Even with Shibboleth SP installed, a Service Provider only becomes useful after registering it into a federation.
The Tuakiri federations to consider are:
This document will cover adding a Service Provider to the Tuakiri or Tuakiri-TEST federation.
Federation name | Tuakiri | Tuakiri TEST |
---|---|---|
Metadata name | tuakiri.ac.nz |
test.tuakiri.ac.nz |
Metadata distribution point | https://directory.tuakiri.ac.nz/metadata/tuakiri-metadata-signed.xml | https://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-signed.xml |
Metadata signing certificate | https://directory.tuakiri.ac.nz/metadata/tuakiri-metadata-cert.pem | https://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-cert.pem |
Federation Registry URL | https://registry.tuakiri.ac.nz/federationregistry/ | https://registry.test.tuakiri.ac.nz/federationregistry/ |
Discovery Service / WAYF URL | https://directory.tuakiri.ac.nz/ds/DS | https://directory.test.tuakiri.ac.nz/ds/DS |
Note
In order to register a Service Provider with the Federation Registry, it is highly recommended that you are able to log in with a user account authorised by an IdP or Virtual Home already registered with the federation.It is possible to add an SP to the federation without an account but to become the administrator of that SP or later review the SP registration entry or to make any changes (in the textual description or the technical details - endpoint URLs, certificates, attributes required, etc), you will need an account.
Navigate to the Tuakiri federation management site https://registry.tuakiri.ac.nz/federationregistry (or, for Tuakiri-TEST federation, https://registry.test.tuakiri.ac.nz/federationregistry).
If you do not have an account with an IdP registered in the federation and you do not have an account with the Tuakiri VHO, start the SP registration (without logging in), by clicking the Create Service Provider link in the blue menu bar.
Otherwise, click Login and login using your IdP. Start the registration by clicking Subscribers > Service Providers > Create.
The registration form first displays a check-list of required information. Please check that you have all the information the check-list asks for readily available, otherwise the registration form may time out while you gather missing information.
Please note that on the registration form, you’ll be asked to select the organization you are registering the SP under. If you have not registered your organization into Tuakiri (or Tuakiri-TEST) yet, please complete that process first, following our instructions for Creating an Organization in the Tuakiri Federation.
If you are filling this form without having logged in, you’ll have to enter your details: Given Name, Surname and Email (otherwise, these are prefilled). (Do not use a shared mailbox, alias or mailing list when entering an email address because the confirmation email contains a single-use link and may cause some confusion should more than one person attempt to use it.)
[http://sp.example.org](http://sp.example.org)
. The service URL is typically the base URL for accessing the Service Provider. (Required)**[https://sp.example.org](https://sp.example.org)**
. The Federation Registry will automatically create all of the SAML2 endpoints from this base URL. You can skip over the Advanced SAML2 Registration section.Copy and paste in the back-channel certificate(s) generated when installing the Shibboleth SP software.
For Shibboleth SP 2.x, the certificate is usually located in /etc/shibboleth/sp-cert.pem
.
Note
Starting with Shibboleth 3.0, the two separate certificates are generated for encryption and signing. These certificates are stored as/etc/shibboleth/sp-signing-cert.pem
and/etc/shibboleth/sp-encrypt-cert.pem
As of October 2018, Federation Registry supports including separate signing and encryption certificates on the registration form. If you are registering an SP that has a single certificate used for both signing and encryption, copy the same certificate into both fields. If your SP does not support encryption, leave the encryption certificate field blank (but a signing certificate is required).
When pasting the certificate into the form, please take care that no line breaks, spaces or other characters are introduced during the cut-paste process.
Please note that it is highly recommended that the CN
in the certificate matches the hostname the service provider is being registered under. If this is an alias and your system thinks of itself with a different hostname, we recommend you instead generate a new certificate with the correct hostname: run the following, substituting the externally visible hostname for sp.example.org
:
cd /etc/shibboleth
# for a Shibboleth 2.x system:
./keygen.sh -f -u shibd -g shibd -y 20 -h sp.example.org -e https://sp.example.org/shibboleth
# or for a Shibboleth 3.x system:
./keygen.sh -f -n sp-signing -u shibd -g shibd -y 20 -h sp.example.org -e https://sp.example.org/shibboleth
./keygen.sh -f -n sp-encrypt -u shibd -g shibd -y 20 -h sp.example.org -e https://sp.example.org/shibboleth
Select the attributes Requested and mark which are Required. For each attribute requested give a good explanation for why the attribute is requested. This information will later be displayed to users as justification for why the information is being released.
Note
Persistent NameIDPlease note that with the IdPv3 upgrade, Tuakiri is moving from passing Persistent NameIDs in the eduPersonTargetedID attribute to passing them as a Persistent SAML2 NameID. When registering a new SP requesting a persistent NameID, please request both the eduPersonTargetedID attribute (for interoperability with existing V2 IdPs), as well as NameID of Persistent format. You will be able to add the SAML 2.0 Persistent NameIDFormat after your SP registration is approved - or please get in touch with the Tuakiri Support.
Note
schac attributesPlease note that as of 2.6.0, Shibboleth SP includes attributes from the schac schema in the default configuration. The names used for the attributes there are slightly different from what has been used in the attribute-map.xml file provided by Tuakiri for use with earlier versions of Shibboleth SP. For compatibility with 2.6.0, we have adjusted the names in attribute-map.xml to match the names used by the 2.6.0 default configuration.
homeOrganization is becoming schacHomeOrganization
homeOrganizationType is becoming schacHomeOrganizationType
Note
eduPersonEntitlement attributePlease note: if intending to request the eduPersonEntitlement attribute, you cannot add the attribute to the list of requested attributes on the registration page; you’ll have to add it separately later.
Also, because of the nature of this attribute, you also have to include a specific requested value (or a regular expression matching a set of values), but an eduPersonEntitlement attribute request without specific values is not considered complete and will be ignored by the Federation Registry.
Note
Please note: Once the registration is approved, the Federation Registry will send an email with an invite code to claim administrative rights over the SP being registered.It is important to follow the instructions in the email to get the administrative privileges over the SP. These privileges are required for making any subsequent changes to the SP registration.
Note that the invite code can only be used once - but once the original recipient has administrative privileges, these can be used to grant the same administrative privileges to additional users as required.
If your SP should support ECP (access via non-browser clients), then also register support for ECP:
urn:oasis:names:tc:SAML:2.0:bindings:PAOS
[https://sp.example.org/Shibboleth.sso/SAML2/ECP](https://sp.example.org/Shibboleth.sso/SAML2/ECP)
(substituting sp.example.org
with your SP hostname)4
(value 4
matches the value in the Shibboleth SP internal metadata in the default configuration)/etc/shibboleth/shibboleth2.xml
file.For full information (including setup instructions for a new install), please see Installing Shibboleth SP on RedHat based Linux
The key part of it (relevant for an already setup SP just joining Tuakiri) is:
/etc/shibboleth
:
For Tuakiri, run:
wget https://directory.tuakiri.ac.nz/metadata/tuakiri-metadata-cert.pem -O /etc/shibboleth/tuakiri-metadata-cert.pem
or for Tuakiri-TEST, run:
wget https://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-cert.pem -O /etc/shibboleth/tuakiri-test-metadata-cert.pem
/etc/shibboleth/shibboleth2.xml
just above the sample (commented-out) MetadataProvider
element.
For Tuakiri add:
<MetadataProvider type="XML" url="https://directory.tuakiri.ac.nz/metadata/tuakiri-metadata-signed.xml"
backingFilePath="metadata.tuakiri.xml" reloadInterval="7200" validate="true">
<MetadataFilter type="RequireValidUntil" maxValidityInterval="2419200"/>
<MetadataFilter type="Signature" certificate="tuakiri-metadata-cert.pem" verifyBackup="false"/>
</MetadataProvider>
For Tuakiri-TEST, add instead:
<MetadataProvider type="XML" url="https://directory.test.tuakiri.ac.nz/metadata/tuakiri-test-metadata-signed.xml"
backingFilePath="metadata.tuakiri-test.xml" reloadInterval="7200" validate="true">
<MetadataFilter type="RequireValidUntil" maxValidityInterval="2419200"/>
<MetadataFilter type="Signature" certificate="tuakiri-test-metadata-cert.pem" verifyBackup="false"/>
</MetadataProvider>