import
This commit is contained in:
		
							
								
								
									
										218
									
								
								conf/authn/authn.properties
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										218
									
								
								conf/authn/authn.properties
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,218 @@ | ||||
| # Properties that control authentication generally and the behavior of | ||||
| # specific methods. | ||||
|  | ||||
| # Regular expression matching login flows to enable, e.g. IPAddress|Password | ||||
| #idp.authn.flows = Password | ||||
|  | ||||
| # Default settings for most authentication methods. | ||||
| #idp.authn.defaultLifetime = PT1H | ||||
| #idp.authn.defaultTimeout = PT30M | ||||
| #idp.authn.proxyRestrictionsEnforced = true | ||||
|  | ||||
| # Whether to populate relying party user interface information for display | ||||
| # during authentication, consent, terms-of-use. | ||||
| #idp.authn.rpui = true | ||||
|  | ||||
| # Whether to prioritize "active" results when an SP requests more than | ||||
| # one possible matching login method (V2 behavior was to favor them) | ||||
| #idp.authn.favorSSO = false | ||||
|  | ||||
| # Whether to fail requests when a user identity after authentication | ||||
| # doesn't match the identity in a pre-existing session. | ||||
| #idp.authn.identitySwitchIsError = false | ||||
|  | ||||
| # If using IdP discovery feature, provides a discovery location to use. | ||||
| #idp.authn.discoveryURL = https://ds.example.org/shibboleth-ds/index.html | ||||
|  | ||||
| # Properties below override specific method behavior, as an alternative | ||||
| # to defining Spring beans in XML. Refer to the documentation for a complete | ||||
| # list. Many of the properties below are mentioned only because they are | ||||
| # atypical defaults assumed for a given method. | ||||
|  | ||||
| # Flow selection among multiple equivalent options can be managed with | ||||
| # the order properties, lower will be tried first. | ||||
|  | ||||
| #### Password #### | ||||
|  | ||||
| #idp.authn.Password.order = 1000 | ||||
| #idp.authn.Password.passiveAuthenticationSupported = true | ||||
| #idp.authn.Password.forcedAuthenticationSupported = true | ||||
| # Override this and removeAfterValidation to require all validators to succeed | ||||
| #idp.authn.Password.requireAll = false | ||||
| # Override to keep the password around | ||||
| #idp.authn.Password.removeAfterValidation = true | ||||
| # Override to store password in Java Subject | ||||
| #idp.authn.Password.retainAsPrivateCredential = false | ||||
| # Simple username transforms before validation | ||||
| #idp.authn.Password.trim = true | ||||
| #idp.authn.Password.lowercase = false | ||||
| #idp.authn.Password.uppercase = false | ||||
| #idp.authn.Password.matchExpression =  | ||||
| # Override default form field names | ||||
| #idp.authn.Password.usernameFieldName = j_username | ||||
| #idp.authn.Password.passwordFieldName = j_password | ||||
| #idp.authn.Password.ssoBypassFieldName = donotcache | ||||
| # Unset if using customized Principals per validator | ||||
| #idp.authn.Password.addDefaultPrincipals = true | ||||
| # The Principal collection below is the typical default if not otherwise noted. | ||||
| #idp.authn.Password.supportedPrincipals = \ | ||||
| #    saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport, \ | ||||
| #    saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:Password, \ | ||||
| #    saml1/urn:oasis:names:tc:SAML:1.0:am:password | ||||
| # Validators are controlled in password-authn-config.xml | ||||
|  | ||||
| #### Password Backends #### | ||||
|  | ||||
| # See ldap.properties for LDAP authn properties | ||||
