EOX GitLab Instance

Skip to content
Snippets Groups Projects
Commit 4743176b authored by Lubomir Dolezal's avatar Lubomir Dolezal
Browse files

cleanup, separate shibboleth2.xml for collections

parent b729deeb
No related branches found
No related tags found
2 merge requests!36Staging to master to prepare 1.0.0 release,!34Shib auth
......@@ -47,6 +47,13 @@ The following services are defined via docker compose files.
* provides the endpoint for external access
* configured via docker labels
### shibauth
* based on the external unicon/shibboleth-sp:3.0.4 Apache + Shibboleth image
* provides authentication and authorization via SAML2
* docker configuration files set access control rules
* traefik labels determine which services are protected via Shib
### database
* based on external postgis:10 image
......
......@@ -4,7 +4,7 @@
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
clockSkew="180">
<ApplicationDefaults entityID="https://emg.pdas.prism.eox.at/shibboleth"
<ApplicationDefaults entityID="https://dem.pass.copernicus.eu/shibboleth"
REMOTE_USER="eppn uid persistent-id targeted-id">
<Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
checkAddress="false" handlerSSL="true" cookieProps="https">
......@@ -23,7 +23,7 @@
<AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/>
<AttributeResolver type="Query" subjectMatch="true"/>
<AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>
<CredentialResolver type="File" key="/run/secrets/SHIB_KEY" certificate="/run/secrets/SHIB_CERT"/>
<CredentialResolver type="File" key="/run/secrets/DEM_SHIB_KEY" certificate="/run/secrets/DEM_SHIB_CERT"/>
</ApplicationDefaults>
<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>
<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>
......
<SPConfig xmlns="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:conf="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
clockSkew="180">
<ApplicationDefaults entityID="https://emg.pass.copernicus.eu/shibboleth"
REMOTE_USER="eppn uid persistent-id targeted-id">
<Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
checkAddress="false" handlerSSL="true" cookieProps="https">
<SSO entityID="https://umssoidp.cdsv3.eu:443/shibboleth">
SAML2
</SSO>
<Logout>SAML2 Local</Logout>
<Handler type="MetadataGenerator" Location="/Metadata" signing="false"/>
<Handler type="Status" Location="/Status" acl="127.0.0.1 ::1"/>
<Handler type="Session" Location="/Session" showAttributeValues="false"/>
<Handler type="DiscoveryFeed" Location="/DiscoFeed"/>
</Sessions>
<Errors supportContact="admin@eox.at"
helpLocation="/about.html"/>
<MetadataProvider type="XML" validate="false" path="idp-metadata.xml"/>
<AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/>
<AttributeResolver type="Query" subjectMatch="true"/>
<AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>
<CredentialResolver type="File" key="/run/secrets/EMG_SHIB_KEY" certificate="/run/secrets/EMG_SHIB_CERT"/>
</ApplicationDefaults>
<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>
<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>
</SPConfig>
\ No newline at end of file
......@@ -2,9 +2,10 @@
<html lang="en">
<head>
<meta charset="UTF-8">
<title>APACHE TEST</title>
<title>Authentication Success</title>
</head>
<body>
<h1>TESTING APACHE</h1>
<h1>Your login was successful and you were granted access to the service.
Please access the URL, which you originally requested. Proper redirection is not implemented yet.</h1>
</body>
</html>
# set overall behavior
log4j.rootCategory=DEBUG, native_log
log4j.rootCategory=INFO, native_log
# fairly verbose for DEBUG, so generally leave at WARN/INFO
log4j.category.XMLTooling.XMLObject=WARN
......
# set overall behavior
log4j.rootCategory=DEBUG, shibd_log, warn_log
log4j.rootCategory=INFO, shibd_log, warn_log
# fairly verbose for DEBUG, so generally leave at INFO
log4j.category.XMLTooling.XMLObject=INFO
......
