EOX GitLab Instance

Skip to content
Snippets Groups Projects
Commit 4743176b authored by Lubomir Dolezal's avatar Lubomir Dolezal
Browse files

cleanup, separate shibboleth2.xml for collections

parent b729deeb
Branches
Tags
2 merge requests!36Staging to master to prepare 1.0.0 release,!34Shib auth
...@@ -47,6 +47,13 @@ The following services are defined via docker compose files. ...@@ -47,6 +47,13 @@ The following services are defined via docker compose files.
* provides the endpoint for external access * provides the endpoint for external access
* configured via docker labels * configured via docker labels
### shibauth
* based on the external unicon/shibboleth-sp:3.0.4 Apache + Shibboleth image
* provides authentication and authorization via SAML2
* docker configuration files set access control rules
* traefik labels determine which services are protected via Shib
### database ### database
* based on external postgis:10 image * based on external postgis:10 image
......
...@@ -4,7 +4,7 @@ ...@@ -4,7 +4,7 @@
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
clockSkew="180"> clockSkew="180">
<ApplicationDefaults entityID="https://emg.pdas.prism.eox.at/shibboleth" <ApplicationDefaults entityID="https://dem.pass.copernicus.eu/shibboleth"
REMOTE_USER="eppn uid persistent-id targeted-id"> REMOTE_USER="eppn uid persistent-id targeted-id">
<Sessions lifetime="28800" timeout="3600" relayState="ss:mem" <Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
checkAddress="false" handlerSSL="true" cookieProps="https"> checkAddress="false" handlerSSL="true" cookieProps="https">
...@@ -23,7 +23,7 @@ ...@@ -23,7 +23,7 @@
<AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/> <AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/>
<AttributeResolver type="Query" subjectMatch="true"/> <AttributeResolver type="Query" subjectMatch="true"/>
<AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/> <AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>
<CredentialResolver type="File" key="/run/secrets/SHIB_KEY" certificate="/run/secrets/SHIB_CERT"/> <CredentialResolver type="File" key="/run/secrets/DEM_SHIB_KEY" certificate="/run/secrets/DEM_SHIB_CERT"/>
</ApplicationDefaults> </ApplicationDefaults>
<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/> <SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>
<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/> <ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>
......
<SPConfig xmlns="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:conf="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
clockSkew="180">
<ApplicationDefaults entityID="https://emg.pass.copernicus.eu/shibboleth"
REMOTE_USER="eppn uid persistent-id targeted-id">
<Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
checkAddress="false" handlerSSL="true" cookieProps="https">
<SSO entityID="https://umssoidp.cdsv3.eu:443/shibboleth">
SAML2
</SSO>
<Logout>SAML2 Local</Logout>
<Handler type="MetadataGenerator" Location="/Metadata" signing="false"/>
<Handler type="Status" Location="/Status" acl="127.0.0.1 ::1"/>
<Handler type="Session" Location="/Session" showAttributeValues="false"/>
<Handler type="DiscoveryFeed" Location="/DiscoFeed"/>
</Sessions>
<Errors supportContact="admin@eox.at"
helpLocation="/about.html"/>
<MetadataProvider type="XML" validate="false" path="idp-metadata.xml"/>
<AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/>
<AttributeResolver type="Query" subjectMatch="true"/>
<AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>
<CredentialResolver type="File" key="/run/secrets/EMG_SHIB_KEY" certificate="/run/secrets/EMG_SHIB_CERT"/>
</ApplicationDefaults>
<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>
<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>
</SPConfig>
\ No newline at end of file
...@@ -2,9 +2,10 @@ ...@@ -2,9 +2,10 @@
<html lang="en"> <html lang="en">
<head> <head>
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>APACHE TEST</title> <title>Authentication Success</title>
</head> </head>
<body> <body>
<h1>TESTING APACHE</h1> <h1>Your login was successful and you were granted access to the service.
