This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Configuring Shibboleth IdP as a Trusted Identity Provider
You can configure a SAML2 SSO web application with the WSO2 Identity Server. In this scenario, users authenticate to the Identity Server by providing their username and password. These credentials must be authenticated with the enterprise user store that is deployed with the Identity Server, making it such that only users that exist in the enterprise user store can access the web application.
Consider a scenario where the web application must also be accessed by the users from some other partner organization in addition to the users in the enterprise user store. This partner organization has their user accounts stored in an LDAP server. The partner organization cannot expose this LDAP server to the WSO2 Identity Server as a user store due to security reasons. However, this partner organization has a Shibboleth identity provider that is connected to their LDAP server. Shibboleth is one of the most widely used and popular SAML2 identity providers. In the scenario, Shibboleth supports SAML2 SSO and it authenticates users in the partner organization against the LDAP server. Therefore, users from partner organizations who wish to log in to the web application are redirected to Shibboleth IdP and are authenticated with their own LDAP server.
With Identity Server, you can configure multiple federated identity providers that users can be authenticated against. In this scenario, users from the enterprise can be authenticated with the enterprise user store and users from the partner organization can be authenticated using Shibboleth IdP.
In this sample we have used Shibboleth version 2.0 . To find configuration for latest Shibboleth version refer https://wiki.shibboleth.net/confluence/display/IDP30/Home.
The following sections provide instructions on how to configure this scenario.
Configuring Shibboleth as a SAML2 identity provider
- Click here to download latest version of Shibboleth IdP.
- Once you have downloaded the file, extract it into your local file system.
Go toÂ
<SHIBBOLETH_HOME>/bin
 directory and run theÂinstall.sh
 script (runÂinstall.bat
 if you are on Windows). This would install Shibboleth into the given location in your file system. You would be promoted with few questions as in following.Note: If you do not provide a fully qualified host name during installation, an error may occur. Basically, it should exactly match the format suggested by Shibboleth, i.e., idp.example.org (there is a regex pattern in the build.xml file. You can modify it as per your requirements).
The installation path that you provide will be referred to asÂ
<SHIBBOLETH_IDP_HOME>
. Also, this installation would create a keystore that can be found in theÂ<SHIBBOLETH_IDP_HOME>/credentials
 directory and a .war file that can be found in theÂ<SHIBBOLETH_IDP_HOME>/war
 directory.Configure a user store with Shibboleth. You can use an LDAP-based existing user store for this. To do this, open the
login.config
file that is found in theÂ<SHIBBOLETH_IDP_HOME>/conf
 directory and configure your LDAP user store details. The following is a sample configuration for an LDAP user store.ShibUserPassAuth { edu.vt.middleware.ldap.jaas.LdapLoginModule required ldapUrl="ldap://localhost:10389" bindDn="uid=admin,ou=system" bindCredential="secret" baseDn="ou=users,ou=system" ssl="false" userFilter="uid={0}" ; };
- Enable the username/password login handler in theÂ
<SHIBBOLETH_IDP_HOME>/conf/handler.xml
 file. Configure logging level from theÂ
<SHIBBOLETH_IDP_HOME>/conf/logging.xml
 file. All the logs files would be saved in theÂ<SHIBBOLETH_IDP_HOME>/logs
 directory. This may be helpful when troubleshooting any issues.Deploy the idp.war file in a web application server. This example illustrates this using Apache Tomcat. To do this, copy theÂ
<SHIBBOLETH_IDP_HOME>/war/idp.war
 file into theÂ<TOMCAT_HOME>/webapps
 directory.Enable HTTPS in Apache Tomcat. To do this, locate theÂ
<TOMCAT_HOME>/conf/server.xml
 file and configure the HTTPS connector. The following is a sample configuration of how to do this.<Connector port="8443" protocol="org.apache.coyote.http11.Http11Protocol" SSLImplementation="edu.internet2.middleware.security.tomcat6.DelegateToApplicationJSSEImplementation" scheme="https" SSLEnabled="true" clientAuth="false" keystoreFile="/home/asela/idp/shibboleth/credentials/idp.jks" keystorePass="password" />
Start the Apache Tomcat server.
