Before undertaking any customisation of your Shibboleth IdP and after each change you make to customise your Shibboleth IdP we recommend testing to ensure everything is functioning correctly.
To facilitate this the AAF provides a useful tool, called AAF Attribute Validator. This tool will ensure that your IdP is working correctly with backend security processes and that it is capable of providing the attributes your users may be asked to present when accessing federated services.
A ‘private’ browser session as the best tool for working with AAF Attribute Validator. Different browsers will have different names for ‘private’ mode, e.g. Incognito Mode.
To access AAF Attribute Validator:
Follow the flow to login, ensuring you choose your new Shibboleth IdP when promoted at the Discovery Service.
IMPORTANT: All modifiable configuration is housed in the directory:
/opt/shibboleth-idp-installer/repository/assets/<HOST_NAME>
The structure of your configuration directory will look like the following:
.
├── apache
│ ├── idp.conf
│ ├── intermediate.crt
│ ├── server.crt
│ └── server.key
└── idp
├── branding
│ ├── css
│ │ ├── consent.css
│ │ └── main.css
│ ├── error-messages.properties
│ ├── images
│ │ ├── logo-mobile.png
│ │ └── logo.png
│ └── views
│ ├── attribute-release.vm
│ ├── error.vm
│ ├── expiring-password.vm
│ ├── login-error.vm
│ ├── login.vm
│ ├── logout-response.vm
│ ├── logout.vm
│ └── resolvertest.vm
├── conf
│ ├── attribute-filter.xml
│ ├── attribute-resolver.xml
│ ├── global.xml
│ ├── idp.properties
│ ├── ldap.properties
│ ├── metadata-based-attribute-filter.xml
│ ├── metadata-providers.xml
│ └── services.xml
├── logging
│ └── logback.xml
└── sys
└── jetty-profile
If you make configuration changes directly within /opt/shibboleth/shibboleth-idp
, /etc/httpd
or elsewhere your installation will become unsupported and you may have difficulties when upgrading.
From the configuration directory you can make changes to customise the following areas as appropriate for your environment:
Here are some of the areas you should customise when preparing a Shibboleth IdP for a production environment:
The Shibboleth IdP MUST use valid certificates, verified by a widely trusted CA, for your Apache webserver
The use of EV certificates is RECOMMENDED
The update process will perform the following:
You MUST have a tested rollback plan in place before running an update to ensure any unanticipated changes can be reversed.
To update your Shibboleth IdP run the command:
/opt/shibboleth-idp-installer/repository/update_idp.sh
In order to upgrade your versions to the latest vetted releases you need to add the -u
switch to the update_idp.sh command:
/opt/shibboleth-idp-installer/repository/update_idp.sh -u
By supplying the -u
switch the following occurs in addition to the normal update process:
Once you’ve finalised customisations please continue to the operation stage.