Please access the URL, which you originally requested. Proper redirection is not implemented yet.</h1>
</body> </body>
</html> </html>
# set overall behavior # set overall behavior
log4j.rootCategory=DEBUG, native_log log4j.rootCategory=INFO, native_log
# fairly verbose for DEBUG, so generally leave at WARN/INFO # fairly verbose for DEBUG, so generally leave at WARN/INFO
log4j.category.XMLTooling.XMLObject=WARN log4j.category.XMLTooling.XMLObject=WARN
......
# set overall behavior # set overall behavior
log4j.rootCategory=DEBUG, shibd_log, warn_log log4j.rootCategory=INFO, shibd_log, warn_log
# fairly verbose for DEBUG, so generally leave at INFO # fairly verbose for DEBUG, so generally leave at INFO
log4j.category.XMLTooling.XMLObject=INFO log4j.category.XMLTooling.XMLObject=INFO
......
<SPConfig xmlns="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:conf="urn:mace:shibboleth:3.0:native:sp:config"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
clockSkew="180">
<ApplicationDefaults entityID="https://vhr18.pass.copernicus.eu/shibboleth"
REMOTE_USER="eppn uid persistent-id targeted-id">
<Sessions lifetime="28800" timeout="3600" relayState="ss:mem"
checkAddress="false" handlerSSL="true" cookieProps="https">
<SSO entityID="https://umssoidp.cdsv3.eu:443/shibboleth">
SAML2
</SSO>
<Logout>SAML2 Local</Logout>
<Handler type="MetadataGenerator" Location="/Metadata" signing="false"/>
<Handler type="Status" Location="/Status" acl="127.0.0.1 ::1"/>
<Handler type="Session" Location="/Session" showAttributeValues="false"/>
<Handler type="DiscoveryFeed" Location="/DiscoFeed"/>
</Sessions>
<Errors supportContact="admin@eox.at"
helpLocation="/about.html"/>
<MetadataProvider type="XML" validate="false" path="idp-metadata.xml"/>
<AttributeExtractor type="XML" validate="true" reloadChanges="false" path="attribute-map.xml"/>
<AttributeResolver type="Query" subjectMatch="true"/>
<AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>
<CredentialResolver type="File" key="/run/secrets/VHR18_SHIB_KEY" certificate="/run/secrets/VHR18_SHIB_CERT"/>
</ApplicationDefaults>
<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>
<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>
</SPConfig>
\ No newline at end of file
...@@ -170,8 +170,8 @@ services: ...@@ -170,8 +170,8 @@ services:
environment: environment:
APACHE_SERVERNAME: "https://dem.pass.copernicus.eu:443" APACHE_SERVERNAME: "https://dem.pass.copernicus.eu:443"
secrets: secrets:
- SHIB_CERT - DEM_SHIB_CERT
- SHIB_KEY - DEM_SHIB_KEY
- BASIC_AUTH_USERS_AUTH - BASIC_AUTH_USERS_AUTH
deploy: deploy:
replicas: 1 replicas: 1
...@@ -226,8 +226,8 @@ configs: ...@@ -226,8 +226,8 @@ configs:
file: ./config/shibboleth/dem_pass-ac.xml file: ./config/shibboleth/dem_pass-ac.xml
shib-access-control-conf-cache: shib-access-control-conf-cache:
file: ./config/shibboleth/dem_pass-ac-cache.xml file: ./config/shibboleth/dem_pass-ac-cache.xml
shib-shibboleth2: # this will vary for collections shib-shibboleth2:
file: ./config/shibboleth/shibboleth2.xml file: ./config/shibboleth/dem-shibboleth2.xml
shib-apache: shib-apache:
file: ./config/shibboleth/shib-apache.conf file: ./config/shibboleth/shib-apache.conf
shib-attribute-map: shib-attribute-map:
