Skip to content

Commit 89e9b77

Browse files
committed
Update docs for current test env
1 parent fb3029d commit 89e9b77

1 file changed

Lines changed: 12 additions & 10 deletions

File tree

docs/stepupsfo.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,21 +17,21 @@ SHA-256 and signed authentication requests are mandatory. Optionally
1717
you can add the `sfo:selfserviceurl` config parameter used in the
1818
feedback message when a user does not have a token registered.
1919

20-
$metadata['https://gateway.pilot.stepup.surfconext.nl/second-factor-only/metadata'] = [
21-
'certificate' => 'sa_pilot_saml_signing_certificate_pem.crt',
20+
```php
21+
$metadata['https://sa-gw.test.surfconext.nl/second-factor-only/metadata'] = [
22+
'certificate' => 'sa_test_saml_signing_certificate_2020_pem.crt',
2223
'metadata-set' => 'saml20-idp-remote',
2324
'signature.algorithm' => 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256',
2425
'SingleSignOnService' => [
2526
0 => [
2627
'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect',
27-
'Location' => 'https://gateway.pilot.stepup.surfconext.nl/second-factor-only/single-sign-on',
28+
'Location' => 'https://sa-gw.test.surfconext.nl/second-factor-only/single-sign-on',
2829
]],
2930
'redirect.sign' => true,
30-
// ssp has broken/fixed the fact that you could set this to null see #771
31-
//'NameIDPolicy' => null,
32-
33-
'sfo:selfserviceUrl' => 'https://selfservice.pilot.stepup.surfconext.nl/',
31+
32+
'sfo:selfserviceUrl' => 'https://sa.test.surfconext.nl/',
3433
];
34+
```
3535

3636
Configuration of the authproc filter could be done in any place that supports
3737
authproc filters, so it runs after the first factor has been authenticated.
@@ -45,6 +45,7 @@ attributes e.g. with the `core:AttributeAlter` filter. In the example the
4545
existing uid attribute is prefixed with the right urn and stored in the
4646
collabPersonId attribute. SFO is configured to read that attribute.
4747

48+
```php
4849
'authproc' => [
4950
// prepare attribute for sfo
5051
24 => [
@@ -62,22 +63,23 @@ collabPersonId attribute. SFO is configured to read that attribute.
6263
'subjectattribute' => 'collabPersonId',
6364

6465
// hosted sfo-sp metadata
65-
'entityid' => 'https://example.org/',
66+
'entityID' => 'https://example.org/',
6667
'certificate' => 'example.crt',
6768
'privatekey' => 'example.key',
6869
'signature.algorithm' => 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256',
6970

7071
// entityid to be found in saml20-idp-remote
71-
'idpEntityid' => 'https://gateway.pilot.stepup.surfconext.nl/second-factor-only/metadata',
72+
'idpEntityid' => 'https://sa-gw.test.surfconext.nl/second-factor-only/metadata',
7273

7374
// desired minimum loa
74-
'loa' => 'http://pilot.surfconext.nl/assurance/sfo-level2',
75+
'loa' => 'http://test.surfconext.nl/assurance/sfo-level2',
7576

7677
// optional: list of remote entityids/requesterids for which SFO
7778
// should NOT be performed, instead they will just pass through.
7879
// 'skipentities' => [],
7980
],
8081
]
82+
```
8183

8284
If you use the module to protect an IdP, you will want to exclude at least the
8385
token registration portal via the `skipentities` setting, if that portal uses

0 commit comments

Comments
 (0)