It is not really documented anywhere, but such hardening can often
easily be done in the webserver configuration. E.g. in Apache, you
should look at the use of <Location>-directives in combination with
the �Allow from ...� and �Deny from� directives.
> 2) What process is used to check the SimpleSAMLphp distribution (and a
> given installation/configuration) for security holes?
>
> Note that I'm not talking about farfetched scenarios here (like
> someone cracking or stealing the secret key for an IdP). It's simply
> that in order to use the SimpleSAMLphp distribution on a Service
> Provider I need to expose at least the ACS URL to the Big, Bad,
> Internet, which means that "responsible" technology usage requires me
> to do some sort of security audit of the code which delivers the new
> endpoint.
>
> So naturally I'd like avoid duplication of effort if someone has
> already done such an audit. And if an official/format audit process
> exists for SimpleSAMLphp then I'd like to be aware of it in case at
> some point I decide to propose patches for SimpleSAMLphp.
I am not aware of anyone having performed a formal audit of SSP.
Best regards,
Olav Morken
UNINETT / Feide