You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: xt/testapp/README.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,6 +50,7 @@ The testapp now supports a simplified automatic configuration for testing agains
50
50
2. Download the metadata from your IdP and save it as IdPs/google/metadata.xml
51
51
3. Download the cacert.pem from the IdP and save it as IdPs/google/cacert.pem
52
52
4. Optionally create IdPs/google/config.yml for custom settings for the IdP (if the a custom config.yml does not exist it will refresh the settings from the default config.yml.
53
+
4. Optionally create IdPs/google/mappings.yml for custom IdP attribute mappings. If a custom mappings.yml does not does not exist it will use the defaul mappings.
53
54
54
55
The index page will automatically list each configured Identity Provider as a link to initiate login against that IdP.
55
56
@@ -66,6 +67,10 @@ IdPs/
66
67
google/
67
68
cacert.pem
68
69
metadata.yml
70
+
shibboleth
71
+
cacert.pem
72
+
metadata.yml
73
+
mappings.yml (optional)
69
74
70
75
### Run lighttpd to deliver metadata.xml
71
76
@@ -94,15 +99,21 @@ If there is an option to upload the metadata.xml that is probably your first ste
94
99
95
100
Saml2Test expects the Identity Provider to provide an assertion with the following values:
96
101
97
-
1. DN
98
-
2. CN
99
-
3. EmailAddress
100
-
4. FirstName
101
-
5. Address
102
-
6. Phone
103
-
7. EmployeeNumber
104
-
105
-
Note that DN and CN (and others) may not be available. That can be customized in views/user.tt if you want to choose other options. However the Identity Provider must provide the assertion attributes that match the expected names in views/user.tt.
102
+
1. EmailAddress
103
+
2. FirstName
104
+
3. LastName
105
+
4. Address
106
+
5. PhoneNumber
107
+
6. EmployeeNumber
108
+
109
+
If the Identity Provider does not provide assertion attributes that match the expected names above you can create a custom mapping in IdPs/idp_name/mappings.yml in the following format. The setting is the name the testapp expects and the value is the attribure name that the IdP provides in the Assertion.
0 commit comments