summaryrefslogtreecommitdiff
path: root/conf-from-container/conf/cas-protocol.xml
diff options
context:
space:
mode:
authorHenrik Lund Kramshoej <hlk@kramse.org>2017-07-10 12:27:27 +0200
committerHenrik Lund Kramshoej <hlk@kramse.org>2017-07-10 12:27:27 +0200
commit4f85857c506729174013742149d69eca736fe2de (patch)
tree9d44e4219a5e4bf15ae99bf249b2bc0e7911a4c5 /conf-from-container/conf/cas-protocol.xml
parent52042bb9bab3e66c16921e682bafc45341ea4a00 (diff)
Messing up the thing
Diffstat (limited to 'conf-from-container/conf/cas-protocol.xml')
-rw-r--r--conf-from-container/conf/cas-protocol.xml84
1 files changed, 84 insertions, 0 deletions
diff --git a/conf-from-container/conf/cas-protocol.xml b/conf-from-container/conf/cas-protocol.xml
new file mode 100644
index 0000000..d0b3d55
--- /dev/null
+++ b/conf-from-container/conf/cas-protocol.xml
@@ -0,0 +1,84 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<beans xmlns="http://www.springframework.org/schema/beans"
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
+ xmlns:c="http://www.springframework.org/schema/c"
+ xmlns:p="http://www.springframework.org/schema/p"
+ xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd
+ http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd
+ http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util.xsd"
+ default-init-method="initialize"
+ default-destroy-method="destroy">
+
+ <!--
+ | The CAS service registry defines verified relying parties by endpoint URI.
+ | The default implementation treats the ID of each entry as a regular expression defining a logical group of
+ | services whose URIs match the expression.
+ |
+ | This bean is reloaded periodically according to %{idp.home}/conf/services.properties.
+ -->
+ <bean id="reloadableServiceRegistry"
+ class="%{idp.cas.serviceRegistryClass:net.shibboleth.idp.cas.service.PatternServiceRegistry}">
+ <property name="definitions">
+ <list>
+ <!--
+ <bean class="net.shibboleth.idp.cas.service.ServiceDefinition"
+ c:regex="https://([A-Za-z0-9_-]+\.)*example\.org(:\d+)?/.*"
+ p:group="proxying-services"
+ p:authorizedToProxy="true"
+ p:singleLogoutParticipant="true" />
+ <bean class="net.shibboleth.idp.cas.service.ServiceDefinition"
+ c:regex="http://([A-Za-z0-9_-]+\.)*example\.org(:\d+)?/.*"
+ p:group="non-proxying-services"
+ p:authorizedToProxy="false" /
+ -->
+ </list>
+ </property>
+ </bean>
+
+ <!--
+ | The default ticket service as of 3.3.0 serializes ticket data into the opaque section of the ticket ID
+ | for service tickets and proxy tickets. Proxy-granting tickets still require server-side storage, and
+ | a StorageService defined by the idp.cas.StorageService is used. Thus for deployers that do not require
+ | CAS proxy capabilities, no stateful storage mechanism is required; that means no memcached or database
+ | is required for HA deployments that want CAS (without proxy) support. A notable limitation of the new
+ | component is that the one-time use feature of service and proxy tickets is not available due to the lack
+ | of a ticket-tracking mechanism. Instead, tickets expire when their expiration period is exceeded.
+ | If this limitation is of concern, one may consider decreasing ticketValidityPeriod on the profile
+ | configuration from the default 15000ms.
+ -->
+ <alias name="encodingTicketService" alias="shibboleth.CASTicketService" />
+
+ <!--
+ | Uncomment the following element and comment out the above to enable the previous default ticket service
+ | that uses a StorageService for ticket persistence. Use this if the one-time use limitation of
+ | EncodingTicketService is problematic and can't be mitigated by decreasing ticketValidityPeriod.
+ -->
+ <!--<alias name="simpleTicketService" alias="shibboleth.CASTicketService" /> -->
+
+ <!--
+ | The predicate used to determine whether IdP session validation is performed during the process of granting
+ | a proxy ticket. When the predicate evaluates to true, an IdP session is resolved and validated prior to
+ | granting a proxy ticket. This feature prevents issuing proxy tickets when an IdP session is expired, but comes
+ | at the cost of requiring server-side storage of IdP session data. If this is configured to a predicate that
+ | evaluates to true under any condition, a server-side storage service must be enabled for IdP session
+ | storage. The most common non-default value is "alwaysTrue."
+ -->
+ <bean id="shibboleth.CASProxyValidateIdPSessionPredicate"
+ class="com.google.common.base.Predicates"
+ factory-method="alwaysFalse" />
+
+
+ <!-- ============== Advanced CAS Configuration ============== -->
+
+ <!-- Configure a third-party ticket service. -->
+ <!--
+ <bean id="shibboleth.CASTicketService"
+ class="org.example.idp.cas.CustomTicketService" />
+ -->
+
+ <!-- Configure a third-party proxy authenticator. -->
+ <!--
+ <bean id="shibboleth.CASProxyAuthenticator"
+ class="org.example.idp.cas.CustomProxyAuthenticator" />
+ -->
+</beans> \ No newline at end of file