-
Notifications
You must be signed in to change notification settings - Fork 25
/
Copy pathsample-app.properties
81 lines (60 loc) · 2.31 KB
/
sample-app.properties
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
#
# Copyright (c) 2020, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
#
# WSO2 Inc. licenses this file to you under the Apache License,
# Version 2.0 (the "License"); you may not use this file except
# in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
#
EnableSAML2SSOLogin=true
#Url to do send SAML2 SSO AuthnRequest
SAML2SSOURL=samlsso
#URIs to skip SSOAgentFilter; comma separated values
SkipURIs=
#A unique identifier for this SAML 2.0 Service Provider application
SAML2.SPEntityId=${SAML2_SP_ENTITY_ID}
IndexPage=/sample-app/index.html
ErrorPage=/error.jsp
#The URL of the SAML 2.0 Assertion Consumer
SAML2.AssertionConsumerURL=http://localhost.com:8080/sample-app/home.jsp
#A unique identifier for this SAML 2.0 Service Provider application
SAML2.IdPEntityId=${SAML2_IDP_ENTITY_ID}
#The URL of the SAML 2.0 Identity Provider
SAML2.IdPURL=${SAML2_IDP_URL}
#Identifier given for the Service Provider for SAML 2.0 attributes
#exchange
#SAML2.AttributeConsumingServiceIndex=1701087467
#Specify if SingleLogout is enabled/disabled
SAML2.EnableSLO=false
#This is the URL that is used for SLO
SAML2.SLOURL=logout
#Specify if SAMLResponse element is signed
SAML2.EnableResponseSigning=false
#Specify if SAMLAssertion element is signed
SAML2.EnableAssertionSigning=false
#Specify if SAMLAssertion element is encrypted
SAML2.EnableAssertionEncryption=false
#Specify if AuthnRequests and LogoutRequests should be signed
SAML2.EnableRequestSigning=true
#Specify if SAML request is a passive
SAML2.IsPassiveAuthn=false
#Password of the KeyStore for SAML and OpenID
KeyStorePassword=wso2carbon
#Alias of the IdP's public certificate
IdPPublicCertAlias=${IDP_PUBLIC_CERT_ALIAS}
#Alias of the SP's private key
PrivateKeyAlias=wso2carbon
#Private key password to retrieve the private key used to sign
#AuthnRequest and LogoutRequest messages
PrivateKeyPassword=wso2carbon
# Public Certificate of the IDP in PEM encoded format
IdPPublicCert=${IDP_PUBLIC_CERT}