Apparent inconsistencies in the Shibboleth wiki concerning persistent NameIDs for federating a Shibboleth IDP with Microsoft Azure

Florian Lengyel Florian.Lengyel at cuny.edu
Wed Apr 6 10:58:01 EDT 2016



-----Original Message-----
From: users [mailto:users-bounces at shibboleth.net] On Behalf Of Cantor, Scott

>> Regarding your question, omitting the SHA1 security configuration 
>> override from the relying party override for Microsoft in 
>> relying-party.xml made no difference--I'm inclined to keep it however (thank you for this).

>You certainly shouldn't use SHA1 unless you have to.
..

> -- Scott

While I agree with the sentiment,  it is silent on the technical question whether an explicit override 
of the default signing configuration is necessary in the relying party configuration for Microsoft O365. 
This is the question Michael A. Grady posed earlier.

The answer is no: the O365 metadata at
https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml
includes digest and signing method  extensions to specify SHA1: 

<Extensions>
<alg:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
<alg:SigningMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
</Extensions>

and the Shibboleth idp honors this. 
(Extension syntax is described here: http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-metadata-algsupport-v1.0-cs01.html#__RefHeading__5805_234507477)

No explicit override of the signing configuration (in relying-party.xml or elsewhere) is necessary or desirable, whether Microsoft upgrades its signing and digest algorithms from SHA1 and modifies its metadata accordingly--or not.


--
To unsubscribe from this list send an email to users-unsubscribe at shibboleth.net


More information about the users mailing list