@@ -392,7 +392,7 @@ settings.py file under the SAML_CONFIG option. We will see a typical configurati
392
392
# we are just a lonely SP
393
393
'sp' : {
394
394
'name': 'Federated Django sample SP',
395
- 'name_id_format': saml2.saml.NAMEID_FORMAT_PERSISTENT ,
395
+ 'name_id_format': saml2.saml.NAMEID_FORMAT_TRANSIENT ,
396
396
397
397
# For Okta add signed logout requets. Enable this:
398
398
# "logout_requests_signed": True,
@@ -428,7 +428,7 @@ settings.py file under the SAML_CONFIG option. We will see a typical configurati
428
428
'optional_attributes': ['eduPersonAffiliation'],
429
429
430
430
# in this section the list of IdPs we talk to are defined
431
- # This is not mandatory! All the IdP available in the metadata will be considered.
431
+ # This is not mandatory! All the IdP available in the metadata will be considered instead .
432
432
'idp': {
433
433
# we do not need a WAYF service since there is
434
434
# only an IdP defined here. This IdP should be
@@ -451,11 +451,10 @@ settings.py file under the SAML_CONFIG option. We will see a typical configurati
451
451
# One metadatastore or many ...
452
452
'metadata': {
453
453
'local': [path.join(BASEDIR, 'remote_metadata.xml')],
454
- 'remote': [{"url": "https://idp.testunical.it/idp/shibboleth",
455
- "disable_ssl_certificate_validation": True},],
454
+ 'remote': [{"url": "https://idp.testunical.it/idp/shibboleth"},],
456
455
'mdq': [{"url": "https://ds.testunical.it",
457
456
"cert": "certficates/others/ds.testunical.it.cert",
458
- "disable_ssl_certificate_validation": True }]
457
+ }]
459
458
},
460
459
461
460
# set to 1 to output debugging information
@@ -528,9 +527,9 @@ encryption/decryption support please configure another set of ``key_file`` and
528
527
529
528
.. Note ::
530
529
531
- Check your openssl documentation to generate a test certificate.
530
+ Check your openssl documentation to generate a certificate suitable for SAML2 operations .
532
531
533
532
534
- .. Example ::
533
+ SAML2 certificate creation example ::
535
534
536
535
openssl req -nodes -new -x509 -newkey rsa:2048 -days 3650 -keyout private.key -out public.cert
0 commit comments