$config = array(
'wordpress' => array(
'sqlauth:SQL',
'dsn' => 'mysql:host=localhost;dbname=scotchbox',
'username' => 'root',
'password' => 'root',
'query' => 'SELECT * from wp_users where user_pass = :password AND user_login = :username'
),
'default-sp' => array(
'saml:SP',
'entityid' => 'www.example.sp.org',
),
'example-userpass' => array(
'exampleauth:UserPass',
// Give the user an option to save their username for future login attempts
// And when enabled, what should the default be, to save the username or not
//'remember.username.enabled' => FALSE,
//'remember.username.checked' => FALSE,
'student:studentpass' => array(
'uid' => array('test'),
'eduPersonAffiliation' => array('member', 'student'),
),
'employee:employeepass' => array(
'uid' => array('employee'),
'eduPersonAffiliation' => array('member', 'employee'),
),
),
);
$metadata['__DYNAMIC:1__'] = array(
'host' => 'http://www.example.idp.org',
'privatekey' => 'server.pem',
'certificate' => 'server.crt',
'auth' => 'example-userpass',
);
$metadata['__DYNAMIC:1__'] = array(
/*
* The hostname of the server (VHOST) that will use this SAML entity.
*
* Can be '__DEFAULT__', to use this entry by default.
*/
'host' => '__DEFAULT__',
/* X.509 key and certificate. Relative to the cert directory. */
'privatekey' => 'server.pem',
'certificate' => 'server.crt',
/*
* Authentication source to use. Must be one that is configured in
* 'config/authsources.php'.
*/
'auth' => 'example-userpass',
);
$metadata['https://openidp.feide.no'] = array(
'name' => array(
'en' => 'Feide OpenIdP - guest users',
'no' => 'Feide Gjestebrukere',
),
'description' => 'Here you can login with your account on Feide RnD OpenID. If you do not already have an account on this identity provider, you can create a new one by following the create new account link and follow the instructions.',
'SingleSignOnService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'https://openidp.feide.no/simplesaml/saml2/idp/SingleLogoutService.php',
'certFingerprint' => 'c9ed4dfb07caf13fc21e0fec1572047eb8a7a4cb'
);
$metadata['http://www.example.idp.org/simplesaml'] = array(
'name' => array (
'en' => 'My test IDP',
'no' => 'My test IDP',
),
'description' => 'This is a test endpoint',
'SingleSignOnService' => 'http://www.example.idp.org/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'http://www.example.idp.org/simplesaml/saml2/idp/SingleLogoutService.php',
);
$metadata['https://saml2sp.example.org'] = array(
'AssertionConsumerService' => 'https://saml2sp.example.org/simplesaml/module.php/saml/sp/saml2-acs.php/default-sp',
'SingleLogoutService' => 'https://saml2sp.example.org/simplesaml/module.php/saml/sp/saml2-logout.php/default-sp',
);
$metadata['http://www.example.sp.org'] = array(
'AssertionConsumerService' => 'http://www.service.sp.org/simplesaml/module.php/saml/sp/saml2-acs.php/default-sp',
'SingleLogoutService' => 'http://www.service.sp.org/simplesaml/module.php/saml/sp/saml2-logout.php/default-sp'
);
...
Caused by: SimpleSAML_Error_Exception: Could not find the metadata of an IdP with entity ID 'http://labs.softdev.co.uk/simplesaml/saml2/idp/metadata.php' Backtrace: 2 /var/simplesaml/modules/saml/lib/Auth/Source/SP.php:134 (sspmod_saml_Auth_Source_SP::getIdPMetadata) 1 /var/simplesaml/modules/saml/www/sp/saml2-acs.php:74 (require) 0 /var/simplesaml/www/module.php:134 (N/A)
metadata/saml20-idp-hosted.php
'privatekey' => 'labs.softdev.co.uk.pem',
'certificate' => 'labs.softdev.co.uk.crt',
metadata/saml20-idp-remote.php
$metadata['http://labs.softdev.co.uk'] = array(
'name' => array(
'en' => 'LABS OpenIdP - guest users',
),
'description' => 'Test idp for SAML.',
'SingleSignOnService' => 'http://labs.softdev.co.uk/simplesaml/saml2/idp/SSOService.php',
'SingleLogoutService' => 'http://labs.softdev.co.uk/simplesaml/saml2/idp/SingleLogoutService.php',
'certFingerprint' => 'c9ed4dfb07caf13fc21e0fec1572047eb8a7a4cb'
);
-- Now the complete files (comments snipped to make it easier to read here)
metadata/saml20-idp-hosted.php
metadata/saml20-idp-remote.php
This is most likely a configuration problem on either the service provider or identity provider.