1+ # If 'strict' is True, then the Java Toolkit will reject unsigned
2+ # or unencrypted messages if it expects them signed or encrypted
3+ # Also will reject the messages if not strictly follow the SAML
4+ onelogin.saml2.strict = true
5+
6+ # Enable debug mode (to print errors)
7+ onelogin.saml2.debug = true
8+
9+ # Service Provider Data that we are deploying
10+ # Identifier of the SP entity (must be a URI)
11+ onelogin.saml2.sp.entityid = http://localhost:8080/java-saml-jspsample/metadata.jsp
12+ # Specifies info about where and how the <AuthnResponse> message MUST be
13+ # returned to the requester, in this case our SP.
14+ # URL Location where the <Response> from the IdP will be returned
15+ onelogin.saml2.sp.assertion_consumer_service.url = http://localhost:8080/java-saml-jspsample/acs.jsp
16+ # SAML protocol binding to be used when returning the <Response> or sending the <LogoutRequest>
17+ # message. Onelogin Toolkit supports for this endpoint the
18+ # HTTP-POST binding only
19+ onelogin.saml2.sp.assertion_consumer_service.binding = urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST
20+
21+ # Specifies info about Logout service
22+ # URL Location where the <LogoutResponse> from the IdP will be returned or where to send the <LogoutRequest>
23+ onelogin.saml2.sp.single_logout_service.url = http://localhost:8080/java-saml-jspsample/sls.jsp
24+
25+ # SAML protocol binding for the Single Logout Service of the SP.
26+ # Onelogin Toolkit supports for this endpoint the HTTP-Redirect binding only
27+ onelogin.saml2.sp.single_logout_service.binding = urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
28+
29+ # Specifies constraints on the name identifier to be used to
30+ # represent the requested subject.
31+ # Take a look on lib/Saml2/Constants.php to see the NameIdFormat supported
32+ onelogin.saml2.sp.nameidformat = urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
33+
34+
35+ # Usually x509cert and privateKey of the SP are provided by files placed at
36+ # the certs folder. But we can also provide them with the following parameters
37+ onelogin.saml2.sp.x509cert = -----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
38+
39+
40+ # Requires Format PKCS#8 BEGIN PRIVATE KEY
41+ # If you have PKCS#1 BEGIN RSA PRIVATE KEY convert it by openssl pkcs8 -topk8 -inform pem -nocrypt -in sp.rsa_key -outform pem -out sp.pem
42+ onelogin.saml2.sp.privatekey = -----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
43+
44+ # Identity Provider Data that we want connect with our SP
45+ # Identifier of the IdP entity (must be a URI)
46+ onelogin.saml2.idp.entityid = https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php
47+
48+ # SSO endpoint info of the IdP. (Authentication Request protocol)
49+ # URL Target of the IdP where the SP will send the Authentication Request Message
50+ onelogin.saml2.idp.single_sign_on_service.url = https://pitbulk.no-ip.org/simplesaml/saml2/idp/SSOService.php
51+
52+ # SAML protocol binding to be used when returning the <Response>
53+ # message. Onelogin Toolkit supports for this endpoint the
54+ # HTTP-Redirect binding only
55+ onelogin.saml2.idp.single_sign_on_service.binding = urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
56+
57+ # SLO endpoint info of the IdP.
58+ # URL Location of the IdP where the SP will send the SLO Request
59+ onelogin.saml2.idp.single_logout_service.url = https://pitbulk.no-ip.org/simplesaml/saml2/idp/SingleLogoutService.php
60+
61+ # SAML protocol binding to be used when returning the <Response>
62+ # message. Onelogin Toolkit supports for this endpoint the
63+ # HTTP-Redirect binding only
64+ onelogin.saml2.idp.single_logout_service.binding = urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
65+
66+ # Public x509 certificate of the IdP
67+ onelogin.saml2.idp.x509cert = -----BEGIN CERTIFICATE-----MIICgTCCAeoCCQCbOlrWDdX7FTANBgkqhkiG9w0BAQUFADCBhDELMAkGA1UEBhMCTk8xGDAWBgNVBAgTD0FuZHJlYXMgU29sYmVyZzEMMAoGA1UEBxMDRm9vMRAwDgYDVQQKEwdVTklORVRUMRgwFgYDVQQDEw9mZWlkZS5lcmxhbmcubm8xITAfBgkqhkiG9w0BCQEWEmFuZHJlYXNAdW5pbmV0dC5ubzAeFw0wNzA2MTUxMjAxMzVaFw0wNzA4MTQxMjAxMzVaMIGEMQswCQYDVQQGEwJOTzEYMBYGA1UECBMPQW5kcmVhcyBTb2xiZXJnMQwwCgYDVQQHEwNGb28xEDAOBgNVBAoTB1VOSU5FVFQxGDAWBgNVBAMTD2ZlaWRlLmVybGFuZy5ubzEhMB8GCSqGSIb3DQEJARYSYW5kcmVhc0B1bmluZXR0Lm5vMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDivbhR7P516x/S3BqKxupQe0LONoliupiBOesCO3SHbDrl3+q9IbfnfmE04rNuMcPsIxB161TdDpIesLCn7c8aPHISKOtPlAeTZSnb8QAu7aRjZq3+PbrP5uW3TcfCGPtKTytHOge/OlJbo078dVhXQ14d1EDwXJW1rRXuUt4C8QIDAQABMA0GCSqGSIb3DQEBBQUAA4GBACDVfp86HObqY+e8BUoWQ9+VMQx1ASDohBjwOsg2WykUqRXF+dLfcUH9dWR63CtZIKFDbStNomPnQz7nbK+onygwBspVEbnHuUihZq3ZUdmumQqCw4Uvs/1Uvq3orOo/WJVhTyvLgFVK2QarQ4/67OZfHd7R+POBXhophSMv1ZOo-----END CERTIFICATE-----
68+
69+ # Security settings
70+ #
71+
72+ # Indicates that the nameID of the <samlp:logoutRequest> sent by this SP
73+ # will be encrypted.
