Skip to content

Commit 6e2a7d8

Browse files
committed
Infocard module major update
git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@1270 44740490-163a-0410-bde0-09ae8108e29a
1 parent e88236f commit 6e2a7d8

15 files changed

Lines changed: 1375 additions & 1195 deletions

File tree

modules/InfoCard/config-template/config-login-infocard.php

Lines changed: 160 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -3,113 +3,201 @@
33
/*
44
* AUTHOR: Samuel Muñoz Hidalgo
55
* EMAIL: samuel.mh@gmail.com
6-
* LAST REVISION: 1-DEC-08
7-
* DESCRIPTION: 'login-infocard' module configuration.
6+
* LAST REVISION: 13-FEB-09
7+
* DESCRIPTION: 'InfoCard' module configuration for simpleSAMLphp.
88
99
10-
-server_key:
11-
-server_crt:
12-
-IClogo: InfoCard logo (template's button)
13-
14-
15-
Definitions taken from:
10+
Some definitions were taken from:
1611
A Guide to Using the Identity Selector
1712
Interoperability Profile V1.5 within Web
1813
Applications and Browsers.
1914
Copyright Microsoft
20-
"
21-
-issuer (optional)
22-
This parameter specifies the URL of the STS from which to obtain a token. If omitted, no
23-
specific STS is requested. The special value
24-
“http://schemas.xmlsoap.org/ws/2005/05/identity/issuer/self” specifies that the
25-
token should come from a Self-issued Identity Provider.
26-
27-
-issuerPolicy (optional)
28-
This parameter specifies the URL of an endpoint from which the STS’s WS-SecurityPolicy
29-
can be retrieved using WS-MetadataExchange. This endpoint must use HTTPS.
30-
31-
-tokenType (optional)
32-
This parameter specifies the type of the token to be requested from the STS as a URI. Th
33-
parameter can be omitted if the STS and the Web site front-end have a mutual
34-
understanding about what token type will be provided or if the Web site is willing to accep
35-
any token type.
36-
37-
-requiredClaims (optional)
38-
This parameter specifies the types of claims that must be supplied by the identity. If
39-
omitted, there are no required claims. The value of requiredClaims is a space-separate
40-
list of URIs, each specifying a required claim type.
41-
42-
-optionalClaims (optional)
43-
This parameter specifies the types of optional claims that may be supplied by the identity
44-
If omitted, there are no optional claims. The value of optionalClaims is a space-separat
45-
list of URIs, each specifying a claim type that can be optionally submitted.
46-
47-
-privacyUrl (optional)
48-
This parameter specifies the URL of the human-readable Privacy Policy of the site, if
49-
provided.
50-
"
51-
52-
53-
-Claims supported by the current schema
54-
givenname
55-
surname
56-
emailaddress
57-
streetaddress
58-
locality
59-
stateorprovince
60-
postalcode
61-
country
62-
primaryphone
63-
dateofbirth
64-
privatepersonalid
65-
gender
66-
webpage
6715
6816
*/
6917

7018

7119
$config = array (
7220

73-
'server_key' => '/etc/apache2/ssl/idp.key',
74-
'server_crt' => '/etc/apache2/ssl/idp.crt',
21+
//------------- TEMPLATE OPTIONS ---------------
22+
'IClogo' => 'resources/infocard_114x80.png', //Infocard logo button
23+
'help_desk_email_URL' => 'mailto:asd@asd.com', //Help desk e-mail
24+
'contact_info_URL' => 'http://google.es', //Contact information
25+
26+
27+
28+
29+
//------------- CERTIFICATE OPTIONS ---------------
30+
31+
/*
32+
* USED IN: Relying Party
33+
* DESCRIPTION: Key of the certificate used in the https connection with the idp, it'll be used
34+
* for decrypting the received XML token,
35+
*/
36+
'idp_key' => '/etc/apache2/ssl/idp.key',
37+
38+
39+
/*
40+
* USED IN: Relying Party
41+
* DESCRIPTION: Only accept tokens signed with this certificate,
42+
* if no certificate is set, it'll be assumed to accept
43+
* a self isued token and accept any token.
44+
*/
7545
'sts_crt' => '/etc/apache2/ssl/sts.crt',
7646

77-
'IClogo' => 'resources/infocard_114x80.png',
7847

79-
48+
/*
49+
* USED IN: Infocard Generator, STS
50+
* DESCRIPTION: STS certificate for signing Infocards and tokens.
51+
*/
52+
'sts_key' => '/etc/apache2/ssl/sts.key',
53+
54+
55+
/*
56+
* USED IN:
57+
* DESCRIPTION: Array of certificates forming a trust chain. The local signing
58+
* certificate is [0], the one that signed that is [1], etc, chaining to a
59+
* trust anchor.
60+
* HINT: The first one, [0], should be the same as the sts_crt.
61+
*/
62+
'certificates' => array(
63+
0 => '/etc/apache2/ssl/sts.crt',
64+
1 => '/etc/apache2/ssl/CA.crt'
65+
),
66+
67+
68+
69+
//------------- DATA (InfoCard) OPTIONS ---------------
70+
71+
/*
72+
* USED IN: InfoCard Generator, Relying Party and STS
73+
* DESCRIPTION: Infocard information
74+
*/
8075
'InfoCard' => array(
76+
/*
77+
* -issuer (optional, taken from the sts_crt common name value, if no set, self issuer is assumed )
78+
* This parameter specifies the URL of the STS from which to obtain a token. If omitted, no
79+
* specific STS is requested. The special value
80+
* “http://schemas.xmlsoap.org/ws/2005/05/identity/issuer/self” specifies that the
81+
* token should come from a Self-issued Identity Provider
82+
*/
83+
/*
84+
* Root of the current InfoCard schema
85+
*/
8186
'schema' => 'http://schemas.xmlsoap.org/ws/2005/05/identity',
82-
'issuer' => 'https://sts/tokenservice.php',
87+
/*
88+
* -issuerPolicy (optional)
89+
* This parameter specifies the URL of an endpoint from which the STS’s WS-SecurityPolicy
90+
* can be retrieved using WS-MetadataExchange. This endpoint must use HTTPS.
91+
*/
8392
'issuerPolicy' => '',
93+
/*
94+
* -privacyUrl (optional)
95+
* This parameter specifies the URL of the human-readable Privacy Policy of the site, if
96+
* provided.
97+
*/
8498
'privacyURL' => '',
99+
/*
100+
* -tokenType (optional)
101+
* This parameter specifies the type of the token to be requested from the STS as a URI. Th
102+
* parameter can be omitted if the STS and the Web site front-end have a mutual
103+
* understanding about what token type will be provided or if the Web site is willing to accep
104+
* any token type.
105+
*/
85106
'tokenType' => 'urn:oasis:names:tc:SAML:1.0:assertion',
107+
108+
/*-Claims supported by the current schema
109+
givenname
110+
surname
111+
emailaddress
112+
streetaddress
113+
locality
114+
stateorprovince
115+
postalcode
116+
country
117+
primaryphone
118+
dateofbirth
119+
privatepersonalid
120+
gender
121+
webpage
122+
*/
123+
124+
/*
125+
* -requiredClaims (optional)
126+
* This parameter specifies the types of claims that must be supplied by the identity. If
127+
* omitted, there are no required claims. The value of requiredClaims is a space-separate
128+
* list of URIs, each specifying a required claim type.
129+
*/
86130
'requiredClaims' => array(
87131
'privatepersonalidentifier' => array('displayTag'=>"Id", 'description'=>"id"),
88132
'givenname' => array('displayTag'=>"Given Name", 'description'=>"etc"),
89133
'surname' => array('displayTag'=>"Surname", 'description'=>"apellidos"),
90134
'emailaddress' => array('displayTag'=>"e-mail", 'description'=>"E-mail address")
91135
),
136+
/*
137+
* -optionalClaims (optional)
138+
* This parameter specifies the types of optional claims that may be supplied by the identity
139+
* If omitted, there are no optional claims. The value of optionalClaims is a space-separat
140+
* list of URIs, each specifying a claim type that can be optionally submitted
141+
*/
92142
'optionalClaims' => array(
93143
'country' => array('displayTag'=>"country", 'description'=>"País"),
94144
'webpage' => array('displayTag'=>"webpage", 'description'=>"Página web")
95145
),
96146
),
97147

98148

99-
//STS only
100-
// array of certificates forming a trust chain. The local signing
101-
// certificate is [0], the one that signed that is [1], etc, chaining to a
102-
// trust anchor.
149+
150+
151+
//------------- WEB PAGES ---------------
103152

104-
'CardGenerator' => 'https://idp.aut.uah.es/simplesaml/module.php/InfoCard/getinfocard.php',
105-
'certificates' => array(
106-
0 => '/etc/apache2/ssl/sts.crt',
107-
1 => '/etc/apache2/ssl/CA.crt'
108-
),
153+
/*
154+
* USED IN: InfoCard Generator, Relying Party (optional form)
155+
* DESCRIPTION: Infocard generator URL, if set it'll appear a form with username-password authentication in the template
156+
*/
157+
'CardGenerator' => 'https://sts.aut.uah.es/simplesaml/module.php/InfoCard/getcardform.php',
158+
159+
160+
/*
161+
* USED IN: InfoCard Generator, Relying Party (issuer), STS (Metadata-Exchange)
162+
* DESCRIPTION: Token generator URL
163+
*/
164+
'tokenserviceurl' => 'https://sts.aut.uah.es/simplesaml/module.php/InfoCard/tokenservice.php',
109165

110-
'sts_key' => '/etc/apache2/ssl/sts.key',
111-
'tokenserviceurl' => 'https://sts/tokenservice.php',
112-
'mexurl' => 'https://sts/mex.php',
166+
167+
/*
168+
* USED IN: InfoCard Generator
169+
* DESCRIPTION: Metadata Exchange URL
170+
*/
171+
'mexurl' => 'https://sts.aut.uah.es/simplesaml/module.php/InfoCard/mex.php',
172+
173+
174+
175+
176+
//------------- CREDENTIALS ---------------
177+
178+
/*
179+
* USED IN: InfoCard Generator, Relying Party (optional form)
180+
* TYPES: UsernamePasswordCredential, KerberosV5Credential, X509V3Credential, SelfIssuedCredential
181+
* DESCRIPTION: How the user will be authenticated
182+
* IMPLEMENTED & TESTED: UsernamePasswordCredential, SelfIssuedCredential
183+
*/
184+
'UserCredential' => 'SelfIssuedCredential',
185+
186+
187+
188+
189+
//------------- DEBUG ---------------
190+
191+
/*
192+
* USED IN: tokenservice
193+
* DESCRIPTION: directory where RSTs and RSTRs will be logged EJ: /tmp.
194+
* If null, logging will be dissabled.
195+
* The directory MUST exists and be accessible to the program, otherwise NO log will be written
196+
* Log files have the form urn:uuid:XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX.log where X is an hexadecimal digit [0-9|a-f]
197+
*/
198+
'debugDir' => '/tmp',
199+
113200
);
201+
114202

115203
?>

0 commit comments

Comments
 (0)