You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 26, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: docs/openid.md
+41Lines changed: 41 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -590,6 +590,47 @@ oidc_providers:
590
590
591
591
Note that the fields `client_id` and `client_secret` are taken from the CURL response above.
592
592
593
+
### Shibboleth with OIDC Plugin
594
+
595
+
[Shibboleth](https://www.shibboleth.net/) is an open Standard IdP solution widely used by Universities.
596
+
597
+
1. Shibboleth needs the [OIDC Plugin](https://shibboleth.atlassian.net/wiki/spaces/IDPPLUGINS/pages/1376878976/OIDC+OP) installed and working correctly.
598
+
2. Create a new config on the IdP Side, ensure that the `client_id` and `client_secret`
599
+
are randomly generated data.
600
+
```json
601
+
{
602
+
"client_id": "SOME-CLIENT-ID",
603
+
"client_secret": "SOME-SUPER-SECRET-SECRET",
604
+
"response_types": ["code"],
605
+
"grant_types": ["authorization_code"],
606
+
"scope": "openid profile email",
607
+
"redirect_uris": ["https://[synapse public baseurl]/_synapse/client/oidc/callback"]
0 commit comments