|
| 1 | +<!-- The entity describing the SAMLtest IdP, named by the entityID below --> |
| 2 | + |
| 3 | +<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata" ID="SAMLtestIdP" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" xmlns:xml="http://www.w3.org/XML/1998/namespace" xmlns:mdui="urn:oasis:names:tc:SAML:metadata:ui" validUntil="2100-01-01T00:00:42Z" entityID="https://samltest.id/saml/idp"> |
| 4 | + |
| 5 | + <IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0"> |
| 6 | + |
| 7 | + <Extensions> |
| 8 | +<!-- An enumeration of the domains this IdP is able to assert scoped attributes, which are |
| 9 | +typically those with a @ delimiter, like mail. Most IdP's serve only a single domain. It's crucial |
| 10 | +for the SP to check received attribute values match permitted domains to prevent a recognized IdP from |
| 11 | +sending attribute values for which a different recognized IdP is authoritative. --> |
| 12 | + <shibmd:Scope regexp="false">samltest.id</shibmd:Scope> |
| 13 | + |
| 14 | +<!-- Display information about this IdP that can be used by SP's and discovery |
| 15 | +services to identify the IdP meaningfully for end users --> |
| 16 | + <mdui:UIInfo> |
| 17 | + <mdui:DisplayName xml:lang="en">SAMLtest IdP</mdui:DisplayName> |
| 18 | + <mdui:Description xml:lang="en">A free and basic IdP for testing SAML deployments</mdui:Description> |
| 19 | + <mdui:Logo height="90" width="225">https://samltest.id/saml/logo.png</mdui:Logo> |
| 20 | + </mdui:UIInfo> |
| 21 | + </Extensions> |
| 22 | + |
| 23 | + <KeyDescriptor use="signing"> |
| 24 | + <ds:KeyInfo> |
| 25 | + <ds:X509Data> |
| 26 | + <ds:X509Certificate> |
| 27 | +MIIDETCCAfmgAwIBAgIUZRpDhkNKl5eWtJqk0Bu1BgTTargwDQYJKoZIhvcNAQEL |
| 28 | +BQAwFjEUMBIGA1UEAwwLc2FtbHRlc3QuaWQwHhcNMTgwODI0MjExNDEwWhcNMzgw |
| 29 | +ODI0MjExNDEwWjAWMRQwEgYDVQQDDAtzYW1sdGVzdC5pZDCCASIwDQYJKoZIhvcN |
| 30 | +AQEBBQADggEPADCCAQoCggEBAJrh9/PcDsiv3UeL8Iv9rf4WfLPxuOm9W6aCntEA |
| 31 | +8l6c1LQ1Zyrz+Xa/40ZgP29ENf3oKKbPCzDcc6zooHMji2fBmgXp6Li3fQUzu7yd |
| 32 | ++nIC2teejijVtrNLjn1WUTwmqjLtuzrKC/ePoZyIRjpoUxyEMJopAd4dJmAcCq/K |
| 33 | +k2eYX9GYRlqvIjLFoGNgy2R4dWwAKwljyh6pdnPUgyO/WjRDrqUBRFrLQJorR2kD |
| 34 | +c4seZUbmpZZfp4MjmWMDgyGM1ZnR0XvNLtYeWAyt0KkSvFoOMjZUeVK/4xR74F8e |
| 35 | +8ToPqLmZEg9ZUx+4z2KjVK00LpdRkH9Uxhh03RQ0FabHW6UCAwEAAaNXMFUwHQYD |
| 36 | +VR0OBBYEFJDbe6uSmYQScxpVJhmt7PsCG4IeMDQGA1UdEQQtMCuCC3NhbWx0ZXN0 |
| 37 | +LmlkhhxodHRwczovL3NhbWx0ZXN0LmlkL3NhbWwvaWRwMA0GCSqGSIb3DQEBCwUA |
| 38 | +A4IBAQBNcF3zkw/g51q26uxgyuy4gQwnSr01Mhvix3Dj/Gak4tc4XwvxUdLQq+jC |
| 39 | +cxr2Pie96klWhY/v/JiHDU2FJo9/VWxmc/YOk83whvNd7mWaNMUsX3xGv6AlZtCO |
| 40 | +L3JhCpHjiN+kBcMgS5jrtGgV1Lz3/1zpGxykdvS0B4sPnFOcaCwHe2B9SOCWbDAN |
| 41 | +JXpTjz1DmJO4ImyWPJpN1xsYKtm67Pefxmn0ax0uE2uuzq25h0xbTkqIQgJzyoE/ |
| 42 | +DPkBFK1vDkMfAW11dQ0BXatEnW7Gtkc0lh2/PIbHWj4AzxYMyBf5Gy6HSVOftwjC |
| 43 | +voQR2qr2xJBixsg+MIORKtmKHLfU |
| 44 | + </ds:X509Certificate> |
| 45 | + </ds:X509Data> |
| 46 | + </ds:KeyInfo> |
| 47 | + |
| 48 | + </KeyDescriptor> |
| 49 | + <KeyDescriptor use="signing"> |
| 50 | + <ds:KeyInfo> |
| 51 | + <ds:X509Data> |
| 52 | + <ds:X509Certificate> |
| 53 | +MIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEB |
| 54 | +CwUAMBYxFDASBgNVBAMMC3NhbWx0ZXN0LmlkMB4XDTE4MDgyNDIxMTQwOVoXDTM4 |
| 55 | +MDgyNDIxMTQwOVowFjEUMBIGA1UEAwwLc2FtbHRlc3QuaWQwggEiMA0GCSqGSIb3 |
| 56 | +DQEBAQUAA4IBDwAwggEKAoIBAQC0Z4QX1NFKs71ufbQwoQoW7qkNAJRIANGA4iM0 |
| 57 | +ThYghul3pC+FwrGv37aTxWXfA1UG9njKbbDreiDAZKngCgyjxj0uJ4lArgkr4AOE |
| 58 | +jj5zXA81uGHARfUBctvQcsZpBIxDOvUUImAl+3NqLgMGF2fktxMG7kX3GEVNc1kl |
| 59 | +bN3dfYsaw5dUrw25DheL9np7G/+28GwHPvLb4aptOiONbCaVvh9UMHEA9F7c0zfF |
| 60 | +/cL5fOpdVa54wTI0u12CsFKt78h6lEGG5jUs/qX9clZncJM7EFkN3imPPy+0HC8n |
| 61 | +spXiH/MZW8o2cqWRkrw3MzBZW3Ojk5nQj40V6NUbjb7kfejzAgMBAAGjVzBVMB0G |
| 62 | +A1UdDgQWBBQT6Y9J3Tw/hOGc8PNV7JEE4k2ZNTA0BgNVHREELTArggtzYW1sdGVz |
| 63 | +dC5pZIYcaHR0cHM6Ly9zYW1sdGVzdC5pZC9zYW1sL2lkcDANBgkqhkiG9w0BAQsF |
| 64 | +AAOCAQEASk3guKfTkVhEaIVvxEPNR2w3vWt3fwmwJCccW98XXLWgNbu3YaMb2RSn |
| 65 | +7Th4p3h+mfyk2don6au7Uyzc1Jd39RNv80TG5iQoxfCgphy1FYmmdaSfO8wvDtHT |
| 66 | +TNiLArAxOYtzfYbzb5QrNNH/gQEN8RJaEf/g/1GTw9x/103dSMK0RXtl+fRs2nbl |
| 67 | +D1JJKSQ3AdhxK/weP3aUPtLxVVJ9wMOQOfcy02l+hHMb6uAjsPOpOVKqi3M8XmcU |
| 68 | +ZOpx4swtgGdeoSpeRyrtMvRwdcciNBp9UZome44qZAYH1iqrpmmjsfI9pJItsgWu |
| 69 | +3kXPjhSfj1AJGR1l9JGvJrHki1iHTA== |
| 70 | + </ds:X509Certificate> |
| 71 | + </ds:X509Data> |
| 72 | + </ds:KeyInfo> |
| 73 | + |
| 74 | + </KeyDescriptor> |
| 75 | + <KeyDescriptor use="encryption"> |
| 76 | + <ds:KeyInfo> |
| 77 | + <ds:X509Data> |
| 78 | + <ds:X509Certificate> |
| 79 | +MIIDEjCCAfqgAwIBAgIVAPVbodo8Su7/BaHXUHykx0Pi5CFaMA0GCSqGSIb3DQEB |
| 80 | +CwUAMBYxFDASBgNVBAMMC3NhbWx0ZXN0LmlkMB4XDTE4MDgyNDIxMTQwOVoXDTM4 |
| 81 | +MDgyNDIxMTQwOVowFjEUMBIGA1UEAwwLc2FtbHRlc3QuaWQwggEiMA0GCSqGSIb3 |
| 82 | +DQEBAQUAA4IBDwAwggEKAoIBAQCQb+1a7uDdTTBBFfwOUun3IQ9nEuKM98SmJDWa |
| 83 | +MwM877elswKUTIBVh5gB2RIXAPZt7J/KGqypmgw9UNXFnoslpeZbA9fcAqqu28Z4 |
| 84 | +sSb2YSajV1ZgEYPUKvXwQEmLWN6aDhkn8HnEZNrmeXihTFdyr7wjsLj0JpQ+VUlc |
| 85 | +4/J+hNuU7rGYZ1rKY8AA34qDVd4DiJ+DXW2PESfOu8lJSOteEaNtbmnvH8KlwkDs |
| 86 | +1NvPTsI0W/m4SK0UdXo6LLaV8saIpJfnkVC/FwpBolBrRC/Em64UlBsRZm2T89ca |
