13
I Use This!
Activity Not Available

News

Posted over 16 years ago by Andreas Åkre Solberg
I've configured a new service: read more
Posted over 16 years ago by Andreas Åkre Solberg
I've earlier ran experimental customized code for acting as the Feide BE. But today I tested to setup a clean installation of simpleSAMLphp with a few lines of configuration. The R-BE is the very same version of simpleSAMLphp that you can download ... [More] from svn form the simpleSAMLphp project page. New functionality I've added today to make this work smoother: RedIRIS was sending attributes in the form of mulitple attributestatements instead of multiple attributes which is more normal. So I improved the attribute traversal code of simpleSMALphp to handle this correctly. I've made the attribute name mapping, and attribute release policy code that I yesterday added for SAML 2.0, to work with the Shibboleth part. And then I configured a attribute name mapping schema for translating a few eduGAIN attributes to Feide namespace. I needed a WAYF. I already had a SAML 2.0 IdP discovery service. I improved the SAML 2.0 IdP Discovery service to also work with the Shibboleth, and then also eduGAIN. [Less]
Posted over 16 years ago by Andreas Åkre Solberg
Do you need software to run as an identity provider for Google Apps for education? If you have an LDAP, Radius or SQL, all you need is simpleSAMLphp to make Google Apps authenticate through your user storage. Today I wrote a dedicated documentation article for the purpose of setting up an IdP for Google Apps for [...]
Posted over 16 years ago by Andreas Åkre Solberg
Do you need software to run as an identity provider for Google Apps for education? If you have an LDAP, Radius or SQL, all you need is simpleSAMLphp to make Google Apps authenticate through your user storage. Today I wrote a dedicated documentation ... [More] article for the purpose of setting up an IdP for Google Apps for Education: [ Setting up a simpleSAMLphp SAML 2.0 IdP to use with Google Apps for Education ] [Less]
Posted over 16 years ago by Andreas Åkre Solberg
I’ve added support for attribute release policies (distribguish attribute release per SP) and attribute name mapping tables (used for bridging). Checked into svn, but not yet documented. Credits to contributor Lukas Hammerle from SWITCH for example code and ideas on this topic.
Posted over 16 years ago by Andreas Åkre Solberg
I’ve started to add some code for multilingual support in simpleSAMLphp (in subversion). I’ve also added support for multiple template set… Included are templates/default/en for all english templates in the default template set. If we want to style ... [More] a norwegian template for Feide, we use templates/feide/no, and configure ‘templatedir’ => ‘templates/default’ in config.php. [Less]
Posted over 16 years ago by Andreas Åkre Solberg
Changelog: Documentation is updated! - check it out! Metadata files have been more tidy. Removed unused entries. Look at the new templates on how to change your existing metadata. Support for sending metadata on mail to Feide. Automatically ... [More] detecting if you have configured Feide as the default IdP. Improved SAML 2.0 Metadata generation Added support for Shibboleth 1.3 IdP functionality. Added [...] [Less]
Posted over 16 years ago by Andreas Åkre Solberg
I implemented some early proof of concept functionality in simpleSAMLphp for user consent on attribute release. That means, every time attributes are sent to a service, the user is asked wether this is OK or not.
Posted over 16 years ago by Andreas Åkre Solberg
An SAML 2.0 IdP Discovery Service works like a WAYF in shibboleth, it asks the user which identity provider to use for authenticaiton. For Feide services, this means there is a built in functionality with UI in simpleSAMLphp to select between ... [More] authentication with Feide and MinID. The code is checked into subversion. To enable the IdP discovery [...] [Less]
Posted over 16 years ago by Andreas Åkre Solberg
The new authentication module in simpleSAMLphp allows you to include a dropdown meny where the user selects organization. Each organization can be mapped to a separate LDAP configuration.