[ // The default is to use core:AdminPassword, but it can be replaced with // any authentication source. 'core:AdminPassword', ], // An authentication source which can authenticate against both SAML 2.0 // and Shibboleth 1.3 IdPs. 'default-sp' => [ 'saml:SP', // The entity ID of this SP. // Can be NULL/unset, in which case an entity ID is generated based on the metadata URL. 'entityID' => null, // The entity ID of the IdP this SP should contact. // Can be NULL/unset, in which case the user will be shown a list of available IdPs. 'idp' => null, // The URL to the discovery service. // Can be NULL/unset, in which case a builtin discovery service will be used. 'discoURL' => null, /* * The attributes parameter must contain an array of desired attributes by the SP. * The attributes can be expressed as an array of names or as an associative array * in the form of 'friendlyName' => 'name'. This feature requires 'name' to be set. * The metadata will then be created as follows: * */ /* 'name' => [ 'en' => 'A service', 'no' => 'En tjeneste', ], 'attributes' => [ 'attrname' => 'urn:oid:x.x.x.x', ], 'attributes.required' => [ 'urn:oid:x.x.x.x', ], */ ], {% if simplesaml_use_ldap %} // Example of a LDAP authentication source. '{{ simplesaml_ldap_name }}' => [ 'ldap:LDAP', // Give the user an option to save their username for future login attempts // And when enabled, what should the default be, to save the username or not //'remember.username.enabled' => false, //'remember.username.checked' => false, // The hostname of the LDAP server. 'hostname' => '{{ simplesaml_ldap_host }}', // Whether SSL/TLS should be used when contacting the LDAP server. 'enable_tls' => {{ simplesaml_ldap_enable_tls }}, // Whether debug output from the LDAP library should be enabled. // Default is FALSE. 'debug' => {{ simplesaml_ldap_debug }}, // The timeout for accessing the LDAP server, in seconds. // The default is 0, which means no timeout. 'timeout' => {{ simplesaml_ldap_server_timeout }}, // The port used when accessing the LDAP server. // The default is 389. 'port' => {{ simplesaml_ldap_server_port }}, // Set whether to follow referrals. AD Controllers may require FALSE to function. 'referrals' => true, // Which attributes should be retrieved from the LDAP server. // This can be an array of attribute names, or NULL, in which case // all attributes are fetched. 'attributes' => null, // The pattern which should be used to create the users DN given the username. // %username% in this pattern will be replaced with the users username. // // This option is not used if the search.enable option is set to TRUE. 'dnpattern' => '{{ simplesaml_ldap_dnpattern }}', // As an alternative to specifying a pattern for the users DN, it is possible to // search for the username in a set of attributes. This is enabled by this option. 'search.enable' => {{ simplesaml_ldap_search_enabled }}, // The DN which will be used as a base for the search. // This can be a single string, in which case only that DN is searched, or an // array of strings, in which case they will be searched in the order given. 'search.base' => '{{ simplesaml_ldap_search_base }}', // The attribute(s) the username should match against. // // This is an array with one or more attribute names. Any of the attributes in // the array may match the value the username. 'search.attributes' => {{ simplesaml_ldap_search_attributes }}, {% if simplesaml_ldap_search_filter_enabled %} // Additional LDAP filters appended to the search attributes 'search.filter' => '{{ simplesaml_ldap_search_filter }}', {% endif %} // The username & password the SimpleSAMLphp should bind to before searching. If // this is left as NULL, no bind will be performed before searching. {% if simplesaml_ldap_auth_bind %} 'search.username' => '{{ simplesaml_ldap_search_username }}', 'search.password' => '{{ simplesaml_ldap_search_password }}', {% else %} 'search.username' => null, 'search.password' => null, {% endif %} // If the directory uses privilege separation, // the authenticated user may not be able to retrieve // all required attribures, a privileged entity is required // to get them. This is enabled with this option. 'priv.read' => false, // The DN & password the SimpleSAMLphp should bind to before // retrieving attributes. These options are required if // 'priv.read' is set to TRUE. 'priv.username' => null, 'priv.password' => null, ], {% endif %} ];