From 6749f63b61107061946eb53a97ad13c450b95e32 Mon Sep 17 00:00:00 2001 From: info Date: Mon, 26 Apr 2021 17:42:49 +0000 Subject: [PATCH 1/2] new master submodules --- docker/wordpress/plugins/saml | 2 +- docker/wordpress/src | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docker/wordpress/plugins/saml b/docker/wordpress/plugins/saml index dc3ceb5..0b869d3 160000 --- a/docker/wordpress/plugins/saml +++ b/docker/wordpress/plugins/saml @@ -1 +1 @@ -Subproject commit dc3ceb5a583bfe1a70e85c84c69ccbd505d95f46 +Subproject commit 0b869d355ade9ea90397e4f99838e270ccf29532 diff --git a/docker/wordpress/src b/docker/wordpress/src index a331467..f28be63 160000 --- a/docker/wordpress/src +++ b/docker/wordpress/src @@ -1 +1 @@ -Subproject commit a3314672f30af2c0d9a214931976e3769a0cd8c2 +Subproject commit f28be63bfe19671f5628a57bd8135dec0cb153d2 From c07a856c116aeb46fe928537647bade063cbdbcb Mon Sep 17 00:00:00 2001 From: info Date: Tue, 27 Apr 2021 06:34:15 +0000 Subject: [PATCH 2/2] Updated saml docs --- SAML_README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/SAML_README.md b/SAML_README.md index fc1b240..23270cc 100644 --- a/SAML_README.md +++ b/SAML_README.md @@ -7,7 +7,7 @@ # Moodle 1. Activate SAML2 plugin -2. Regenerate SP certificate: https://moodle./auth/saml2/regenerate.php +2. Regenerate SP certificate: https://moodle./auth/saml2/regenerate.php and lock it down 3. Download SAML2 Service Provider xml: https://moodle./auth/saml2/sp/metadata.php 4. Import this SP in keycloak IDP: https://sso./auth/admin/master/console/#/create/client/poc 5. Add builtin email, givenname and surname field mappers (https://sso./auth/admin/master/console/#/realms/poc/clients/b7781aac-5aa5-441a-8af5-aca7cc0a1daf/mappers) @@ -117,8 +117,8 @@ TODO: Does not map email nor friendlyname (display name). Also not tested to add 1. x509: public.key (generated before) 2. Private key: private.key (generated before) 3. Identity Provider Data - 1. Identifier of the IdP: https://sso./auth/realms/poc - 2. URL target of the IdP: https://sso./auth/realms/poc/protocol/saml + 1. Identifier of the IdP: https://sso./auth/realms/master + 2. URL target of the IdP: https://sso./auth/realms/master/protocol/saml 3. URL Location of the IdP SLO request: https://sso./auth/realms/poc/protocol/saml 4. Public X.509 certificate: (The RSA Certificate from keycloak at step 1). 4. Attribute mapping @@ -197,9 +197,9 @@ Client Id in keycloak has to be 'php-saml' if not set at wordpress saml plugin. 1. Enable 3. IDENTITY PROVIDER SETTINGS 1. iDp ENTITY ID: Anything you want - 1. SSO Service Url: https://sso.digitaldemocratic.net/auth/realms/poc/protocol/saml - 2. SLO Service Url: https://sso.digitaldemocratic.net/auth/realms/poc/protocol/saml - 3. X.509 Certificate: Copy the Certificate (not the Public key) from the keycloak realm (https://sso.digitaldemocratic.net/auth/admin/master/console/#/realms/poc/keys) without the begin/end lines in the cert. + 1. SSO Service Url: https://sso.digitaldemocratic.net/auth/realms/master/protocol/saml + 2. SLO Service Url: https://sso.digitaldemocratic.net/auth/realms/master/protocol/saml + 3. X.509 Certificate: Copy the Certificate (not the Public key) from the keycloak realm (https://sso.digitaldemocratic.net/auth/admin/master/console/#/realms/master/keys) without the begin/end lines in the cert. 4. OPTIONS 1. Create user if not exists 2. Update user data