You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: xt/testapp/README.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Access http://localhost:3000
33
33
34
34
### Run lighttpd to proxy https to the Saml2Test application
35
35
36
-
Many SAML2 Identity Providers will not allow the application (Service Provider) URL to be http and force you to specify https to use SAML2. lighttpd is used to listen on port 443 and use https protocol so that the Identity Provider can redirect or POST to a https site. lighttpd then proxies that communication to the Dancer application listening on port 3000.
36
+
Many SAML2 Identity Providers will not allow the application (Service Provider) URL to be http and forces you to specify https to use SAML2. lighttpd is used to listen on port 443 and use https protocol so that the Identity Provider can redirect or POST to a https site. lighttpd then proxies that communication to the Dancer application listening on port 3000.
37
37
38
38
1. cd xt/testapp
39
39
2. sudo lighttpd -D -f lighttpd.conf
@@ -42,11 +42,15 @@ Note that the command requires sudo to allow it to use the default https port of
42
42
43
43
TODO: maybe change it to use 8443
44
44
45
-
### Create your metadata.xml file
45
+
### Create your metadata.xml and cacert.pem file
46
46
47
-
Download the metadata for you configured application from your Identity Provider and save it to:
47
+
The testapp now supports a simplified automatic configuration for testing against multiple Identity Providers (IdPs).
48
48
49
-
xt/testapp/metadata.xml
49
+
1. Simply create a directory in xt/testapp/IdPs for the name of the IdP (eg. google)
50
+
2. Download the metadata from your IdP and save it as IdPs/google/metadata.xml
51
+
3. Download the cacert.pem from the IdP and save it as IdPs/google/cacert.pem
52
+
53
+
The index page will automatically list each configured Identity Provider as a link to initiate login against that IdP.
50
54
51
55
### Run lighttpd to deliver metadata.xml
52
56
@@ -55,7 +59,7 @@ Net::SAML2 requires access to a URL containing the metadata. The simplest metho
55
59
1. cd xt/testapp
56
60
2. lighttpd -D -f lighttpd-metadata.conf
57
61
58
-
The metadata has been configured to be available at: http://localhost:8880/metadata.xml.
62
+
The metadata has been configured to be available at: http://localhost:8880/metadata.xml. The simplified IdP configuration will automatically access the metadata.xml at http://localhost:8880/IdPs/googlee/metadata.xml (if you followed the instructions above and created the google directory in xt/testapp/IdPs)
59
63
60
64
Note that the configuration attempts to only deliver a file named metadata.xml from the xt/testapp directory. There are no guarantees - this is a test application so verify your own security.
0 commit comments