shibboleth vs those "other" idps

Kirk Turner-Rustin ktrustin at owu.edu
Fri May 15 10:04:53 EDT 2015


On Thu, 14 May 2015, IAM David Bantz wrote:

> I hope it goes without saying, but just in case:
> I'm convinced, on board, and proselytizing for Shibboleth;
> I really appreciate Scott's points.  I'm looking for reasons
> and stories that may be more persuasive to the skeptics
> and "brand-loyalty" I encounter.  "Brand loyalty" includes
> the Ellucian/Banner tilt mentioned, Google whatever, existing
> CAS deployment, as well as in-house developed one-offs.
>
> David Bantz

Caveat lector: This is my first post.

We're an 1800 or so FTE liberal arts university with an infinitesimal 
IT staff (smallest of our peer institutions in the GLCA and most of 
those of similar size in CLAC). Two days ago, we went live with a 
Shibboleth v3 IdP and two SPs, one ADFS SP for Ellucian PowerCAMPUS 
Self-Service (we host the ADFS instance) and one OpenAM SP hosted by 
an off-site vendor. We've also configured and tested Ellucian Portal + 
ADFS against our IdP, to go live this summer, as well as a Shibboleth 
SP. I did all of the Shibboleth setup, and one of my colleagues
did the ADFS work.

The biggest problem we had by far was working with Ellucian to get 
their Self-Service and Portal products to authenticate correctly with 
their recommended SP software (ADFS). The number of errors in their 
applicable documentation and the lack of responsiveness from Ellucian 
support were frustrating, to put it mildly. My colleague (also new to 
federation and SAML) used a lot of debug logging, trial and error, and 
writing his own documentation to finally get ADFS and the Ellucian 
products to work together.

The second biggest problem has been getting the OpenAM off-site 
vendor's SP to work with our IdP. In between typing this, I'm writing 
to the vendor, explaining over and over again that they are breaking 
the user's SSO context by sending the ForceAuthn="True" attribute in 
their SAML request. I've been telling them this since yesterday, and 
have just cited page and line number from the OASIS SAML 2 protocol 
doc.

We've only just started, but so far, in general, everything that we've 
had complete control over in-house via access to source code, config 
files, etc. has gone well, even with the steep learning curve (I 
started work on implementing IdP v3 in mid-February, knowing nothing 
about federation, SAML, etc. and juggling other big projects at the 
same time, and I'm far from expert now). Everything that has relied on 
support from third-party commercial vendors has been painful at best.

BTW, thank you, Scott and team for scripted attributes!

Cheers,
Kirk

-- 
   Kirk Turner-Rustin SCJP  | Senior Systems Analyst
   Ohio Wesleyan University | Information Services
   http://www.owu.edu       | http://infoserv.owu.edu


More information about the users mailing list