Name: shibboleth-oidc
Owner: Unicon, Inc.
Description: OpenID Connect support for the Shibboleth Identity Provider v3
Created: 2015-07-10 16:09:04.0
Updated: 2015-07-10 16:09:06.0
Pushed: 2015-07-13 16:30:22.0
Size: 2965
Language: Java
GitHub Committers
User | Most Recent Commit | # Commits |
---|
Other Committers
User | Most Recent Commit | # Commits |
---|
OpenIDConnect support for the Shibboleth Identity Provider version 3
We are working on adding support for the OpenID Connect protocol to the Shibboleth Identity Provider v3. Realistically, these are the items we are planning to address:
Note that no significant UI enhancements are taken into account. All configuration and changes are directly assumed to be applied to the IdP config without the presence of a web interface to facilitate. This includes administration and management of metadata, authZ codes and more.
The following may be considered in future versions:
MITREid Connect will be used as a starting point and a foundation on top of which adaptors will be built to close the gap.
In order to run the overlay build, examine the /conf/idp.properties
inside the idp-webapp-overlay
module,
and adjust the values of hostname, entityId, passwords, etc. Then from the command prompt, execute:
clean install -P new
This will wipe out any previous files inside credentials
and metadata
directories and start anew.
clean install
You will also need to set up a keystore under /etc/jetty
and name it thekeystore
. The keystore password and the key password should both be changeit
.
A sample keystore is provided under the idp-webapp-overlay/etc/jetty
directory that is empty, and can be used to set up the environment.
From the root directory, run the following command:
verify -Dhost=jetty
This will spin up an embedded Jetty server to load the IdP context. Remote debugging is available under port 5000 from your IDE.