Skip to Content.
Sympa Menu

shibboleth-dev - RE: [Shib-Dev] lessons learned from AD FS 2.0

Subject: Shibboleth Developers

List archive

RE: [Shib-Dev] lessons learned from AD FS 2.0


Chronological Thread 
  • From: "Scott Cantor" <>
  • To: <>
  • Subject: RE: [Shib-Dev] lessons learned from AD FS 2.0
  • Date: Sun, 24 Oct 2010 17:37:30 -0400
  • Organization: The Ohio State University

> 5. The same certificate SHOULD NOT be used by two different entities.

I think that's up to the deployer.

> 3. If an implementation produces metadata on-the-fly, it SHOULD
> produce metadata with at most one encryption key.
>
> It's this very last requirement that is the purpose of this message
> (since the previous two are already met by Shib). Regardless of the
> number of decryption keys configured, does the SP produce metadata
> with at most one encryption key?

No, since there is no SAML requirement to limit that.

> If every <md:KeyDescriptor> element in metadata has a 'use' XML
> attribute, multiple encryption keys in metadata are not strictly
> required. So the first step of the key rollover process should be to
> replace a <md:KeyDescriptor> element having no 'use' attribute with
> two <md:KeyDescriptor> elements having explicit 'use' attributes. Was
> this intentionally overlooked?

The generated metadata, which is a testing tool, simply reflects the
configuration as accurately as possible (and no more so, since it can get
many things wrong). That's all it was intended to do.

-- Scott





Archive powered by MHonArc 2.6.16.

Top of Page