Expiring IDP signing certificate

Donald Lohr lohrda at jmu.edu
Wed Jun 8 20:31:48 UTC 2022


We just went through that exercise.

Grabbing data from our idp-process.log for many months, we built a 
spreadsheet with information about our applications. Having researched 
the "key roll-over" docs on InCommon's site and some valuable assistance 
from their support for questions we had, we began.

1) We sent emails to our on-site points of contact for each non-InCommon 
registered application, alerting them of our expiring cert and asked 
that they get answers to the following questions from their application 
vendor:

/a) When our SSO IdP //SAML/XML metadata certificate expires on 
xx/yy/2022, what issues will that cause in the SAML message / 
hand-shaking when one of our users tries to login ///to your application/?

b) Can your application properly parse an SSO IdP SAML/XML metadata when 
it contains an expiring and a new certificate?

c) Do you want our //SSO IdP SAML/XML metadata as an emailed file or a 
url? Or do you just need a cert file containing only our new //SSO IdP 
//SAML/XML//certificate?//
//

/2) When then took our 30 heaviest used / critical InCommon registered 
applications and sent emails to our on-site points of contact for their 
applications, alerting them of our expiring cert and asked that they get 
answers to the following questions from their application vendor:

/a) When our SSO IdP SAML/XML metadata (registered with the InCommon 
Federation) certificate expires on xx/yy/2022, what issues will that 
cause in the SAML message / hand-shaking when one of our users tries to 
login to your application?

b) Can your application properly parse an SSO IdP SAML/XML metadata when 
it contains an expiring and a new certificate?
/

3) Having the non-InCommon registered application responses from the 
vendors, we gleaned:

a) A very large percentage of these application vendors reported that 
they could not handle metadata with both an expiring cert and a new cert.
b) Some wanted just the new cert file, some wanted just our IdP metadata 
file and others wanted a url to our metadata.
c) A number of vendors reported that our on-site application admin could 
make the change to the application's SSO config panel.
d) A very large number reported that logins would fail when the expiring 
cert expired.


4) Having the InCommon registered application responses from the 30 
vendors we asked, we gleaned:

a) One vendor did not support InCommon's two cert roll-over model.
b) Three/four vendors only pulled our IdP metadata from InCommon at the 
initial setup and never looked again for changes. So the vendor or an 
on-site application admin had to make the change to the application's 
SSO config panel.
c) Many vendors check IdP metadata at each user login for changes, some 
once a day, some every X number of minutes and we had one that only 
checked every 50 days.

We minted a new self-signed cert off of our existing private key that 
had minted the expiring cert years ago (per InCommon's docs).

So we announced the date/time that our new cert would be in our InCommon 
registered IdP metadata (in position #2) following our expiring cert (in 
position #1) and ready for our vendors to consume.  Once our new 
InCommon IdP metadata (with both certs) was consumable, we had folks 
testing logins based on the frequency the vendors reported that they 
pulled new IdP metadata from InCommon for those 30 most used/critical 
applications. All logins were successful, as the expiring cert was still 
being used.

Several days later (as we were on a time crunch) we replaced the 
expiring cert in our IdP locally stored metadata file with our new cert 
and changed our Shib config over to used only the new cert on our 
go-live morning.

We addressed all of the apps that had an on-site admin which had access 
to the application's SSO config panel.

Based on what the responses were from the polled vendors, we told them 
the day before, when they could pull our local IdP metadata with the new 
cert and for those that wanted a metadata or cert file we provided them 
that so they were ready to change their application just after our 
official go-live date/time when we switched our Shib IdP config to use 
only the new cert.

We had a few minor application issues on our go-live morning, mostly 
around those vendors that just wanted the cert in a non-block format 
(converted into a single line).

Then on the date/time our expiring cert expired, our InCommon registered 
apps, no login issues were repoted

The use of the Firefox "SAML tracer" add-on was very helpful during all 
of this.

Don



On 6/3/22 11:51 AM, Ho, PeiQuan via users wrote:
> *CAUTION: *This email originated from outside of JMU. Do not click 
> links or open attachments unless you recognize the sender and know the 
> content is safe.
> ------------------------------------------------------------------------
>
> Hi,
>
>   Our IDP signing certificate as used in 
> shibboleth.DefaultSigningCredential is expiring.  It is the 10-year 
> self-signed certificate as recommended during installation.  What is 
> the process to update/rollover this cert with minimal impact to SPs?
>
> Thanks,
>
> -PQ
>
>

-- 
D o n a l d   L o h r
I n f o r m a t i o n   S y s t e m s
J a m e s   M a d i s o n   U n i v e r s i t y
5 4 0 . 5 6 8 . 3 7 3 0
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20220608/8db096a2/attachment.htm>


More information about the users mailing list