idp-extended.xml revision 1881d1cc4a16507b02b4c5833539dd488c4af3ef
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<EntityConfig entityID="http://openam.example.com:8080/openam" hosted="true" xmlns="urn:sun:fm:SAML:2.0:entityconfig">
<IDPSSOConfig metaAlias="/idp">
<Attribute name="description">
<Value/>
</Attribute>
<Attribute name="signingCertAlias">
<Value>test</Value>
</Attribute>
<Attribute name="encryptionCertAlias">
<Value/>
</Attribute>
<Attribute name="basicAuthOn">
<Value>false</Value>
</Attribute>
<Attribute name="basicAuthUser">
<Value/>
</Attribute>
<Attribute name="basicAuthPassword">
<Value/>
</Attribute>
<Attribute name="autofedEnabled">
<Value>false</Value>
</Attribute>
<Attribute name="autofedAttribute">
<Value/>
</Attribute>
<Attribute name="assertionEffectiveTime">
<Value>600</Value>
</Attribute>
<Attribute name="idpAuthncontextMapper">
<Value>com.sun.identity.saml2.plugins.DefaultIDPAuthnContextMapper</Value>
</Attribute>
<Attribute name="idpAuthncontextClassrefMapping">
<Value>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport|0||default</Value>
</Attribute>
<Attribute name="idpAccountMapper">
<Value>com.sun.identity.saml2.plugins.DefaultIDPAccountMapper</Value>
</Attribute>
<Attribute name="idpAttributeMapper">
<Value>com.sun.identity.saml2.plugins.DefaultIDPAttributeMapper</Value>
</Attribute>
<Attribute name="assertionIDRequestMapper">
<Value>com.sun.identity.saml2.plugins.DefaultAssertionIDRequestMapper</Value>
</Attribute>
<Attribute name="nameIDFormatMap">
<Value>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress=mail</Value>
<Value>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName=</Value>
<Value>urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName=</Value>
<Value>urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos=</Value>
<Value>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified=</Value>
</Attribute>
<Attribute name="idpECPSessionMapper">
<Value>com.sun.identity.saml2.plugins.DefaultIDPECPSessionMapper</Value>
</Attribute>
<Attribute name="attributeMap">
<Value>uid=uid</Value>
<Value>sn=sn</Value>
<Value>cn=cn</Value>
</Attribute>
<Attribute name="wantNameIDEncrypted">
<Value/>
</Attribute>
<Attribute name="wantArtifactResolveSigned">
<Value/>
</Attribute>
<Attribute name="wantLogoutRequestSigned">
<Value/>
</Attribute>
<Attribute name="wantLogoutResponseSigned">
<Value/>
</Attribute>
<Attribute name="wantMNIRequestSigned">
<Value/>
</Attribute>
<Attribute name="wantMNIResponseSigned">
<Value/>
</Attribute>
<Attribute name="cotlist">
<Value>cot</Value>
</Attribute>
<Attribute name="discoveryBootstrappingEnabled">
<Value>false</Value>
</Attribute>
<Attribute name="assertionCacheEnabled">
<Value>false</Value>
</Attribute>
<Attribute name="assertionNotBeforeTimeSkew">
<Value>600</Value>
</Attribute>
<Attribute name="saeAppSecretList"/>
<Attribute name="saeIDPUrl">
<Value>http://openam.example.com:8080/openam/idpsaehandler/metaAlias/idp</Value>
</Attribute>
<Attribute name="AuthUrl">
<Value/>
</Attribute>
<Attribute name="appLogoutUrl">
<Value/>
</Attribute>
<Attribute name="idpSessionSyncEnabled">
<Value>false</Value>
</Attribute>
<Attribute name="relayStateUrlList"/>
</IDPSSOConfig>
<AttributeAuthorityConfig metaAlias="/attra">
<Attribute name="signingCertAlias">
<Value>test</Value>
</Attribute>
<Attribute name="encryptionCertAlias">
<Value>test</Value>
</Attribute>
<Attribute name="default_attributeAuthorityMapper">
<Value>com.sun.identity.saml2.plugins.DefaultAttributeAuthorityMapper</Value>
</Attribute>
<Attribute name="x509Subject_attributeAuthorityMapper">
<Value>com.sun.identity.saml2.plugins.X509SubjectAttributeAuthorityMapper</Value>
</Attribute>
<Attribute name="x509SubjectDataStoreAttrName">
<Value/>
</Attribute>
<Attribute name="assertionIDRequestMapper">
<Value>com.sun.identity.saml2.plugins.DefaultAssertionIDRequestMapper</Value>
</Attribute>
</AttributeAuthorityConfig>
</EntityConfig>