SP CredentialResolver locally signed SSL certificate
Tom Noonan
tom at joinroot.com
Wed Feb 28 16:42:54 EST 2018
> for decrypting encrypted assertions
So it's used when the ExplicitKey trust engine is in use, then? Should I
continue to generate certs for my SPs, then?
Is the usage outlined at
https://stackoverflow.com/questions/8276233/is-it-recommended-to-sign-and-encrypt-saml-and-use-ssl
correct that ultimately it's used to endure the assertions are not modified
in flight, so a self-signed cert is fine?
--Tom Noonan II
On Wed, Feb 28, 2018 at 4:34 PM, Cantor, Scott <cantor.2 at osu.edu> wrote:
> > - If no TrustEngine is specified the ExplicitKey engine is tried, and
> then the
> > PKIX engine
> > (https://wiki.shibboleth.net/confluence/display/SHIB2/
> NativeSPTrustEngine
> > <https://wiki.shibboleth.net/confluence/display/SHIB2/
> NativeSPTrustEngine
> > > )
> > - The CredentialResolver config is used by the StaticPKIX engine.
>
> That's how the SP works internally, it has nothing to with what your key
> is used for. The IdP however has the same logic generally speaking and an
> SP key used for signing is handled the same way. Encryption is something
> else entirely and an SP key is normally used for both (or more accurately
> labeled as both but is in fact used for encryption only as there is no
> substantial use of signing or TLS anymore in the SP as deployed by most).
>
> > I'm still not clear on how the CredentialResolver certificate is used.
>
> Signing AuthnRequests, client TLS for attribute queries or artifact
> lookup, and for decrypting encrypted assertions. Only the latter is common
> anymore.
>
> -- Scott
>
>
> --
> For Consortium Member technical support, see https://wiki.shibboleth.net/
> confluence/x/coFAAg
> To unsubscribe from this list send an email to
> users-unsubscribe at shibboleth.net
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20180228/21bab0d6/attachment.html>
More information about the users
mailing list