| # Kerberos settings | ||||
| #idp.authn.Krb5.refreshConfig = false | ||||
| #idp.authn.Krb5.preserveTicket = false | ||||
| # Set next two for KDC verification | ||||
| #idp.authn.Krb5.servicePrincipal =  | ||||
| #idp.authn.Krb5.keytab =  | ||||
| # JAAS settings | ||||
| #idp.authn.JAAS.loginConfigNames = ShibUserPassAuth | ||||
| #idp.authn.JAAS.loginConfig = %{idp.home}/conf/authn/jaas.config | ||||
|  | ||||
| #### External #### | ||||
|  | ||||
| #idp.authn.External.order = 1000 | ||||
| #idp.authn.External.nonBrowserSupported = false | ||||
| #idp.authn.External.matchExpression =  | ||||
| # Unset if you plan to return full Java Subject from external source | ||||
| #idp.authn.External.addDefaultPrincipals = true | ||||
| # Servlet context-relative path to wherever your implementation lives | ||||
| idp.authn.External.externalAuthnPath = contextRelative:external.jsp | ||||
|  | ||||
| #### RemoteUser #### | ||||
|  | ||||
| #idp.authn.RemoteUser.order = 1000 | ||||
| #idp.authn.RemoteUser.nonBrowserSupported = false | ||||
| #idp.authn.RemoteUser.matchExpression =  | ||||
| # Unset in most cases only if using the authnMethodHeader or | ||||
| # subjectAttribute settings | ||||
| #idp.authn.RemoteUser.addDefaultPrincipals = true | ||||
| # Most other settings need to be supplied via web.xml to the servlet | ||||
|  | ||||
| #### RemoteUserInternal #### | ||||
|  | ||||
| #idp.authn.RemoteUserInternal.order = 1000 | ||||
| #idp.authn.RemoteUserInternal.nonBrowserSupported = true | ||||
| # Unset in most cases only if using the authnMethodHeader feature | ||||
| #idp.authn.RemoteUserInternal.addDefaultPrincipals = true | ||||
| #idp.authn.RemoteUserInternal.checkRemoteUser = true | ||||
| # Comma-delimited lists of attributes or headers to pull from | ||||
| #idp.authn.RemoteUserInternal.checkAttributes =  | ||||
| #idp.authn.RemoteUserInternal.checkHeaders =  | ||||
| # Simple transforms to apply | ||||
| #idp.authn.RemoteUserInternal.trim = true | ||||
| #idp.authn.RemoteUserInternal.lowercase = false | ||||
| #idp.authn.RemoteUserInternal.uppercase = false | ||||
| #idp.authn.RemoteUserInternal.matchExpression =  | ||||
| #idp.authn.RemoteUserInternal.allowedUsernames =  | ||||
| #idp.authn.RemoteUserInternal.deniedUsernames =  | ||||
|  | ||||
| #### SPNEGO #### | ||||
|  | ||||
| #idp.authn.SPNEGO.order = 1000 | ||||
| #idp.authn.SPNEGO.nonBrowserSupported = false | ||||
| #idp.authn.SPNEGO.enforceRun = false | ||||
| #idp.authn.SPNEGO.refreshKrbConfig = false | ||||
| #idp.authn.SPNEGO.matchExpression =  | ||||
| idp.authn.SPNEGO.supportedPrincipals = \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:Kerberos, \ | ||||
|     saml1/urn:ietf:rfc:1510 | ||||
|  | ||||
| #### X509 #### | ||||
|  | ||||
| #idp.authn.X509.order = 1000 | ||||
| #idp.authn.X509.nonBrowserSupported = false | ||||
| # Servlet context-relative path to wherever your implementation lives | ||||
| #idp.authn.X509.externalAuthnPath = contextRelative:x509-prompt.jsp | ||||
| idp.authn.X509.supportedPrincipals = \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:X509, \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient, \ | ||||
|     saml1/urn:ietf:rfc:2246 | ||||
|  | ||||
| #### X509Internal #### | ||||
|  | ||||
| #idp.authn.X509Internal.order = 1000 | ||||
| #idp.authn.X509Internal.nonBrowserSupported = false | ||||
| #idp.authn.X509Internal.saveCertificateToCredentialSet = true | ||||
| idp.authn.X509Internal.supportedPrincipals = \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:X509, \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient, \ | ||||
|     saml1/urn:ietf:rfc:2246 | ||||
|  | ||||
