...
Name | Cardinality | Description | |
---|---|---|---|
Application | Application | ||
<Sessions> | 1 | 0 or 1 | Configures the session handling behavior for the application, as well as all of the supported processing handlers and their locations. |
<Errors> | 0 or 1 | Configures error-handling behavior and a few logout-related responses | |
<RelyingParty> | 0 or more | Overrides low-level communication settings for specific IdPs or groups of IdPs | |
<Notify> | 0 or more | Configures application notification of logout or name identifier management messages. | |
<MetadataProvider> | 1 or more | 0 or more | Details how to load metadata about identity providers. |
< TrustEngine> | 0 or more | Controls how trust processing is performed to determine whether authentication of messages from identity providers succeeds or fails, including XML and simple signing, and SSL/TLS. | |
<AttributeExtractor > | 0 or more | Controls how SAML attributes are decoded and exposed to applications. | |
<AttributeResolver > | 0 or more | Controls access to other data sources for attribute information. Primary use is for support of SAML queries to an identity provider for attributes if none are received in the initial assertion. When absent, the SP will not query for attributes. | |
<AttributeFilter > | 0 or more | Applies rules that filter out unacceptable attribute information. | |
<CredentialResolver> | 0 or more | Configures the private keys and certificates used by the SP. This is NOT related to the normal SSL/TLS server support provided by web servers. | |
<ApplicationOverride> | 0 or more | 0 | Overrides default behavior by nesting exceptional configuration elements. |
<ExternalApplicationOverrides> | 0 or more | 0 | Overrides default behavior through external XML fragments in one or more search paths |