keycloak-scim/topics/saml/java/general-config/sp_element.adoc

52 lines
1.9 KiB
Text
Raw Normal View History

2016-06-02 16:07:45 +00:00
===== SP Element
Here is the explanation of the SP element attributes
[source,xml]
----
<SP entityID="sp"
sslPolicy="ssl"
nameIDPolicyFormat="format"
forceAuthentication="true"
isPassive="false">
...
</SP>
----
entityID::
This is the identifier for this client.
2016-06-02 20:50:43 +00:00
The IDP needs this value to determine who the client is that is communicating with it. This setting _REQUIRED._
2016-06-02 16:07:45 +00:00
sslPolicy::
This is the SSL policy the adapter will enforce.
2016-06-02 20:50:43 +00:00
Valid values are: `ALL`, `EXTERNAL`, and `NONE`.
For `ALL`, all requests must come in via HTTPS.
For `EXTERNAL`, only non-private IP addresses must come over the wire via HTTPS.
For `NONE`, no requests are required to come over via HTTPS.
This is _OPTIONAL._ and defaults to `EXTERNAL`.
2016-06-02 16:07:45 +00:00
nameIDPolicyFormat::
SAML clients can request a specific NameID Subject format.
Fill in this value if you want a specific format.
2016-06-02 20:50:43 +00:00
It must be a standard SAML format identifier, i.e. `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`
This setting is _OPTIONAL._.
2016-06-02 16:07:45 +00:00
By default, no special format is requested.
forceAuthentication::
SAML clients can request that a user is re-authenticated even if they are already logged in at the IDP.
2016-06-02 20:50:43 +00:00
Set this to `true` if you want this. This setting is _OPTIONAL._.
2016-06-02 16:07:45 +00:00
Set to `false` by default.
isPassive::
SAML clients can request that a user is never asked to authenticate even if they are not logged in at the IDP.
Set this to `true` if you want this.
2016-06-02 20:50:43 +00:00
Do not use together with `forceAuthentication` as they are opposite. This setting is _OPTIONAL._.
It is set to `false` by default.
2016-06-02 16:07:45 +00:00
turnOffChangeSessionIdOnLogin::
2016-06-02 20:50:43 +00:00
The session id is changed by default on a successful login on some platforms to plug a security attack vector (Tomcat 8, Jetty9, Undertow/Wildfly).
Change this to `true` if you want to turn this off. It is recommended you do not turn it off.
The default value is `false`.
2016-06-02 16:07:45 +00:00