Check the status of the server by using the following:Â
https://localhost:8443/idp/status
Now you have successfully configured the Shibboleth, however, there are some additional steps that may important for you. By default, Shibboleth adds Transient ID as the NameID in the subject
 element of the SAML Assertion. The Transient ID attribute definition exposes a randomly generated, short-lived, opaque identifier that can later be mapped back to the user by a transient principal connector. However, if you want to add the login name into the SAML Assertion, you need to do the following configuration.
- To configure the principal Id as the NameID in the SAML Assertion, do the following.
Comment out the following default configuration in theÂ
<SHIBBOLETH_IDP_HOME>/conf/attribute-resolver.xml
 file.<!--resolver:AttributeDefinition id="transientId" xsi:type="ad:TransientId"><resolver:AttributeEncoder xsi:type="enc:SAML1StringNameIdentifier" nameFormat="urn:mace:shibboleth:1.0:nameIdentifier"/> <resolver:AttributeEncoder xsi:type="enc:SAML2StringNameID" nameFormat="urn:oasis:names:tc:SAML:2.0:nameidformat:transient"/> </resolver:AttributeDefinition-->
Add the following configurations to replace the above commented out configurations.
<resolver:AttributeDefinition id="principalId" xsi:type="PrincipalName" xmlns="urn:mace:shibboleth:2.0:resolver:ad"><resolver:AttributeEncoder xsi:type="SAML2StringNameID" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" nameFormat="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" /> </resolver:AttributeDefinition>
- To configure a new policy for the principal Id, do the following.
Comment out the following default configuration in theÂ
<SHIBBOLETH_IDP_HOME>/conf/attribute-filter.xml
 file.<!--afp:AttributeFilterPolicy id="releaseTransientIdToAnyone"><afp:PolicyRequirementRule xsi:type="basic:ANY"/> <afp:AttributeRule attributeID="transientId"> <afp:PermitValueRule xsi:type="basic:ANY"/> </afp:AttributeRule> </afp:AttributeFilterPolicy-->
Add the following configurations to replace the above commented out configurations.
<afp:AttributeFilterPolicy id="releasePrincipalIdToAnyone"><afp:PolicyRequirementRule xsi:type="basic:ANY"/> <afp:AttributeRule attributeID="principalId"> <afp:PermitValueRule xsi:type="basic:ANY"/> </afp:AttributeRule> </afp:AttributeFilterPolicy>
Configuring Identity Server as SP in Shibboleth
Now that you have configured Shibboleth as a SAML2 identity provider, configure the Identity Server as a service provider in Shibboleth.
Configure SAML2 metadata for the Identity Server. The Identity Server acts as a service provider for Shibboleth, so we must configure service provider metadata for the Identity Server. The Identity Server still does not support a metadata profile and you cannot download the metadata, so you must create the file by hand.Â
Create a file called wso2is.xml inside theÂ
<SHIBBOLETH_IDP_HOME>/metadata
 directory.ÂThe following is the service provider metadata file content for the Identity Server. Add this content into the wso2is.xml file you created.
<EntityDescriptor entityID="wso2is" xmlns="urn:oasis:names:tc:SAML:2.0:metadata"> <SPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol"> <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat> <AssertionConsumerService index="1" Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://localhost:9443/commonauth" /> </SPSSODescriptor> </EntityDescriptor>
Tip: Here the location value would be as follows:
https://{Identity Server Hostname} : {Port}/commonauth
Configure a new relying party for Identity Sever. This basically involves adding a new relying party under theÂ
RelyingPartyGroup
 element in theÂ<SHIBBOLETH_IDP_HOME>/conf/relying-party.xml
 file. The configuration is as follows.<RelyingParty id="wso2is" provider="https://idp.example.org/idp/shibboleth" defaultSigningCredentialRef="IdPCredential" defaultAuthenticationMethod="urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport"> <rp:ProfileConfiguration xsi:type="saml:SAML2SSOProfile" signResponses="always" signAssertions="always" encryptAssertions="never" encryptNameIds="never"/> </rp:RelyingParty>
Tip: This configuration mentions that you must sign the SAML assertion and response.
