Skip to content
Permalink
Browse files

minor fix

  • Loading branch information
pcaskey committed Mar 3, 2020
1 parent cff2d46 commit 4a2e9414c69334d0ee217744f95151de7c2f9be7
@@ -1,4 +1,4 @@
FROM tier/shib-idp:4.0.beta_20200206
FROM tier/shib-idp:4.0.beta2_20200228

# The build args below can be used at build-time to tell the build process where to find your config files. This is for a completely burned-in config.
ARG TOMCFG=config/tomcat
@@ -69,9 +69,8 @@ idp.encryption.cert=%{idp.home}/credentials/idp-encryption.crt
# To downgrade to SHA-1, set to shibboleth.SigningConfiguration.SHA1
#idp.signing.config = shibboleth.SigningConfiguration.SHA256

# To upgrade to AES-GCM encryption, set to shibboleth.EncryptionConfiguration.GCM
# This is unlikely to work for all SPs, but this is a quick way to test them.
#idp.encryption.config = shibboleth.EncryptionConfiguration.CBC
# The new install default for encryption is now AES-GCM.
idp.encryption.config=shibboleth.EncryptionConfiguration.GCM

# Configures trust evaluation of keys used by services at runtime
# Internal default is Chaining, overriden for new installs
@@ -222,5 +221,6 @@ idp.ui.fallbackLanguages=en,fr,de
#idp.fticks.salt=somethingsecret
#idp.fticks.loghost=localhost
#idp.fticks.logport=514
idp.sealer.keyPassword=90fa668e-ce0f-45e7-82f1-fa4bd0273b51
idp.sealer.storePassword=90fa668e-ce0f-45e7-82f1-fa4bd0273b51

# Set false if you want SAML bindings "spelled out" in audit log
idp.audit.shortenBindings=true

0 comments on commit 4a2e941

Please sign in to comment.
You can’t perform that action at this time.