* Tommy Peterson <
stpe...@gmail.com> [2015-08-31 18:45]:
> do they have to be different?
They have no relation whatsosever (other than both using X.509):
One key pair is for TLS between web browsers and your web server, the
other is for end-to-end security (not merely securing at the transport
layer) of SAML protocol messages.
Trust in the former comes from a signature by a commercial CA who
bought their way into your OS' or browser's trust strore, trust in the
latter comes from having those (public) keys themselfs available in
pre-exchanged SAML metadata, at least per MetaIOP,
https://wiki.oasis-open.org/security/SAML2MetadataIOP
That also means using self-signed certificates for securing of SAML
messages is perfectly fine, not just for testing purposes. The SSP
documentation is complete and documents secure best practices in this
regard.
So there's no reason to re-use your TLS keys for SAML usage.
-peter