The Shibboleth V1 software has reached its End of Life and is no longer supported. This documentation is available for historical purposes only.
UnderstandingShibboleth
Understanding Shibboleth
- Shibboleth Introduction: A basic introduction to Shibboleth.
- DeploymentBackground: Introductory information for performing a deployment of Shibboleth.
- ShibbolethWalkthrough: Take a detailed technical tour through the Shibboleth software.
- MetaData: Overview of how SAML 2.0 metadata is used in the Shibboleth software.
- KeysAndCertificates: A detailed discussion of the variety of keys and certificates found in a typical deployment.
- TrustManagement: Discussion of how keys and certificates are evaluated by Shibboleth software.
- AttributeNaming: Suggestions on the proper way to name attributes for SAML expression.
Understanding IdP Features and Issues
add content
Understanding SP Features and Issues
- RedirectGeneration: Shibboleth and its web environment must be properly configured for redirects to work
- ServiceProviderHandler: URL-invoked functions implemented by the SP software
- SessionInitiator: Handler function that handles the creation of an AuthnRequest, may be triggered automatically when accessing protected content or by an application at runtime
- AttributeAcceptancePolicy: Defines attributes and rules for processing them by an SP
- AddressChecking: Policies applied by the SP to enforce a consistent client network address across requests, making session theft harder by requiring source address spoofing
- RelayState: Mechanism for SP to remember information about the resource request during an AuthnRequest
- SpoofingBug: Details regarding potential vulnerabilities arising from header spoofing.