This project is a plugin for The Fascinator project: https://code.google.com/p/the-fascinator though, typically, it would be used in an institutional build of RedBoX: http://code.google.com/p/redbox-mint/ .
These instructions explain how to install the plugin and how to configure it, however, additional work is needed in order actually use shibboleth. Please see the following documentation for more information:
- https://wiki.shibboleth.net/confluence/display/SHIB2/Installation+and+Configuration
- http://wiki.aaf.edu.au/tech-info/sp-install-guide
For windows users you may need to incorperate elements (and get downloads) from:
To compile the fascinator-shibboleth plugin:
#> mvn install
To enable Shibboleth in your institutional build (when using ReDBox for example)
add the following dependency to your pom.xml
:
<dependency>
<groupId>fascinator-shibboleth</groupId>
<artifactId>fascinator-shibboleth</artifactId>
<version>${shib.version}</version>
</dependency>
You will need to add the unpack-shib-conf execution to the maven-dependency-plugin:
<!-- 1st - Unpack Generic Mint setup -->
<plugin>
<artifactId>maven-dependency-plugin</artifactId>
<version>2.1</version>
<executions>
<execution>
.
.
.
</execution>
<!-- Shibboleth Resources -->
<execution>
<id>unpack-shib-conf</id>
<phase>process-resources</phase>
<goals>
<goal>unpack</goal>
</goals>
<configuration>
<outputDirectory>${project.home}</outputDirectory>
<artifactItems>
<artifactItem>
<groupId>fascinator-shibboleth</groupId>
<artifactId>fascinator-shibboleth</artifactId>
<classifier>redbox-config</classifier>
<type>zip</type>
</artifactItem>
</artifactItems>
</configuration>
</execution>
</executions>
</plugin>
In the sso section of home/system-config.json
, enable the Shibboleth plugin:
.
.
.
"sso": {
"plugins": ["Shibboleth"],
.
.
.
Add the Shibboleth configuration section, and configure it according to your connector requirements (see below):
"Shibboleth":{
"use_headers": "false",
"username_attribute":"eppn",
"cn_attribute":"cn",
"session_attribute":"Shib-Session-ID",
"idp_attribute":"Shib-Identity-Provider",
"attributes":["affiliation"],
"delimiter":";",
"rolePlugins":["SimpleShibbolethRoleManager"],
.
.
.
}
There are two ways to configure the fascinator-shibboleth plugin:
- AJP Connector (recommended by shibboleth)
- HTTP Connector
The use_headers
element enables the Shibboleth plugin to process the request HEADERS
along with the request ATTRIBUTES
for Shibboleth attributes. This is disabled by
default because it posses a security issue as clients can spoof the request headers.
The username_attribute
element indicates which Shibboleth attribute contains the
user's username.
The cn_attribute
element indicates which Shibboleth attribute contains the user's
common name.
The session_attribute
element indicates which Shibboleth attribute contains the
Shibboleth session ID.
The idp_attribute
element indicates which Shibboleth attribute contains the
Shibboleth IDP value.
The attributes
element contains a list of Shibboleth attributes that will be extracted
from the request and attached to the session for processing by role managers etc.
The delimiter
element contains the character or string that will be used to split
attributes that have multiple values delimited by the delimiter. eg: the affiliation
attribute often contains more than on value:
affiliation: member@edu.au;student@edu.au
###rolePlugins
the rolePlugins
element is a list of SimpleShibbolethRoleManager IDs that will
be enabled by this configuration. eg. the config above enables the
SimpleShibbolethRoleManager with:
"rolePlugins":["SimpleShibbolethRoleManager"]
When the SimpleShibbolethRoleManager is enabled it will need to be configured. It expects to find its configuration in the existing Shibboleth block, for example:
"Shibboleth":{
.
.
.
"SimpleShibbolethRoleManager":{
"reviewer":[
[
["affiliation","is","member@edu.au"]
],
[
["auEduPersonSharedToken","is","ddsdsf678hgH878786G67F7Fg"]
]
],
"ourInstitution":[
[
["Shib-Identity-Provider","is","https://idp.example.com:8443/idp/shibboleth"]
]
]
}
},
The format of the SimpleShibbolethRoleManager block is:
role:[
[ //
[attribute, operation, rule_value], //Rule1 // Rule Group 1
[attribute, operation, rule_value] //Rule2 //
] //
,
[ //
[attribute, operation, rule_value], //Rule3 // Rule Group 2
[attribute, operation, rule_value] //Rule4 //
] //
],
role2:[
.
.
.
Where
role
is the role that will be applied.attribute
is the Shibboleth attribute attached to the session.operation
is the ID of the ShibSimpleRoleOperator plugin to use.rule_value
is a value passed to the operation along with the value of theattribute
retrieved from the session.
Within a role
's rule groups, the results of each operation are logically AND
ed together.
Between a role
's rule groups, the rule group's results are logically OR
ed together.
The first Role above would thus be evaluated as:
(Rule1 && Rule2) || (Rule3 && Rul4)
There are currently two types of plugins that can be implemented to extend the functionality of the fascinator-shibboleth plugin:
- au.edu.jcu.fascinator.portal.sso.shibboleth.ShibbolethRoleManager
- au.edu.jcu.fascinator.portal.sso.shibboleth.roles.simple.ShibSimpleRoleOperator
The ShibbolethRoleManager plugins allow developers to implement there own plugin for assigning roles to users. The ShibSimpleRoleOperator plugins allow developers to extent the functionality of the SimpleShibbolethRoleManager by implementing new operations. Both of these plugins use the standard Fascinator plugin mechanisms.
You can add the following to your server/jetty/resources/logback.groovy
file to enable the output of the Shibboleth SSO plugin's debug messages to ${logHome}/logs/shibboleth.log
appender("Shibboleth", RollingFileAppender) {
file = "${logHome}/logs/shibboleth.log"
rollingPolicy(TimeBasedRollingPolicy) {
fileNamePattern = "${logHome}/logs/archives/%d{yyyy-MM}_shibboleth.zip"
maxHistory = 30
}
encoder(PatternLayoutEncoder) {
pattern = "%d %-8X{name} %-6p %-20.20c{0} %m%n"
}
}
logger("au.edu.jcu", TRACE, ["Shibboleth"])
This project is supported by the Australian National Data Service (ANDS) through the National Collaborative Research Infrastructure Strategy Program and the Education Investment Fund (EIF) Super Science Initiative, as well as through the Queensland Cyber Infrastructure Foundation (QCIF).
All code licensed under GPLv2 - see LICENSE
for details.