The Shibboleth V1 software has reached its End of Life and is no longer supported. This documentation is available for historical purposes only.
UnderstandingShibboleth
Understanding Shibboleth
Shibboleth Introduction: A basic introduction to Shibboleth.
DeploymentBackground: Introductory information for performing a deployment of Shibboleth.
ShibbolethWalkthrough: Take a detailed technical tour through the Shibboleth software.
MetaData: Overview of how SAML 2.0 metadata is used in the Shibboleth software.
KeysAndCertificates: A detailed discussion of the variety of keys and certificates found in a typical deployment.
TrustManagement: Discussion of how keys and certificates are evaluated by Shibboleth software.
AttributeNaming: Suggestions on the proper way to name attributes for SAML expression.
Understanding IdP Features and Issues
add content
Understanding SP Features and Issues
RedirectGeneration: Shibboleth and its web environment must be properly configured for redirects to work
ServiceProviderHandler: URL-invoked functions implemented by the SP software
SessionInitiator: Handler function that handles the creation of an AuthnRequest, may be triggered automatically when accessing protected content or by an application at runtime
AttributeAcceptancePolicy: Defines attributes and rules for processing them by an SP
AddressChecking: Policies applied by the SP to enforce a consistent client network address across requests, making session theft harder by requiring source address spoofing
RelayState: Mechanism for SP to remember information about the resource request during an AuthnRequest
SpoofingBug: Details regarding potential vulnerabilities arising from header spoofing.