Changes between Version 32 and Version 33 of idpiam2018


Ignore:
Timestamp:
Sep 13, 2018, 9:32:51 AM (6 years ago)
Author:
admin
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • idpiam2018

    v32 v33  
    1313   
    1414
    15 2. Add to or Modify `/etc/hosts`:
     152. Modify `/etc/hosts`:
    1616   {{{
    1717vim /etc/hosts
     
    584584}}}
    585585* log in to your MySQL Server with `mysql -u root -p` and continue. Make sure to replace `##ROOT-DB-PASSWORD##`, `##USERNAME##`, `##PASSWORD##` with your own
    586 {{{#!sql
     586{{{#!mysql
    587587    SET NAMES 'utf8';
    588588
     
    718718       idp.session.secondaryServiceIndex = true
    719719}}}
    720        (This will indicate to IdP to store the data collected by User Consent into the "'''StorageRecords'''" table)
     720       (This will indicate to IdP to store the data collected by User Consent into the "'''!StorageRecords'''" table)
    721721
    722722
     
    726726If you host ldap in a seperate machine, copy the ldap_server.crt to  `/opt/shibboleth-idp/credentials`
    727727*
    728 {{{
     728{{{#!sh
    729729   vim /opt/shibboleth-idp/conf/ldap.properties
    730730}}}
    731731* Solution 1: LDAP + STARTTLS:
    732732
    733 {{{
     733{{{#!cfg
    734734       idp.authn.LDAP.authenticator = bindSearchAuthenticator
    735735       idp.authn.LDAP.ldapURL = ldap://idp.instXY.ac.lk:389
     
    738738       idp.authn.LDAP.sslConfig = certificateTrust
    739739       idp.authn.LDAP.trustCertificates = %{idp.home}/credentials/ldap-server.crt
    740        idp.authn.LDAP.baseDN = ou=people,dc=example,dc=org
     740       idp.authn.LDAP.baseDN = ou=people,dc=instXY,dc=ac,dc=lk
    741741       idp.authn.LDAP.userFilter = (uid={user})
    742        idp.authn.LDAP.bindDN = cn=admin,dc=example,dc=org
     742       idp.authn.LDAP.bindDN = cn=admin,dc=instXY,dc=ac,dc=lk
    743743       idp.authn.LDAP.bindDNCredential = ###LDAP_ADMIN_PASSWORD###
     744       idp.authn.LDAP.dnFormat = uid=%s,ou=people,dc=instXY,dc=ac,dc=lk
    744745       idp.attribute.resolver.LDAP.trustCertificates   = %{idp.authn.LDAP.trustCertificates:undefined}
    745746}}}
     
    753754       idp.authn.LDAP.useStartTLS = false
    754755       idp.authn.LDAP.useSSL = false
    755        idp.authn.LDAP.baseDN = ou=people,dc=example,dc=org
     756       idp.authn.LDAP.baseDN = ou=people,dc=instXY,dc=ac,dc=lk
    756757       idp.authn.LDAP.userFilter = (uid={user})
    757        idp.authn.LDAP.bindDN = cn=admin,dc=example,dc=org
     758       idp.authn.LDAP.bindDN = cn=admin,dc=instXY,dc=ac,dc=lk
    758759       idp.authn.LDAP.bindDNCredential = ###LDAP_ADMIN_PASSWORD###
     760       idp.authn.LDAP.dnFormat = uid=%s,ou=people,dc=instXY,dc=ac,dc=lk
    759761}}}       
    760762(If you decide to use the Solution 2, you have to remove (or comment out) the following code from your Attribute Resolver file: