...
The example code above also shows a defined listener-class value. See SAML SP configuration - SSO 8964117742.
Network Address Tolerance
...
Code Block | ||||
---|---|---|---|---|
| ||||
<filter> <filter-name>ServiceProviderFilter</filter-name> <filter-class>com.ubisecure.saml2.sp.servlet.ServiceProviderFilter</filter-class> <init-param> <param-name>disable-request-wrapper</param-name> <param-value>true</param-value> </init-param> </filter> |
Metadata Store Location
Metadata store directory can be external to the application. The default location is WEB-INF/saml2/sp
but this can be overridden by using servlet init param:
Code Block |
---|
<servlet>
<servlet-name>ServiceProviderServlet</servlet-name>
<servlet-class>com.ubisecure.saml2.sp.servlet.ServiceProviderServlet</servlet-class>
<load-on-startup>0</load-on-startup>
<init-param>
<param-name>com.ubisecure.saml2.config.storepath</param-name>
<param-value>file:/home/andrei/samlsp-config</param-value>
</init-param>
</servlet> |
The init param must have name "com.ubisecure.saml2.config.storepath
" and contain path to a target directory as a value prefixed with "file:
". In this example it is a Linux directory to which the web application has access.
Attribute Queries
Attribute Queries allow an application to query an Attribute Authority for user attributes at run time, after the initial authentication has been performed. The Attribute Authority may be a different party to the Identity Provider.
...