| 87 | +uzDee2yPUvbBd5kLErw+sC7i4xXa2rGmsQLYcBPhsRwnmBmlAgMBAAGjVzBVMB0G |
| 88 | +A1UdDgQWBBRZ3exEu6rCwRe5C7f5QrPcAKRPUjA0BgNVHREELTArggtzYW1sdGVz |
| 89 | +dC5pZIYcaHR0cHM6Ly9zYW1sdGVzdC5pZC9zYW1sL2lkcDANBgkqhkiG9w0BAQsF |
| 90 | +AAOCAQEABZDFRNtcbvIRmblnZItoWCFhVUlq81ceSQddLYs8DqK340//hWNAbYdj |
| 91 | +WcP85HhIZnrw6NGCO4bUipxZXhiqTA/A9d1BUll0vYB8qckYDEdPDduYCOYemKkD |
| 92 | +dmnHMQWs9Y6zWiYuNKEJ9mf3+1N8knN/PK0TYVjVjXAf2CnOETDbLtlj6Nqb8La3 |
| 93 | +sQkYmU+aUdopbjd5JFFwbZRaj6KiHXHtnIRgu8sUXNPrgipUgZUOVhP0C0N5OfE4 |
| 94 | +JW8ZBrKgQC/6vJ2rSa9TlzI6JAa5Ww7gMXMP9M+cJUNQklcq+SBnTK8G+uBHgPKR |
| 95 | +zBDsMIEzRtQZm4GIoHJae4zmnCekkQ== |
| 96 | + </ds:X509Certificate> |
| 97 | + </ds:X509Data> |
| 98 | + </ds:KeyInfo> |
| 99 | + |
| 100 | + </KeyDescriptor> |
| 101 | + |
| 102 | +<NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat> |
| 103 | +<!-- An endpoint for artifact resolution. Please see Wikipedia for more details about SAML |
| 104 | + artifacts and when you may find them useful. --> |
| 105 | + |
| 106 | + <ArtifactResolutionService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="https://samltest.id/idp/profile/SAML2/SOAP/ArtifactResolution" index="1" /> |
| 107 | + |
| 108 | +<!-- A set of endpoints where the IdP can receive logout messages. These must match the public |
| 109 | +facing addresses if this IdP is hosted behind a reverse proxy. --> |
| 110 | + <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://samltest.id/idp/profile/SAML2/Redirect/SLO"/> |
| 111 | + <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://samltest.id/idp/profile/SAML2/POST/SLO"/> |
| 112 | + <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign" Location="https://samltest.id/idp/profile/SAML2/POST-SimpleSign/SLO"/> |
| 113 | + |
| 114 | +<!-- A set of endpoints the SP can send AuthnRequests to in order to trigger user authentication. --> |
| 115 | + <SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://samltest.id/idp/profile/Shibboleth/SSO"/> |
| 116 | + <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://samltest.id/idp/profile/SAML2/POST/SSO"/> |
| 117 | + <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign" Location="https://samltest.id/idp/profile/SAML2/POST-SimpleSign/SSO"/> |
| 118 | + <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://samltest.id/idp/profile/SAML2/Redirect/SSO"/> |
| 119 | + <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="https://samltest.id/idp/profile/SAML2/SOAP/ECP"/> |
| 120 | + |
| 121 | + </IDPSSODescriptor> |
| 122 | + |
| 123 | +</EntityDescriptor> |
0 commit comments