* Peter Schober <
peter....@univie.ac.at> [2021-10-01 12:46]:
> The person having written this is in no position to give configuration
> advice: There is no need to hack/patch SimpleSAMLphp or any of its
> modules in order to download and verify signed SAML 2.0 Metadata.
I misunderstood the point of the suggested hack. I've assumed in the
given context that the statement
"If using let's encrypt or self signed certificate on nextcloud"
referred to the certificate from the key pair used for securing SAML
protocol messages. (And I think you've made the same mistake, as you
were wondering about the correctness of the self-signed certificate
you created to let nextcloud sign its SAML Metadata.)
I now realise that the suggested code change was to enable HTTPS
connections from SimpleSAMLphp's metarefresh to a TLS-enabled web
server (hosting the SAML Metadata for Nextcloud) where the certificate
presented on that HTTPS connection is not trustworthy (i.e., self-signed).
It still makes no sense at all to disable TLS verification when using
letsencrypt certificates (the whole point of letsencrypt is that those
certificates are fully trusted as they come from an established
Certificate Authority present in all major trust stores) but I can see
how connecting to a TLS-enabled web server with an untrustworthy
certificate (i.e., self-signed) might have metarefresh fail.
Of course the proper way to enable that would be to file an issue (or
send a pull request with the suggested code changes) in the
SimpelSAMLphp issue tracker, instead of adding it to some random blog
post about nexcloud integration (when this isn't even about nexcloud).
So yeah, with the exception of the comment about letsencrypt that code
change may be necessary if you're using a self-signed certificate to
secure the HTTPS web server that is hosting SAML Metadata you're
trying to import using SimpleSAMLphp's metarefresh.
-peter