<SPConfig xmlns="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:conf="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
clockSkew="180">
<ApplicationDefaults entityID="https://vhr18.pass.copernicus.eu/shibboleth"
REMOTE_USER="eppn uid persistent-id targeted-id">
<Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
checkAddress="false" handlerSSL="true" cookieProps="https">
<SSO entityID="https://umssoidp.cdsv3.eu:443/shibboleth">
SAML2
</SSO>
<Logout>SAML2 Local</Logout>
<Handler type="MetadataGenerator" Location="/Metadata" signing="false"/>
<Handler type="Status" Location="/Status" acl="127.0.0.1 ::1"/>
<Handler type="Session" Location="/Session" showAttributeValues="false"/>
<Handler type="DiscoveryFeed" Location="/DiscoFeed"/>
</Sessions>
<Errors supportContact="admin@eox.at"
helpLocation="/about.html"/>
<MetadataProvider type="XML" validate="false" path="idp-metadata.xml"/>
<AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/>
<AttributeResolver type="Query" subjectMatch="true"/>
<AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>
<CredentialResolver type="File" key="/run/secrets/VHR18_SHIB_KEY" certificate="/run/secrets/VHR18_SHIB_CERT"/>
</ApplicationDefaults>
<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>
<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>
</SPConfig>
\ No newline at end of file
......@@ -170,8 +170,8 @@ services:
environment:
APACHE_SERVERNAME: "https://dem.pass.copernicus.eu:443"
secrets:
- SHIB_CERT
- SHIB_KEY
- DEM_SHIB_CERT
- DEM_SHIB_KEY
- BASIC_AUTH_USERS_AUTH
deploy:
replicas: 1
......@@ -226,8 +226,8 @@ configs:
file: ./config/shibboleth/dem_pass-ac.xml
shib-access-control-conf-cache:
file: ./config/shibboleth/dem_pass-ac-cache.xml
shib-shibboleth2: # this will vary for collections
file: ./config/shibboleth/shibboleth2.xml
shib-shibboleth2:
file: ./config/shibboleth/dem-shibboleth2.xml
shib-apache:
file: ./config/shibboleth/shib-apache.conf
shib-attribute-map:
......@@ -241,9 +241,9 @@ configs:
idp-metadata:
external: true
secrets:
SHIB_CERT:
DEM_SHIB_CERT:
external: true
SHIB_KEY:
DEM_SHIB_KEY:
external: true
BASIC_AUTH_USERS_AUTH:
external: true
......@@ -170,8 +170,8 @@ services:
environment:
APACHE_SERVERNAME: "https://emg.pass.copernicus.eu:443"
secrets:
- SHIB_CERT
- SHIB_KEY
- EMG_SHIB_CERT
- EMG_SHIB_KEY
- BASIC_AUTH_USERS_AUTH
deploy:
replicas: 1
......@@ -226,8 +226,8 @@ configs:
file: ./config/shibboleth/emg_pass-ac.xml
shib-access-control-conf-cache:
file: ./config/shibboleth/emg_pass-ac-cache.xml
shib-shibboleth2: # this will vary for collections
file: ./config/shibboleth/shibboleth2.xml
shib-shibboleth2:
file: ./config/shibboleth/emg-shibboleth2.xml
shib-apache:
file: ./config/shibboleth/shib-apache.conf
shib-attribute-map:
......@@ -241,9 +241,9 @@ configs:
idp-metadata:
external: true
secrets:
SHIB_CERT:
EMG_SHIB_CERT:
external: true
SHIB_KEY:
EMG_SHIB_KEY:
external: true
BASIC_AUTH_USERS_AUTH:
external: true
......@@ -170,8 +170,8 @@ services:
environment:
APACHE_SERVERNAME: "https://vhr18.pass.copernicus.eu:443"
secrets:
- SHIB_CERT
- SHIB_KEY
- VHR18_SHIB_CERT
- VHR18_SHIB_KEY
- BASIC_AUTH_USERS_AUTH
deploy:
replicas: 1
......@@ -226,8 +226,8 @@ configs:
file: ./config/shibboleth/vhr18_pass-ac.xml
shib-access-control-conf-cache:
file: ./config/shibboleth/vhr18_pass-ac-cache.xml
shib-shibboleth2: # this will vary for collections
file: ./config/shibboleth/shibboleth2.xml
shib-shibboleth2:
file: ./config/shibboleth/vhr18-shibboleth2.xml
shib-apache:
file: ./config/shibboleth/shib-apache.conf
shib-attribute-map:
......@@ -241,9 +241,9 @@ configs:
shib-idp-metadata:
external: true
secrets:
SHIB_CERT:
VHR18_SHIB_CERT:
external: true
SHIB_KEY:
VHR18_SHIB_KEY:
external: true
BASIC_AUTH_USERS_AUTH:
external: true
......@@ -19,7 +19,7 @@ providers:
api:
dashboard: true
log:
level: DEBUG
level: INFO
accessLog: {}
certificatesResolvers:
default:
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment