Files
resourcespace/plugins/simplesaml/lib/metadata/saml20-sp-remote.php.dist
2025-07-18 16:20:14 +07:00

78 lines
2.7 KiB
Plaintext

<?php
/**
* SAML 2.0 remote SP metadata for SimpleSAMLphp.
*
* See: https://simplesamlphp.org/docs/stable/simplesamlphp-reference-sp-remote
*/
/*
* Example SimpleSAMLphp SAML 2.0 SP
*/
$metadata['https://saml2sp.example.org'] = [
'AssertionConsumerService' => [
[
'index' => 1,
'isDefault' => true,
'Location' => 'https://saml2.example.org/module.php/saml/sp/saml2-acs.php/default-sp',
'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
],
],
'SingleLogoutService' => [
[
'Location' => 'https://saml2sp.example.org/module.php/saml/sp/saml2-logout.php/default-sp',
'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect',
],
],
];
/*
* This example shows an example config that works with Google Workspace (G Suite / Google Apps) for education.
* What is important is that you have an attribute in your IdP that maps to the local part of the email address at
* Google Workspace. In example, if your Google account is foo.com, and you have a user that has an email john@foo.com,
* then you must properly configure the saml:AttributeNameID authproc-filter with the name of an attribute that for
* this user has the value of 'john'.
*/
$metadata['google.com'] = [
'AssertionConsumerService' => [
[
'index' => 1,
'isDefault' => true,
'Location' => 'https://www.google.com/a/g.feide.no/acs',
'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
],
],
'NameIDFormat' => 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
'authproc' => [
1 => [
'class' => 'saml:AttributeNameID',
'identifyingAttribute' => 'uid',
'Format' => 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress',
],
],
'simplesaml.attributes' => false,
];
$metadata['https://legacy.example.edu'] = [
'AssertionConsumerService' => [
[
'index' => 1,
'isDefault' => true,
'Location' => 'https://legacy.example.edu/saml/acs',
'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',
],
],
/*
* Currently, SimpleSAMLphp defaults to the SHA-256 hashing algorithm.
* Uncomment the following option to use SHA-1 for signatures directed
* at this specific service provider if it does not support SHA-256 yet.
*
* WARNING: SHA-1 is disallowed starting January the 1st, 2014.
* Please refer to the following document for more information:
* http://csrc.nist.gov/publications/nistpubs/800-131A/sp800-131A.pdf
*/
//'signature.algorithm' => 'http://www.w3.org/2000/09/xmldsig#rsa-sha1',
];