forked from ISTI-ansible-roles/ansible-roles
140 lines
5.3 KiB
PHP
140 lines
5.3 KiB
PHP
<?php
|
|
|
|
$config = [
|
|
|
|
// This is a authentication source which handles admin authentication.
|
|
'admin' => [
|
|
// The default is to use core:AdminPassword, but it can be replaced with
|
|
// any authentication source.
|
|
|
|
'core:AdminPassword',
|
|
],
|
|
|
|
|
|
// An authentication source which can authenticate against both SAML 2.0
|
|
// and Shibboleth 1.3 IdPs.
|
|
'default-sp' => [
|
|
'saml:SP',
|
|
|
|
// The entity ID of this SP.
|
|
// Can be NULL/unset, in which case an entity ID is generated based on the metadata URL.
|
|
'entityID' => null,
|
|
|
|
// The entity ID of the IdP this SP should contact.
|
|
// Can be NULL/unset, in which case the user will be shown a list of available IdPs.
|
|
'idp' => null,
|
|
|
|
// The URL to the discovery service.
|
|
// Can be NULL/unset, in which case a builtin discovery service will be used.
|
|
'discoURL' => null,
|
|
|
|
/*
|
|
* The attributes parameter must contain an array of desired attributes by the SP.
|
|
* The attributes can be expressed as an array of names or as an associative array
|
|
* in the form of 'friendlyName' => 'name'. This feature requires 'name' to be set.
|
|
* The metadata will then be created as follows:
|
|
* <md:RequestedAttribute FriendlyName="friendlyName" Name="name" />
|
|
*/
|
|
/*
|
|
'name' => [
|
|
'en' => 'A service',
|
|
'no' => 'En tjeneste',
|
|
],
|
|
|
|
'attributes' => [
|
|
'attrname' => 'urn:oid:x.x.x.x',
|
|
],
|
|
'attributes.required' => [
|
|
'urn:oid:x.x.x.x',
|
|
],
|
|
*/
|
|
],
|
|
|
|
{% if simplesaml_use_ldap %}
|
|
// Example of a LDAP authentication source.
|
|
'{{ simplesaml_ldap_name }}' => [
|
|
'ldap:LDAP',
|
|
|
|
// Give the user an option to save their username for future login attempts
|
|
// And when enabled, what should the default be, to save the username or not
|
|
//'remember.username.enabled' => false,
|
|
//'remember.username.checked' => false,
|
|
|
|
// The hostname of the LDAP server.
|
|
'hostname' => '{{ simplesaml_ldap_host }}',
|
|
|
|
// Whether SSL/TLS should be used when contacting the LDAP server.
|
|
'enable_tls' => {{ simplesaml_ldap_enable_tls }},
|
|
|
|
// Whether debug output from the LDAP library should be enabled.
|
|
// Default is FALSE.
|
|
'debug' => {{ simplesaml_ldap_debug }},
|
|
|
|
// The timeout for accessing the LDAP server, in seconds.
|
|
// The default is 0, which means no timeout.
|
|
'timeout' => {{ simplesaml_ldap_server_timeout }},
|
|
|
|
// The port used when accessing the LDAP server.
|
|
// The default is 389.
|
|
'port' => {{ simplesaml_ldap_server_port }},
|
|
|
|
// Set whether to follow referrals. AD Controllers may require FALSE to function.
|
|
'referrals' => true,
|
|
|
|
// Which attributes should be retrieved from the LDAP server.
|
|
// This can be an array of attribute names, or NULL, in which case
|
|
// all attributes are fetched.
|
|
'attributes' => null,
|
|
|
|
// The pattern which should be used to create the users DN given the username.
|
|
// %username% in this pattern will be replaced with the users username.
|
|
//
|
|
// This option is not used if the search.enable option is set to TRUE.
|
|
'dnpattern' => '{{ simplesaml_ldap_dnpattern }}',
|
|
|
|
// As an alternative to specifying a pattern for the users DN, it is possible to
|
|
// search for the username in a set of attributes. This is enabled by this option.
|
|
'search.enable' => {{ simplesaml_ldap_search_enabled }},
|
|
|
|
// The DN which will be used as a base for the search.
|
|
// This can be a single string, in which case only that DN is searched, or an
|
|
// array of strings, in which case they will be searched in the order given.
|
|
'search.base' => '{{ simplesaml_ldap_search_base }}',
|
|
|
|
// The attribute(s) the username should match against.
|
|
//
|
|
// This is an array with one or more attribute names. Any of the attributes in
|
|
// the array may match the value the username.
|
|
'search.attributes' => {{ simplesaml_ldap_search_attributes }},
|
|
|
|
{% if simplesaml_ldap_search_filter_enabled %}
|
|
// Additional LDAP filters appended to the search attributes
|
|
'search.filter' => '{{ simplesaml_ldap_search_filter }}',
|
|
{% endif %}
|
|
// The username & password the SimpleSAMLphp should bind to before searching. If
|
|
// this is left as NULL, no bind will be performed before searching.
|
|
{% if simplesaml_ldap_auth_bind %}
|
|
'search.username' => '{{ simplesaml_ldap_search_username }}',
|
|
'search.password' => '{{ simplesaml_ldap_search_password }}',
|
|
{% else %}
|
|
'search.username' => null,
|
|
'search.password' => null,
|
|
{% endif %}
|
|
|
|
// If the directory uses privilege separation,
|
|
// the authenticated user may not be able to retrieve
|
|
// all required attribures, a privileged entity is required
|
|
// to get them. This is enabled with this option.
|
|
'priv.read' => false,
|
|
|
|
// The DN & password the SimpleSAMLphp should bind to before
|
|
// retrieving attributes. These options are required if
|
|
// 'priv.read' is set to TRUE.
|
|
'priv.username' => null,
|
|
'priv.password' => null,
|
|
|
|
],
|
|
{% endif %}
|
|
|
|
];
|