Skip to content

Commit

Permalink
minor fix
Browse files Browse the repository at this point in the history
  • Loading branch information
pcaskey committed Mar 3, 2020
1 parent cff2d46 commit 4a2e941
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion test-compose/idp/Dockerfile
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
FROM tier/shib-idp:4.0.beta_20200206
FROM tier/shib-idp:4.0.beta2_20200228

# The build args below can be used at build-time to tell the build process where to find your config files. This is for a completely burned-in config.
ARG TOMCFG=config/tomcat
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -69,9 +69,8 @@ idp.encryption.cert=%{idp.home}/credentials/idp-encryption.crt
# To downgrade to SHA-1, set to shibboleth.SigningConfiguration.SHA1
#idp.signing.config = shibboleth.SigningConfiguration.SHA256

# To upgrade to AES-GCM encryption, set to shibboleth.EncryptionConfiguration.GCM
# This is unlikely to work for all SPs, but this is a quick way to test them.
#idp.encryption.config = shibboleth.EncryptionConfiguration.CBC
# The new install default for encryption is now AES-GCM.
idp.encryption.config=shibboleth.EncryptionConfiguration.GCM

# Configures trust evaluation of keys used by services at runtime
# Internal default is Chaining, overriden for new installs
Expand Down Expand Up @@ -222,5 +221,6 @@ idp.ui.fallbackLanguages=en,fr,de
#idp.fticks.salt=somethingsecret
#idp.fticks.loghost=localhost
#idp.fticks.logport=514
idp.sealer.keyPassword=90fa668e-ce0f-45e7-82f1-fa4bd0273b51
idp.sealer.storePassword=90fa668e-ce0f-45e7-82f1-fa4bd0273b51

# Set false if you want SAML bindings "spelled out" in audit log
idp.audit.shortenBindings=true

0 comments on commit 4a2e941

Please sign in to comment.