The Shibboleth IdP V4 software will leave support on September 1, 2024.

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 25 Next »

File(s): conf/credentials.xml, conf/relying-party.xml, conf/idp.properties
Format: Native Spring, Property files.

Overview

There are multiple aspects of configuration that fall under the heading of security:

  • credentials (keys and certificates)

  • configuration and control of algorithms to use for signing or encryption (as well as verifying signatures and decryption)

  • "TrustEngines" used to evalate signatures and certificates during message processing

  • other steps that run during profile execution to evaluate messages

All of these settings are associated with profile or relying party behavior, so most of them are configured as part of the more general RelyingPartyConfiguration service, and as such are reloaded when that service is reloaded.

General Topics

Reference

Notes

The IdP defaults to the use of separate keypairs for signing and decryption, the latter being a capability that is rarely used at present and primarily comes into play only when processing <LogoutRequest> messages that contain an encrypted subject ID.

The default algorithms used have been updated to:

  • RSA or ECDSA (depending on key type) with SHA-256 digests

  • AES-CBC-128 with RSA-OAEP-MGF1 key transport

The IdP also supports a standardized SAML metadata extension that influences the algorithms it will use, based on the capabilities of the SP. For metadata under your control, using the extension to specify that SHA-1 is required is generally a better strategy than specifying it in a RelyingParty override, but often this isn't possible. We encourage deployers to ask their metadata sources (i.e., federations) about this capability, as it is critically important for dealing with future algorithm weaknesses that may emerge over time.

  • No labels