You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/main/resources/onelogin.saml.template
+128-2Lines changed: 128 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,39 @@ onelogin.saml2.debug =
5
5
onelogin.saml2.strict =
6
6
7
7
# IDP metadata URI (e.g. http://idp:8080/auth/realms/demorealm/protocol/saml/descriptor)
8
-
idp.entity.descriptor =
8
+
onelogin.saml2.idp.entityid =
9
+
10
+
# SSO endpoint info of the IdP. (Authentication Request protocol)
11
+
# URL Target of the IdP where the SP will send the Authentication Request Message
12
+
onelogin.saml2.idp.single_sign_on_service.url =
13
+
14
+
# SAML protocol binding to be used to deliver the <AuthnRequest> message to the IdP. SAMLToolkit supports for this endpoint the HTTP-Redirect binding only
# URL Location of the IdP where the SP will send the SLO Request
19
+
onelogin.saml2.idp.single_logout_service.url =
20
+
21
+
# Optional SLO Response endpoint info of the IdP.
22
+
# URL Location of the IdP where the SP will send the SLO Response. If left blank, same URL as onelogin.saml2.idp.single_logout_service.url will be used.
23
+
# Some IdPs use a separate URL for sending a logout request and response, use this property to set the separate response url
# SAML protocol binding to be used when returning the <LogoutResponse> or sending the <LogoutRequest> message. SAMLToolkit supports for this endpoint the HTTP-Redirect binding only
# Indicates that the nameID of the <samlp:logoutRequest> sent by this SP will be encrypted.
66
+
onelogin.saml2.security.nameid_encrypted = false
67
+
68
+
# Usually x509cert and privateKey of the SP are provided by files placed at the certs folder. But we can also provide them with the following parameters
69
+
onelogin.saml2.sp.x509cert =
70
+
71
+
# Requires Format PKCS#8 BEGIN PRIVATE KEY
72
+
# If you have PKCS#1 BEGIN RSA PRIVATE KEY convert it by openssl pkcs8 -topk8 -inform pem -nocrypt -in sp.rsa_key -outform pem -out sp.pem
73
+
onelogin.saml2.sp.privatekey =
74
+
75
+
76
+
# Security settings
77
+
#
78
+
79
+
# Indicates whether the <samlp:AuthnRequest> messages sent by this SP
80
+
# will be signed. [The Metadata of the SP will offer this info]
0 commit comments