mirror of
https://github.com/honeymoose/OpenSearch.git
synced 2025-02-06 13:08:29 +00:00
b8733eab00
The change replaces the Vagrant box based fixture with a fixture based on docker compose and 2 docker images, one for an openldap server and one for a Shibboleth SAML Identity Provider. The configuration of both openldap and shibboleth is identical to the previous one, in order to minimize required changes in the tests
71 lines
3.1 KiB
XML
71 lines
3.1 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<beans xmlns="http://www.springframework.org/schema/beans"
|
|
xmlns:context="http://www.springframework.org/schema/context"
|
|
xmlns:util="http://www.springframework.org/schema/util"
|
|
xmlns:p="http://www.springframework.org/schema/p"
|
|
xmlns:c="http://www.springframework.org/schema/c"
|
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
|
xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd
|
|
http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context.xsd
|
|
http://www.springframework.org/schema/util http://www.springframework.org/schema/util/spring-util.xsd"
|
|
|
|
default-init-method="initialize"
|
|
default-destroy-method="destroy">
|
|
|
|
<!--
|
|
Unverified RP configuration, defaults to no support for any profiles. Add <ref> elements to the list
|
|
to enable specific default profile settings (as below), or create new beans inline to override defaults.
|
|
|
|
"Unverified" typically means the IdP has no metadata, or equivalent way of assuring the identity and
|
|
legitimacy of a requesting system. To run an "open" IdP, you can enable profiles here.
|
|
-->
|
|
<bean id="shibboleth.UnverifiedRelyingParty" parent="RelyingParty">
|
|
<property name="profileConfigurations">
|
|
<list>
|
|
<bean parent="SAML2.SSO" p:encryptAssertions="false" p:postAuthenticationFlows="attribute-release" />
|
|
</list>
|
|
</property>
|
|
</bean>
|
|
|
|
<!--
|
|
Default configuration, with default settings applied for all profiles, and enables
|
|
the attribute-release consent flow.
|
|
-->
|
|
<bean id="shibboleth.DefaultRelyingParty" parent="RelyingParty">
|
|
<property name="profileConfigurations">
|
|
<list>
|
|
<bean parent="Shibboleth.SSO" p:postAuthenticationFlows="attribute-release" />
|
|
<ref bean="SAML1.AttributeQuery" />
|
|
<ref bean="SAML1.ArtifactResolution" />
|
|
<bean parent="SAML2.SSO" p:postAuthenticationFlows="attribute-release" />
|
|
<ref bean="SAML2.ECP" />
|
|
<ref bean="SAML2.Logout" />
|
|
<ref bean="SAML2.AttributeQuery" />
|
|
<ref bean="SAML2.ArtifactResolution" />
|
|
<ref bean="Liberty.SSOS" />
|
|
</list>
|
|
</property>
|
|
</bean>
|
|
|
|
<!-- Container for any overrides you want to add. -->
|
|
|
|
<util:list id="shibboleth.RelyingPartyOverrides">
|
|
|
|
<!--
|
|
Override example that identifies a single RP by name and configures it
|
|
for SAML 2 SSO without encryption. This is a common "vendor" scenario.
|
|
-->
|
|
<!--
|
|
<bean parent="RelyingPartyByName" c:relyingPartyIds="https://sp.example.org">
|
|
<property name="profileConfigurations">
|
|
<list>
|
|
<bean parent="SAML2.SSO" p:encryptAssertions="false" />
|
|
</list>
|
|
</property>
|
|
</bean>
|
|
-->
|
|
|
|
</util:list>
|
|
|
|
</beans>
|