hello,
I was testing my sp and idp installation against TestShib2.0.
I installed idp (under tomcat, port 8443) and sp (under apache httpd, port 443) on the same machine. The Login profile is IP cheking. Everything seems well.
But I have a question when I test my idp against TestShib 2.0.
The tomcat config is :
<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
enableLookups="false" disableUploadTimeout="true"
acceptCount="100" scheme="https" secure="true"
clientAuth="true" sslProtocol="TLS"
keystoreFile="/home/scratch/wzqiang/shibboleth-idp/apache-tomcat-6.0.18/conf/keystore.ImportKey"
keystorePass="aa1122"
truststoreFile="/home/scratch/wzqiang/shibboleth-idp/apache-tomcat-6.0.18/conf/keystore.ImportKey"
truststorePass="aa1122" truststoreAlgorithm="DelegateToApplication" />
I switch off the ClientAuth for shibboleth.SAML2SSOSecurityPolicy in relying-party.xml
On the browse, when I access
https://sp.testshib.org and test against my idp, the browser requires certificate. But it seems I can use any pkcs12 certificate (no matter it is trusted by the trusted keystore configured in tomcat).
So I would ask is that the keystore configuration in tomcat does not effect any way? And the certificate on the browser is also does't effect?
The other question is about the "shib-cert.jar" (need configuring truststoreAlgorithm="AnyCert"). Is this package the same as the "DelegateToApplication"?
Thanks
Weizhong Qiang