Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Difference between revisions of "SAML2 IdP 1.0"

(New page: {{#eclipseproject:technology.higgins}} == Version 1.0 == * This page describes the Higgins 1.0 SAML2 IdP Solution * See SAML2 IdP 1.1 for the version currently under development ==Int...)
 
(Deployer Perspective)
Line 28: Line 28:
 
===Download===
 
===Download===
  
See http://wiki.eclipse.org/SAML2_IdP_Deployment_1.0#Obtain_.WAR_files.
+
See [[SAML2_IdP_Deployment_1.0#Obtain_.WAR_files]].
  
 
===Deploying===
 
===Deploying===
  
See http://wiki.eclipse.org/SAML2_IdP_Deployment_1.0#Deploy_the_web_applications_on_Tomcat.
+
See [[SAML2_IdP_Deployment_1.0#Deploy_the_web_applications_on_Tomcat]].
  
 
===Configuration===
 
===Configuration===
  
See http://wiki.eclipse.org/SAML2_IdP_Deployment_1.0#Configure_the_web_applications.
+
See [[SAML2_IdP_Deployment_1.0#Configure_the_web_applications]].
  
 
==Developer Perspective==
 
==Developer Perspective==

Revision as of 12:51, 3 July 2008

{{#eclipseproject:technology.higgins}}

Version 1.0

  • This page describes the Higgins 1.0 SAML2 IdP Solution
  • See SAML2 IdP 1.1 for the version currently under development

Introduction

The Higgins SAML2 IdP supports the SP-initiated SSO profile defined by SAML 2.0 specifications. Two parties are involved in this profile: A service provider (relying party, SP), and an identity provider (IdP). The SP offers protected services and relies on the IdP to authenticate users.

See SAML2 IdP Overview 1.0 for a detailed description of the SAML2 IdP solution's functionality.

An instance of the SAML2 IdP is deployed at https://graceland.parityinc.net/saml2idp-test/.

End-User Perspective

Functionality

The SAML2 IdP allows users to sign in to SPs (relying parties) using their credentials at some IdP.

Setup

The end user does not have to set up anything. The process is triggered by the end user trying to sign in at a SP.

Deployer Perspective

See SAML2 IdP Deployment 1.0 for a detailed description of how to download and deploy the SAML2 IdP.

Download

See SAML2_IdP_Deployment_1.0#Obtain_.WAR_files.

Deploying

See SAML2_IdP_Deployment_1.0#Deploy_the_web_applications_on_Tomcat.

Configuration

See SAML2_IdP_Deployment_1.0#Configure_the_web_applications.

Developer Perspective

See SAML2 IdP Development 1.0 for a detailed description of how to set up your development environment for the SAML2 IdP solution.

Architecture

The SAML2 IdP solution consists of two web applications (the actual IdP, and an example SP). They support the SP-initiated SAML 2.0 SSO profile:

Saml2idp-1.png

See http://www.oasis-open.org/committees/security/ for more details about the SAML 2.0 protocol.

The Higgins components used by this solution are:

  • plugins/org.eclipse.higgins.configuration.api
  • plugins/org.eclipse.higgins.configuration.common
  • plugins/org.eclipse.higgins.configuration.xml
  • plugins/org.eclipse.higgins.configuration.xrds
  • plugins/org.eclipse.higgins.idas.api
  • plugins/org.eclipse.higgins.idas.common
  • plugins/org.eclipse.higgins.cp.jndi
  • plugins/org.eclipse.higgins.idas.registry
  • plugins/org.eclipse.higgins.idas.spi
  • plugins/org.eclipse.higgins.messages
  • plugins/org.eclipse.higgins.saml2idp.saml2
  • plugins/org.eclipse.higgins.util.idas.cp
  • plugins/org.eclipse.higgins.util.jscript
  • plugins/org.eclipse.higgins.util.socket

Building

The two web applications that constitute the SAML2 IdP are:

  • app/org.eclipse.higgins.saml2idp.server
  • app/org.eclipse.higgins.saml2idp.test

These projects, as well as their dependencies, can be checked out from the Eclipse repository at the following SVN URI:

svn://dev.eclipse.org/svnroot/technology

Future Work

See Also

Back to the top