Initial Project Commit
This commit is contained in:
commit
a6dea9c888
2148 changed files with 173870 additions and 0 deletions
|
@ -0,0 +1,56 @@
|
|||
# ===================================================================
|
||||
# This was my first implementation of SAML2. Using standard application.yml
|
||||
# This was a SUCCESS. Then, I change it to be more dynamic
|
||||
# Keep this has a reference
|
||||
# ===================================================================
|
||||
|
||||
spring:
|
||||
security:
|
||||
saml2: # ADDED to support SAMLv2 authentication to IDP.
|
||||
relyingparty:
|
||||
registration:
|
||||
mock-idp:
|
||||
assertingparty:
|
||||
entity-id: http://localhost:3000/saml/metadata
|
||||
single-sign-on:
|
||||
url: http://localhost:3000/saml/sso
|
||||
single-logout:
|
||||
url: http://localhost:3000/saml/slo
|
||||
verification:
|
||||
credentials:
|
||||
- certificate-location: classpath:saml/idp-public.cert
|
||||
want-authn-signed: false # Validate signature in entire message response (true-validates/false-doesn't validate)
|
||||
want-assertion-signed: true # Validate signature in assertions message response (true-validates/false-doesn't validate)
|
||||
signing:
|
||||
credentials:
|
||||
- private-key-location: classpath:saml/private.key
|
||||
certificate-location: classpath:saml/public.cert
|
||||
|
||||
# ===================================================================
|
||||
# This is the NEW WAY
|
||||
# Custom Resilient configuration, that is loaded by saml2RelyingPartyRegistrationRepository.class
|
||||
# and then, registered and configured in SecurityFilterChain
|
||||
# ===================================================================
|
||||
resilient:
|
||||
security:
|
||||
saml2: # ADDED to support SAMLv2 authentication to IDP.
|
||||
enabled: true
|
||||
relyingparty:
|
||||
registration:
|
||||
mock-idp:
|
||||
assertingparty:
|
||||
entity-id: http://localhost:3000/saml/metadata
|
||||
single-sign-on:
|
||||
url: http://localhost:3000/saml/sso
|
||||
single-logout:
|
||||
url: http://localhost:3000/saml/slo
|
||||
verification:
|
||||
credentials:
|
||||
- certificate-location: classpath:saml/idp-public.cert
|
||||
want-authn-signed: false # Validate signature in entire message response (true-validates/false-doesn't validate)
|
||||
want-assertion-signed: true # Validate signature in assertions message response (true-validates/false-doesn't validate)
|
||||
signing:
|
||||
credentials:
|
||||
- private-key-location: classpath:saml/private.key
|
||||
certificate-location: classpath:saml/public.cert
|
||||
|
Loading…
Add table
Add a link
Reference in a new issue