@@ -17,21 +17,21 @@ SHA-256 and signed authentication requests are mandatory. Optionally
1717you can add the ` sfo:selfserviceurl ` config parameter used in the
1818feedback message when a user does not have a token registered.
1919
20- $metadata['https://gateway.pilot.stepup.surfconext.nl/second-factor-only/metadata'] = [
21- 'certificate' => 'sa_pilot_saml_signing_certificate_pem.crt',
20+ ``` php
21+ $metadata['https://sa-gw.test.surfconext.nl/second-factor-only/metadata'] = [
22+ 'certificate' => 'sa_test_saml_signing_certificate_2020_pem.crt',
2223 'metadata-set' => 'saml20-idp-remote',
2324 'signature.algorithm' => 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256',
2425 'SingleSignOnService' => [
2526 0 => [
2627 'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect',
27- 'Location' => 'https://gateway.pilot.stepup .surfconext.nl/second-factor-only/single-sign-on',
28+ 'Location' => 'https://sa-gw.test .surfconext.nl/second-factor-only/single-sign-on',
2829 ]],
2930 'redirect.sign' => true,
30- // ssp has broken/fixed the fact that you could set this to null see #771
31- //'NameIDPolicy' => null,
32-
33- 'sfo:selfserviceUrl' => 'https://selfservice.pilot.stepup.surfconext.nl/',
31+
32+ 'sfo:selfserviceUrl' => 'https://sa.test.surfconext.nl/',
3433 ];
34+ ```
3535
3636Configuration of the authproc filter could be done in any place that supports
3737authproc filters, so it runs after the first factor has been authenticated.
@@ -45,6 +45,7 @@ attributes e.g. with the `core:AttributeAlter` filter. In the example the
4545existing uid attribute is prefixed with the right urn and stored in the
4646collabPersonId attribute. SFO is configured to read that attribute.
4747
48+ ``` php
4849 'authproc' => [
4950 // prepare attribute for sfo
5051 24 => [
@@ -62,22 +63,23 @@ collabPersonId attribute. SFO is configured to read that attribute.
6263 'subjectattribute' => 'collabPersonId',
6364
6465 // hosted sfo-sp metadata
65- 'entityid ' => 'https://example.org/',
66+ 'entityID ' => 'https://example.org/',
6667 'certificate' => 'example.crt',
6768 'privatekey' => 'example.key',
6869 'signature.algorithm' => 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256',
6970
7071 // entityid to be found in saml20-idp-remote
71- 'idpEntityid' => 'https://gateway.pilot.stepup .surfconext.nl/second-factor-only/metadata',
72+ 'idpEntityid' => 'https://sa-gw.test .surfconext.nl/second-factor-only/metadata',
7273
7374 // desired minimum loa
74- 'loa' => 'http://pilot .surfconext.nl/assurance/sfo-level2',
75+ 'loa' => 'http://test .surfconext.nl/assurance/sfo-level2',
7576
7677 // optional: list of remote entityids/requesterids for which SFO
7778 // should NOT be performed, instead they will just pass through.
7879 // 'skipentities' => [],
7980 ],
8081 ]
82+ ```
8183
8284If you use the module to protect an IdP, you will want to exclude at least the
8385token registration portal via the ` skipentities ` setting, if that portal uses
0 commit comments