|
9 | 9 | * copy command (from SimpleSAML base dir) cp modules/perun/module_perun.php config/ |
10 | 10 | */ |
11 | 11 | $config = [ |
12 | | - /** |
| 12 | + /* |
13 | 13 | * base url to rpc with slash at the end. |
14 | 14 | */ |
15 | 15 | 'rpc.url' => 'https://perun.inside.cz/krb/rpc/', |
16 | 16 |
|
17 | | - /** |
| 17 | + /* |
18 | 18 | * rpc credentials if rpc url is protected with basic auth. |
19 | 19 | */ |
20 | 20 | 'rpc.username' => '_proxy-idp', |
21 | 21 | 'rpc.password' => 'password', |
22 | 22 |
|
23 | | - /** |
| 23 | + /* |
24 | 24 | * rpc serializer. Default value is 'json'. |
25 | 25 | */ |
26 | 26 | 'rpc.serializer' => 'json', |
27 | 27 |
|
28 | | - /** |
| 28 | + /* |
29 | 29 | * hostname of perun ldap with ldap(s):// at the beginning. |
30 | 30 | */ |
31 | 31 | 'ldap.hostname' => 'ldaps://perun.inside.cz', |
32 | 32 |
|
33 | 33 | 'ldap.base' => 'dc=perun,dc=inside,dc=cz', |
34 | 34 |
|
35 | | - /** |
| 35 | + /* |
36 | 36 | * ldap credentials if ldap search is protected. If it is null or not set at all. No user is used for bind. |
37 | 37 | */ |
38 | 38 | //'ldap.username' => '_proxy-idp', |
39 | 39 | //'ldap.password' => 'password' |
40 | 40 |
|
41 | | - /** |
| 41 | + /* |
42 | 42 | * Whether to use startTLS on port 389. Defaults to false. SSL/TLS is always used for ldaps: regardless of this |
43 | 43 | * setting. |
44 | 44 | */ |
45 | 45 | //'ldap.enable_tls' => true, |
46 | 46 |
|
47 | | - /** |
| 47 | + /* |
48 | 48 | * Perun group name to eduPersonEntitlement mapping. Mapping is according to the spec in |
49 | 49 | * https://aarc-project.eu/wp-content/uploads/2017/11/AARC-JRA1.4A-201710.pdf groupNameAARC - enable group naming |
50 | 50 | * according to AARC spec globally, every SP can overide it with groupMapping option entitlementPrefix - prefix put |
|
55 | 55 | 'entitlementPrefix' => 'prefix', |
56 | 56 | 'entitlementAuthority' => 'authority', |
57 | 57 |
|
58 | | - /** |
| 58 | + /* |
59 | 59 | * specify which type of IdPListService will be used Expected values: csv, db |
60 | 60 | */ |
61 | 61 | 'idpListServiceType' => '', |
62 | 62 |
|
63 | | - /** |
| 63 | + /* |
64 | 64 | * Part of configuration for status page * |
65 | 65 | */ |
66 | 66 |
|
67 | | - /** |
| 67 | + /* |
68 | 68 | * Specify the used interface to get the status data Only NAGIOS type is now allowed |
69 | 69 | */ |
70 | 70 | 'status.type' => 'NAGIOS', |
71 | 71 |
|
72 | | - /** |
| 72 | + /* |
73 | 73 | * Specify the url for get status information |
74 | 74 | */ |
75 | 75 | 'status.nagios.url' => '', |
76 | 76 |
|
77 | | - /** |
| 77 | + /* |
78 | 78 | * Specify the path to the certicate |
79 | 79 | */ |
80 | 80 | 'status.nagios.certificate_path' => '', |
81 | 81 |
|
82 | | - /** |
| 82 | + /* |
83 | 83 | * Specify the CA dir path |
84 | 84 | */ |
85 | 85 | 'status.nagios.ca_path' => '/etc/ssl/certs', |
86 | 86 |
|
87 | | - /** |
| 87 | + /* |
88 | 88 | * Specify the password for private key |
89 | 89 | * |
90 | 90 | * OPTIONAL |
91 | 91 | */ |
92 | 92 | 'status.nagios.certificate_password' => '', |
93 | 93 |
|
94 | | - /** |
| 94 | + /* |
95 | 95 | * Specify, if the peer verification is enabled, |
96 | 96 | * |
97 | 97 | * OPTIONAL Default: false |
98 | 98 | */ |
99 | 99 | 'status.nagios.peer_verification' => false, |
100 | 100 |
|
101 | | - /** |
| 101 | + /* |
102 | 102 | * Specify the list of services, which will be shown |
103 | 103 | * |
104 | 104 | * OPTIONAL Default: show all received services |
|
110 | 110 | ], |
111 | 111 | ], |
112 | 112 |
|
113 | | - /** |
| 113 | + /* |
114 | 114 | * Part of configuration for listOfSps * |
115 | 115 | */ |
116 | 116 |
|
117 | | - /** |
| 117 | + /* |
118 | 118 | * Specify the unique identifier of proxy |
119 | 119 | */ |
120 | 120 | 'listOfSps.proxyIdentifier' => '', |
121 | 121 |
|
122 | | - /** |
| 122 | + /* |
123 | 123 | * If true, page shows list of SAML2 and OIDC services. If false page shows only SAML2 services |
124 | 124 | */ |
125 | 125 | 'listOfSps.showOIDCServices' => true / false, |