74+ onelogin.saml2.security.nameid_encrypted = true
75+
76+ # Indicates whether the <samlp:AuthnRequest> messages sent by this SP
77+ # will be signed. [The Metadata of the SP will offer this info]
78+ onelogin.saml2.security.authnrequest_signed = true
79+
80+ # Indicates whether the <samlp:logoutRequest> messages sent by this SP
81+ # will be signed.
82+ onelogin.saml2.security.logoutrequest_signed = true
83+
84+ # Indicates whether the <samlp:logoutResponse> messages sent by this SP
85+ # will be signed.
86+ onelogin.saml2.security.logoutresponse_signed = true
87+
88+ # Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest> and
89+ # <samlp:LogoutResponse> elements received by this SP to be signed.
90+ onelogin.saml2.security.want_messages_signed = true
91+
92+ # Indicates a requirement for the <saml:Assertion> of the <samlp:Response> to be signed
93+ onelogin.saml2.security.want_assertions_signed = true
94+
95+ # Indicates a requirement for the Metadata of this SP to be signed.
96+ # Right now supported null/false (in order to not sign) or true (sign using SP private key)
97+ onelogin.saml2.security.sign_metadata = true
98+
99+ # Indicates a requirement for the Assertions received by this SP to be encrypted
100+ onelogin.saml2.security.want_assertions_encrypted = false
101+
102+ # Indicates a requirement for the NameID received by this SP to be encrypted
103+ onelogin.saml2.security.want_nameid = true
104+
105+ # Indicates a requirement for the NameID received by this SP to be encrypted
106+ onelogin.saml2.security.want_nameid_encrypted = false
107+
108+ # Authentication context.
109+ # Set Empty and no AuthContext will be sent in the AuthNRequest,
110+ # Set comma separated values urn:oasis:names:tc:SAML:2.0:ac:classes:urn:oasis:names:tc:SAML:2.0:ac:classes:Password
111+ onelogin.saml2.security.requested_authncontext = urn:oasis:names:tc:SAML:2.0:ac:classes:urn:oasis:names:tc:SAML:2.0:ac:classes:Password
112+
113+ # Allows the authn comparison parameter to be set, defaults to 'exact'
114+ onelogin.saml2.security.requested_authncontextcomparison = exact
115+
116+ # Enable duplicated names in the attribute statement
117+ onelogin.saml2.security.allow_duplicated_attribute_name = true
118+
119+ # Indicates if the SP will validate all received xmls.
120+ # (In order to validate the xml, 'strict' and 'wantXMLValidation' must be true).
121+ onelogin.saml2.security.want_xml_validation = true
122+
123+ # Algorithm that the toolkit will use on signing process. Options:
124+ # 'http://www.w3.org/2000/09/xmldsig#rsa-sha1'
125+ # 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256'
126+ # 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha384'
127+ # 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha512'
128+ onelogin.saml2.security.signature_algorithm = http://www.w3.org/2001/04/xmldsig-more#rsa-sha512
129+
130+ # Organization
131+ onelogin.saml2.organization.name = SP Java
132+ onelogin.saml2.organization.displayname = SP Java Example
133+ onelogin.saml2.organization.url = http://sp.example.com
134+
135+ # Contacts
136+ onelogin.saml2.contacts.technical.given_name = Technical Guy
137+ onelogin.saml2.contacts.technical.email_address = technical@example.com
138+ onelogin.saml2.contacts.support.given_name = Support Guy
139+ onelogin.saml2.contacts.support.email_address = support@example.com
0 commit comments