Productionalization of public and private keys for an IdP

Nate Klingenstein nate.klingenstein at utah.edu
Tue Mar 22 01:51:12 EDT 2016


Kirill,

You probably don’t need to generate new encryption keys unless you have a use case where the IdP will be receiving inbound encrypted messages.  It’s rare.

The only other recommendation is that you keep your keys in version control along with your configuration files, with appropriately strong boundaries between your environments.

Other than that, I think you have the process right.  In particular, you wouldn’t want to designate a key as signing-only if you do intend to use encryption, and you wouldn’t make new encryption keys if you’re just signing.

Take care,
Nate.

On Mar 21, 2016, at 23:47, Kirill <ks.grishin at gmail.com<mailto:ks.grishin at gmail.com>> wrote:

1. The production team generates there own public and private key pairs and puts them in the
following files (as defined int the idp.properties):

%{idp.home}/credentials/idp-signing.key (private / signing)
%{idp.home}/credentials/idp-signing.crt (public / signing)
%{idp.home}/credentials/idp-encryption.key (private / encryption)
%{idp.home}/credentials/idp-encryption.crt (public / encryption)

2. Then they put the public keys to <KeyDescriptor use="signing" /> and <KeyDescriptor use="signing" /> elements of metadata and give this updated metadata to SP.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20160322/54b0ac6f/attachment.html>


More information about the users mailing list