126 | 126 |
|
127 | | - /** |
| 127 | + /* |
128 | 128 | * Specify attribute name for facility attribute proxy identifiers |
129 | 129 | */ |
130 | 130 | 'listOfSps.perunProxyIdentifierAttr' => '', |
131 | 131 |
|
132 | | - /** |
| 132 | + /* |
133 | 133 | * Specify attribute name for facility attribute with service name |
134 | 134 | */ |
135 | 135 | 'listOfSps.serviceNameAttr' => '', |
136 | 136 |
|
137 | | - /** |
| 137 | + /* |
138 | 138 | * Specify attribute name for facility attribute with loginUrL for service |
139 | 139 | */ |
140 | 140 | 'listOfSps.loginURLAttr' => '', |
141 | 141 |
|
142 | | - /** |
| 142 | + /* |
143 | 143 | * Specify attribute name for facility attribute with information, if service is in test environment |
144 | 144 | */ |
145 | 145 | 'listOfSps.isTestSpAttr' => '', |
146 | 146 |
|
147 | | - /** |
| 147 | + /* |
148 | 148 | * Specify attribute name for facility attribute with information, if facility may be shown on service list or not |
149 | 149 | */ |
150 | 150 | 'listOfSps.showOnServiceListAttr' => '', |
151 | 151 |
|
152 | | - /** |
| 152 | + /* |
153 | 153 | * Specify attribute name for facility attribute with service EntityId |
154 | 154 | */ |
155 | 155 | 'listOfSps.SAML2EntityIdAttr' => '', |
156 | 156 |
|
157 | | - /** |
| 157 | + /* |
158 | 158 | * Specify attribute name for facility attribute with service OIDC ClientId |
159 | 159 | */ |
160 | 160 | 'listOfSps.OIDCClientIdAttr' => '', |
161 | 161 |
|
162 | | - /** |
| 162 | + /* |
163 | 163 | * Specify list of facility attributes, which will be shown |
164 | 164 | */ |
165 | 165 | 'listOfSps.attributesDefinitions' => [''], |
166 | 166 |
|
167 | | - /** |
| 167 | + /* |
168 | 168 | * Specify list of facility attributes which have translations. If an attribute is not included in |
169 | 169 | * listOfSps.attributesDefinitions, it will be added. Defaults to an empty array. |
170 | 170 | */ |
171 | 171 | //'listOfSps.multilingualAttributes' => [], |
172 | 172 |
|
173 | | - /** |
| 173 | + /* |
174 | 174 | * Part of configuration for DS * |
175 | 175 | */ |
176 | 176 |
|
177 | 177 | 'wayf_config' => [ |
178 | | - /** |
| 178 | + /* |
179 | 179 | * specify if disco module should filter out IdPs which are not whitelisted neither committed to CoCo or RaS. |
180 | 180 | * default is false. |
181 | 181 | */ |
182 | 182 | 'disable_whitelisting' => false, |
183 | | - /** |
| 183 | + /* |
184 | 184 | * Specify translate module |
185 | 185 | */ |
186 | 186 | 'translate_module' => 'disco', |
187 | | - /** |
| 187 | + /* |
188 | 188 | * Specify prefix for filtering AuthnContextClassRef All AuthnContextClassRef values starts with this prefix |
189 | 189 | * will be removed before the request will be send to IdP |
190 | 190 | */ |
191 | 191 | 'remove_authn_context_class_ref_prefixes' => ['urn:cesnet:proxyidp:'], |
192 | | - /** |
| 192 | + /* |
193 | 193 | * Add insitution configuration. The block has to specify email and url |
194 | 194 | */ |
195 | 195 | 'add_institution_config' => [ |
196 | 196 | 'url' => 'https://login.elixir-czech.org/add-institution/', |
197 | 197 | |
198 | 198 | ], |
199 | | - /** |
| 199 | + /* |
200 | 200 | * Warning configuration The configuration can be loaded from file, url or directly from this config. All |
201 | 201 | * possibilities has to follow the structure under the "config" key. |
202 | 202 | */ |
203 | 203 | 'warning_config' => [ |
204 | | - # IF SOURCE === FILE |
205 | | - # 'file' => '/etc/perun/simplesamlphp/elixir/config/warning.php', |
206 | | - # IF SOURCE === URL |
207 | | - # 'url' => 'https://test.com', |
208 | | - # IF SOURCE === CONFIG |
| 204 | + // IF SOURCE === FILE |
| 205 | + // 'file' => '/etc/perun/simplesamlphp/elixir/config/warning.php', |
| 206 | + // IF SOURCE === URL |
| 207 | + // 'url' => 'https://test.com', |
| 208 | + // IF SOURCE === CONFIG |
209 | 209 | 'config' => [ |
210 | 210 | 'enabled' => false, |
211 | 211 | 'type' => 'INFO', |
|
0 commit comments