-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
IdP UI integration, add container healthchecks
- Loading branch information
Showing
11 changed files
with
299 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -35,4 +35,5 @@ RUN (mysqld_safe & ) \ | |
|
|
||
| EXPOSE 3306 | ||
|
|
||
|
|
||
| CMD mysqld_safe | ||
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
6 changes: 6 additions & 0 deletions
6
Workbench/idp/container_files/idp/shibui-metadata-providers.xml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,6 @@ | ||
| <?xml version="1.0" encoding="UTF-8"?> | ||
| <MetadataProvider xmlns="urn:mace:shibboleth:2.0:metadata" | ||
| xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | ||
| id="ShibbolethMetadata" | ||
| xsi:schemaLocation="urn:mace:shibboleth:2.0:metadata http://shibboleth.net/schema/idp/shibboleth-metadata.xsd urn:mace:shibboleth:2.0:resource http://shibboleth.net/schema/idp/shibboleth-resource.xsd urn:mace:shibboleth:2.0:security http://shibboleth.net/schema/idp/shibboleth-security.xsd urn:oasis:names:tc:SAML:2.0:metadata http://docs.oasis-open.org/security/saml/v2.0/saml-schema-metadata-2.0.xsd urn:oasis:names:tc:SAML:2.0:assertion http://docs.oasis-open.org/security/saml/v2.0/saml-schema-assertion-2.0.xsd" | ||
| xsi:type="ChainingMetadataProvider"/> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,76 @@ | ||
| <?xml version="1.0" encoding="UTF-8"?> | ||
| <beans xmlns="http://www.springframework.org/schema/beans" | ||
| xmlns:context="http://www.springframework.org/schema/context" | ||
| xmlns:util="http://www.springframework.org/schema/util" | ||
| xmlns:p="http://www.springframework.org/schema/p" | ||
| xmlns:c="http://www.springframework.org/schema/c" | ||
| xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | ||
| xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd | ||
| http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd | ||
| http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util.xsd" | ||
|
|
||
| default-init-method="initialize" | ||
| default-destroy-method="destroy"> | ||
|
|
||
| <!-- | ||
| Unverified RP configuration, defaults to no support for any profiles. Add <ref> elements to the list | ||
| to enable specific default profile settings (as below), or create new beans inline to override defaults. | ||
| "Unverified" typically means the IdP has no metadata, or equivalent way of assuring the identity and | ||
| legitimacy of a requesting system. To run an "open" IdP, you can enable profiles here. | ||
| --> | ||
| <bean id="shibboleth.UnverifiedRelyingParty" parent="RelyingParty"> | ||
| <property name="profileConfigurations"> | ||
| <list> | ||
| <!-- <bean parent="SAML2.SSO" p:encryptAssertions="false" /> --> | ||
| </list> | ||
| </property> | ||
| </bean> | ||
|
|
||
| <!-- | ||
| Default configuration, with default settings applied for all profiles, and enables | ||
| the attribute-release consent flow. | ||
| --> | ||
| <bean id="shibboleth.DefaultRelyingParty" parent="RelyingParty"> | ||
| <property name="profileConfigurations"> | ||
| <list> | ||
| <!-- SAML 1.1 and SAML 2.0 AttributeQuery are disabled by default. --> | ||
| <!-- | ||
| <bean parent="Shibboleth.SSO" p:postAuthenticationFlows="attribute-release" /> | ||
| <ref bean="SAML1.AttributeQuery" /> | ||
| <ref bean="SAML1.ArtifactResolution" /> | ||
| --> | ||
| <bean parent="SAML2.SSO.MDDriven" p:postAuthenticationFlows="attribute-release"/> | ||
| <!-- <bean parent="SAML2.SSO" p:postAuthenticationFlows="attribute-release" /> --> | ||
| <ref bean="SAML2.ECP" /> | ||
| <ref bean="SAML2.Logout" /> | ||
| <!-- | ||
| <ref bean="SAML2.AttributeQuery" /> | ||
| --> | ||
| <ref bean="SAML2.ArtifactResolution" /> | ||
| <ref bean="Liberty.SSOS" /> | ||
| </list> | ||
| </property> | ||
| </bean> | ||
|
|
||
| <!-- Container for any overrides you want to add. --> | ||
|
|
||
| <util:list id="shibboleth.RelyingPartyOverrides"> | ||
|
|
||
| <!-- | ||
| Override example that identifies a single RP by name and configures it | ||
| for SAML 2 SSO without encryption. This is a common "vendor" scenario. | ||
| --> | ||
| <!-- | ||
| <bean parent="RelyingPartyByName" c:relyingPartyIds="https://sp.example.org"> | ||
| <property name="profileConfigurations"> | ||
| <list> | ||
| <bean parent="SAML2.SSO" p:encryptAssertions="false" /> | ||
| </list> | ||
| </property> | ||
| </bean> | ||
| --> | ||
|
|
||
| </util:list> | ||
|
|
||
| </beans> |
Oops, something went wrong.