Configure the new metadata configuration file under theÂ
MetadataProvider
 element in theÂ<SHIBBOLETH_IDP_HOME>/conf/relying-party.xml
 file.<metadata:MetadataProvider id="wso2isMD" xsi:type="FilesystemMetadataProvider" xmlns="urn:mace:shibboleth:2.0:metadata" metadataFile="/home/asela/idp/shibboleth/metadata/wso2is.xml" maintainExpiredMetadata="true"/>
Tip: This configuration points to the new metadata configuration file that you created for the Identity Server.
Configure Shibboleth as an identity provider
You must configure Shibboleth as a SAML2 SSO federated identity provider in the Identity Server.
- Download and install the WSO2 Identity Server.
- Start the Identity Server.
- Log in to the Identity Server management console.
- Register new federated identity provider in the Identity Server. See Adding and Configuring an Identity Provider for more information on how to do this.Â
Note the following when configuring this.- You need provide a name for identity provider configuration. We have used Shibboleth-IDP in this example.
- You need to upload the public certificate of Shibboleth. TheÂ
<SHIBBOLETH_IDP_HOME>/credentials/idp.crt
 file is the public certificate required here. This is needed for signature validation of the SAML response and assertion.
Expand the Federated Authenticators section and the SAML2 Web SSO Configuration section.
Note the following when configuring this.Field Description Sample value Enable SAML2 Web SSO Selecting this ensures that SAML2 SSO is enabled for authentication purposes. You can also set this as the default means of authentication by selecting the Default checkbox. Selected Identity Provider Entity Id This value must be the entity Id of the Shibboleth identity provider. You can obtain this value from the
<SHIBBOLETH_IDP_HOME>/metadata/idp-metadata.xml
file. There is an attribute calledentityID
that specifies this.https://idp.example.org/idp/shibboleth Service Provider Entity Id This must be the Identity Server’s Entity Id. You can use the value that you configured in the
<SHIBBOLETH_IDP_HOME>/metadata/wso2is.xml
metadata file.wso2is SSO URL This is the Shibboleth identity provider URL. You can obtain this value from the <SHIBBOLETH_IDP_HOME>/metadata/idp-metadata.xml
file. This is necessary to configure as you can use HTTP-Redirect binding to send the SAML authentication request from the Identity Server to Shibboleth. This should be in the following format:https://{Shibboleth Hostname}:{Port}/idp/profile/SAML2/Redirect/SSO
https://localhost:8443/idp/profile/SAML2/Redirect/SSO
Enable Assertion Signing This is selected to verify the SAML assertion. Selected The other configurations all have default values.
- Click Register. Now you have configured Shibboleth as an identity provider.Â
Configuring travelocity as the service provider
Now that you have configured Shibboleth as the identity provider, you can configure the travelocity web application as the service provider in the Identity Server. This way, the Shibboleth identity provider acts as a federated identity provider for travelocity.
There are two ways that you can configure the Shibboleth identity provider as a federated identity provider.
- Configure the Shibboleth identity provider for federated authentication for the web application. Once this is configured, the users are redirected to the Shibboleth identity provider login page via the Identity Server when they try to access the web application. In this scenario, only the users who can be authenticated via the Shibboleth identity provider, can log in to the web application.
- You can configure multi-option authentication using the Advanced Configuration in the Local and Inbound Authentication section. Here you can configure one authentication step that involves two options for authentication. One is basic authentication that allows authentication of users from the enterprise user store, and the other option is to use Shibboleth-IDP. Once you configure this, users who are accessing the web application are provided with a login page with both options. Therefore users from Shibboleth-IDP and enterprise user store can both log in to the same web application.
To configure the service provider, do the following.
- Register the service provider. See Configuring a Service Provider for more information on how to do this.
- Expand the Local and Inbound Authentication section and do one of the following configurations.
- Configure Shibboleth as a Federated Authentication mechanism by selecting the identity provider you configured from the dropdown.
 - Select Advanced Configuration and configure multiple options for authentication within the same authentication step. Select basic under Local Authenticators for authenticating users against the enterprise user store and select Shibboleth-IDP under Federated Authenticators.
Â
- Configure Shibboleth as a Federated Authentication mechanism by selecting the identity provider you configured from the dropdown.
- Click Update to update the details for your service provider.
Testing the scenario
- Set up the travelocity web application and access it fromÂ
http://wso2is.local:8080/travelocity.com
.. - You should see the following login page if you configured multi-option authentication.
Â