| #### IPAddress #### | ||||
|  | ||||
| #idp.authn.IPAddress.order = 1000 | ||||
| #idp.authn.IPAddress.passiveAuthenticationSupported = true | ||||
| #idp.authn.IPAddress.lifetime = PT60S | ||||
| #idp.authn.IPAddress.inactivityTimeout = PT60S | ||||
| idp.authn.IPAddress.supportedPrincipals = \ | ||||
|    saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocol | ||||
|  | ||||
| #### Function #### | ||||
|  | ||||
| #idp.authn.Function.order = 1000 | ||||
| #idp.authn.Function.passiveAuthenticationSupported = true | ||||
| # Unset if you plan to return full Java Subject from function | ||||
| #idp.authn.Function.addDefaultPrincipals = true | ||||
|  | ||||
| #### Duo #### | ||||
|  | ||||
| #idp.authn.Duo.order = 1000 | ||||
| #idp.authn.Duo.nonBrowserSupported = false | ||||
| #idp.authn.Duo.forcedAuthenticationSupported = true | ||||
| # Unset if you have advanced Duo integrations with individualized Principals | ||||
| #idp.authn.Duo.addDefaultPrincipals = true | ||||
| # The list below should be changed to reflect whatever locally- or | ||||
| # community-defined values are appropriate to represent Duo. It is | ||||
| # strongly advised that the value not be specific to Duo or any | ||||
| # particular technology to avoid lock-in. | ||||
| idp.authn.Duo.supportedPrincipals = \ | ||||
|     saml2/http://example.org/ac/classes/mfa, \ | ||||
|     saml1/http://example.org/ac/classes/mfa | ||||
| # Default Duo integration settings are defined separately | ||||
| # in duo.properties due to the sensitivity of the secret key. | ||||
|  | ||||
|  | ||||
| #### SAML #### | ||||
|  | ||||
| #idp.authn.SAML.order = 1000 | ||||
| #idp.authn.SAML.nonBrowserSupported = false | ||||
| #idp.authn.SAML.passiveAuthenticationSupported = true | ||||
| #idp.authn.SAML.forcedAuthenticationSupported = true | ||||
| #idp.authn.SAML.proxyScopingEnforced = true | ||||
| # Discovery options: | ||||
| #   Define shibboleth.authn.SAML.discoveryFunction bean | ||||
| #   Set proxyEntityID property | ||||
| #   Fall through to discovery via discoveryRequired property | ||||
| #idp.authn.SAML.proxyEntityID = https://idp.example.org/idp/shibboleth | ||||
| #idp.authn.SAML.discoveryRequired = true | ||||
| # Generally left false with bidirectional mappings in | ||||
| # conf/authn/authn-comparison.xml across the proxy boundary. | ||||
| # Adjust as needed to reflect IdP's capabilities/support. | ||||
| #idp.authn.SAML.addDefaultPrincipals = false | ||||
| #idp.authn.SAML.supportedPrincipals = \ | ||||
| #    saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport, \ | ||||
| #    saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:Password, \ | ||||
| #    saml1/urn:oasis:names:tc:SAML:1.0:am:password | ||||
|  | ||||
| #### MFA #### | ||||
|  | ||||
| #idp.authn.MFA.order = 1000 | ||||
| #idp.authn.MFA.passiveAuthenticationSupported = true | ||||
| #idp.authn.MFA.forcedAuthenticationSupported = true | ||||
| #idp.authn.MFA.validateLoginTransitions = true | ||||
| # The list below almost certainly requires changes, and should generally be the | ||||
| # union of any of the separate factors you combine in your particular MFA flow | ||||
| # rules. The example corresponds to the example in mfa-authn-config.xml that | ||||
| # combines IPAddress with Password. | ||||
| idp.authn.MFA.supportedPrincipals = \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocol, \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport, \ | ||||
|     saml2/urn:oasis:names:tc:SAML:2.0:ac:classes:Password, \ | ||||
|     saml1/urn:oasis:names:tc:SAML:1.0:am:password | ||||
| # Most actual setup via mfa-authn-config.xml | ||||
		Reference in New Issue
	
	Block a user
	 root
					root