...@@ -241,9 +241,9 @@ configs: ...@@ -241,9 +241,9 @@ configs:
idp-metadata: idp-metadata:
external: true external: true
secrets: secrets:
SHIB_CERT: DEM_SHIB_CERT:
external: true external: true
SHIB_KEY: DEM_SHIB_KEY:
external: true external: true
BASIC_AUTH_USERS_AUTH: BASIC_AUTH_USERS_AUTH:
external: true external: true
...@@ -170,8 +170,8 @@ services: ...@@ -170,8 +170,8 @@ services:
environment: environment:
APACHE_SERVERNAME: "https://emg.pass.copernicus.eu:443" APACHE_SERVERNAME: "https://emg.pass.copernicus.eu:443"
secrets: secrets:
- SHIB_CERT - EMG_SHIB_CERT
- SHIB_KEY - EMG_SHIB_KEY
- BASIC_AUTH_USERS_AUTH - BASIC_AUTH_USERS_AUTH
deploy: deploy:
replicas: 1 replicas: 1
...@@ -226,8 +226,8 @@ configs: ...@@ -226,8 +226,8 @@ configs:
file: ./config/shibboleth/emg_pass-ac.xml file: ./config/shibboleth/emg_pass-ac.xml
shib-access-control-conf-cache: shib-access-control-conf-cache:
file: ./config/shibboleth/emg_pass-ac-cache.xml file: ./config/shibboleth/emg_pass-ac-cache.xml
shib-shibboleth2: # this will vary for collections shib-shibboleth2:
file: ./config/shibboleth/shibboleth2.xml file: ./config/shibboleth/emg-shibboleth2.xml
shib-apache: shib-apache:
file: ./config/shibboleth/shib-apache.conf file: ./config/shibboleth/shib-apache.conf
shib-attribute-map: shib-attribute-map:
...@@ -241,9 +241,9 @@ configs: ...@@ -241,9 +241,9 @@ configs:
idp-metadata: idp-metadata:
external: true external: true
secrets: secrets:
SHIB_CERT: EMG_SHIB_CERT:
external: true external: true
SHIB_KEY: EMG_SHIB_KEY:
external: true external: true
BASIC_AUTH_USERS_AUTH: BASIC_AUTH_USERS_AUTH:
external: true external: true
...@@ -170,8 +170,8 @@ services: ...@@ -170,8 +170,8 @@ services:
environment: environment:
APACHE_SERVERNAME: "https://vhr18.pass.copernicus.eu:443" APACHE_SERVERNAME: "https://vhr18.pass.copernicus.eu:443"
secrets: secrets:
- SHIB_CERT - VHR18_SHIB_CERT
- SHIB_KEY - VHR18_SHIB_KEY
- BASIC_AUTH_USERS_AUTH - BASIC_AUTH_USERS_AUTH
deploy: deploy:
replicas: 1 replicas: 1
...@@ -226,8 +226,8 @@ configs: ...@@ -226,8 +226,8 @@ configs:
file: ./config/shibboleth/vhr18_pass-ac.xml file: ./config/shibboleth/vhr18_pass-ac.xml
shib-access-control-conf-cache: shib-access-control-conf-cache:
file: ./config/shibboleth/vhr18_pass-ac-cache.xml file: ./config/shibboleth/vhr18_pass-ac-cache.xml
shib-shibboleth2: # this will vary for collections shib-shibboleth2:
file: ./config/shibboleth/shibboleth2.xml file: ./config/shibboleth/vhr18-shibboleth2.xml
shib-apache: shib-apache:
file: ./config/shibboleth/shib-apache.conf file: ./config/shibboleth/shib-apache.conf
shib-attribute-map: shib-attribute-map:
...@@ -241,9 +241,9 @@ configs: ...@@ -241,9 +241,9 @@ configs:
shib-idp-metadata: shib-idp-metadata:
external: true external: true
secrets: secrets:
SHIB_CERT: VHR18_SHIB_CERT:
external: true external: true
SHIB_KEY: VHR18_SHIB_KEY:
external: true external: true
BASIC_AUTH_USERS_AUTH: BASIC_AUTH_USERS_AUTH:
external: true external: true
...@@ -19,7 +19,7 @@ providers: ...@@ -19,7 +19,7 @@ providers:
api: api:
dashboard: true dashboard: true
log: log:
level: DEBUG level: INFO
accessLog: {} accessLog: {}
certificatesResolvers: certificatesResolvers:
default: default:
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment