
#idp.storage.nonBrowserSupported = false
#idp.storage.defaultAuthenticationMethods =
#idp.storage.resolveAttributes = false
#idp.storage.postAuthenticationFlows =

#idp.unlock-keys.logging = UnlockKeys
#idp.unlock-keys.accessPolicy = AccessDenied
#idp.unlock-keys.authenticated = true
#idp.unlock-keys.nonBrowserSupported = false
#idp.unlock-keys.defaultAuthenticationMethods =
#idp.unlock-keys.resolveAttributes = false
#idp.unlock-keys.postAuthenticationFlows =
74 changes: 0 additions & 74 deletions conf/admin/general-admin.xml

This file was deleted.

20 changes: 19 additions & 1 deletion conf/admin/metrics.xml
@@ -26,8 +26,15 @@
<ref bean="shibboleth.metrics.MetadataGaugeSet" />
<ref bean="shibboleth.metrics.NameIdentifierGaugeSet" />
<ref bean="shibboleth.metrics.RelyingPartyGaugeSet" />
<ref bean="shibboleth.metrics.AttributeRegistryGaugeSet" />
<ref bean="shibboleth.metrics.AttributeResolverGaugeSet" />
<ref bean="shibboleth.metrics.AttributeFilterGaugeSet" />
<ref bean="shibboleth.metrics.CASServiceRegistryGaugeSet" />
<ref bean="shibboleth.metrics.ManagedBeanGaugeSet" />
<ref bean="shibboleth.metrics.ModuleGaugeSet" />

<!-- Note that this accesses remote "state" regarding IdP and plugin updates. -->
<ref bean="shibboleth.metrics.InstallableComponents" />

<!--
<bean class="com.codahale.metrics.jvm.CachedThreadStatesGaugeSet"
@@ -52,15 +59,26 @@
<util:map id="shibboleth.metrics.MetricGroups">
<entry key="core" value-ref="shibboleth.metrics.CoreGaugeSet" />
<entry key="idp" value-ref="shibboleth.metrics.IdPGaugeSet" />
<entry key="updates" value-ref="shibboleth.metrics.InstallableComponents" />
<entry key="logging" value-ref="shibboleth.metrics.LoggingGaugeSet" />
<entry key="access" value-ref="shibboleth.metrics.AccessControlGaugeSet" />
<entry key="metadata" value-ref="shibboleth.metrics.MetadataGaugeSet" />
<entry key="nameid" value-ref="shibboleth.metrics.NameIdentifierGaugeSet" />
<entry key="relyingparty" value-ref="shibboleth.metrics.RelyingPartyGaugeSet" />
<entry key="registry" value-ref="shibboleth.metrics.AttributeRegistryGaugeSet" />
<entry key="resolver" value-ref="shibboleth.metrics.AttributeResolverGaugeSet" />
<entry key="filter" value-ref="shibboleth.metrics.AttributeFilterGaugeSet" />
<entry key="cas" value-ref="shibboleth.metrics.CASServiceRegistryGaugeSet" />
<entry key="bean" value-ref="shibboleth.metrics.ManagedBeanGaugeSet" />
</util:map>


<!-- Add any desired properties into set to expose them as IdP metrics. -->
<!--
<util:set id="shibboleth.metrics.ExposedProperties">
<value>idp.entityID</value>
</util:set>
-->

<!-- If you don't specify an alternate access policy, this named policy will be enforced. -->
<bean id="shibboleth.metrics.DefaultAccessPolicy" class="java.lang.String" c:_0="AccessByIPAddress" />

8 changes: 8 additions & 0 deletions conf/attribute-filter.xml
@@ -14,6 +14,14 @@
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:mace:shibboleth:2.0:afp http://shibboleth.net/schema/idp/shibboleth-afp.xsd">


<!-- Release home org signifier to everybody. -->
<AttributeFilterPolicy id="alwaysRelease">
<PolicyRequirementRule xsi:type="ANY" />

<AttributeRule attributeID="schacHomeOrganization" permitAny="true" />
</AttributeFilterPolicy>

<!--
Example rule relying on a locally applied tag in metadata to trigger attribute
release of some specific attributes. Add additional attributes as desired.
@@ -13,13 +13,17 @@
default-destroy-method="destroy">

<!--
Names of access control policies defined in access-control.xml to control impersonation.
The general policy runs first and determines whether to offer the impersonation option.
The specific policy runs second and determines whether to allow the requested impersonation.
The system comes preconfigured to load rules directly from resource files
configured in services.xml so they're monitored for changes.
You can add mappings here, add more XML resource files, or drop property
files into the directory noted below, but they won't be monitored for changes
themselves.
-->

<bean id="shibboleth.impersonate.GeneralPolicy" class="java.lang.String" c:_0="GeneralImpersonationPolicy" />

<bean id="shibboleth.impersonate.SpecificPolicy" class="java.lang.String" c:_0="SpecificImpersonationPolicy" />

<!-- Default directory for custom mappings. -->
<bean parent="shibboleth.TranscodingRuleLoader"
c:dir="%{idp.home}/conf/attributes/custom"
c:extensions="#{{'.txt', '.props', '.properties', '.rule'}}" />

</beans>