github.com/vmware/go-vcloud-director/v2@v2.24.0/govcd/test-resources/saml-test-idp.xml (about) 1 <EntityDescriptor xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" 2 xmlns:xml="http://www.w3.org/XML/1998/namespace" xmlns:mdui="urn:oasis:names:tc:SAML:metadata:ui" 3 xmlns="urn:oasis:names:tc:SAML:2.0:metadata" ID="SAMLtestIdP" 4 validUntil="2100-01-01T00:00:42Z" entityID="https://samltest.id/saml/idp"> 5 6 <IDPSSODescriptor 7 protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0"> 8 9 <Extensions> 10 <!-- An enumeration of the domains this IdP is able to assert scoped attributes, which are 11 typically those with a @ delimiter, like mail. Most IdP's serve only a single domain. It's crucial 12 for the SP to check received attribute values match permitted domains to prevent a recognized IdP from 13 sending attribute values for which a different recognized IdP is authoritative. --> 14 <shibmd:Scope regexp="false">samltest.id</shibmd:Scope> 15 16 <!-- Display information about this IdP that can be used by SP's and discovery 17 services to identify the IdP meaningfully for end users --> 18 <mdui:UIInfo> 19 <mdui:DisplayName xml:lang="en">SAMLtest IdP</mdui:DisplayName> 20 <mdui:Description xml:lang="en">A free and basic IdP for testing SAML deployments</mdui:Description> 21 <mdui:Logo height="90" width="225">https://samltest.id/saml/logo.png</mdui:Logo> 22 </mdui:UIInfo> 23 </Extensions> 24 25 <KeyDescriptor use="signing"> 26 <ds:KeyInfo> 27 <ds:X509Data> 28 <ds:X509Certificate> 29 MIIDETCCAfmgAwIBAgIUZRpDhkNKl5eWtJqk0Bu1BgTTargwDQYJKoZIhvcNAQEL 30 BQAwFjEUMBIGA1UEAwwLc2FtbHRlc3QuaWQwHhcNMTgwODI0MjExNDEwWhcNMzgw 31 ODI0MjExNDEwWjAWMRQwEgYDVQQDDAtzYW1sdGVzdC5pZDCCASIwDQYJKoZIhvcN 32 AQEBBQADggEPADCCAQoCggEBAJrh9/PcDsiv3UeL8Iv9rf4WfLPxuOm9W6aCntEA 33 8l6c1LQ1Zyrz+Xa/40ZgP29ENf3oKKbPCzDcc6zooHMji2fBmgXp6Li3fQUzu7yd 34 +nIC2teejijVtrNLjn1WUTwmqjLtuzrKC/ePoZyIRjpoUxyEMJopAd4dJmAcCq/K 35 k2eYX9GYRlqvIjLFoGNgy2R4dWwAKwljyh6pdnPUgyO/WjRDrqUBRFrLQJorR2kD 36 c4seZUbmpZZfp4MjmWMDgyGM1ZnR0XvNLtYeWAyt0KkSvFoOMjZUeVK/4xR74F8e 37 8ToPqLmZEg9ZUx+4z2KjVK00LpdRkH9Uxhh03RQ0FabHW6UCAwEAAaNXMFUwHQYD 38 VR0OBBYEFJDbe6uSmYQScxpVJhmt7PsCG4IeMDQGA1UdEQQtMCuCC3NhbWx0ZXN0 39 LmlkhhxodHRwczovL3NhbWx0ZXN0LmlkL3NhbWwvaWRwMA0GCSqGSIb3DQEBCwUA 40 A4IBAQBNcF3zkw/g51q26uxgyuy4gQwnSr01Mhvix3Dj/Gak4tc4XwvxUdLQq+jC 41 cxr2Pie96klWhY/v/JiHDU2FJo9/VWxmc/YOk83whvNd7mWaNMUsX3xGv6AlZtCO 42 L3JhCpHjiN+kBcMgS5jrtGgV1Lz3/1zpGxykdvS0B4sPnFOcaCwHe2B9SOCWbDAN 43 JXpTjz1DmJO4ImyWPJpN1xsYKtm67Pefxmn0ax0uE2uuzq25h0xbTkqIQgJzyoE/ 44 DPkBFK1vDkMfAW11dQ0BXatEnW7Gtkc0lh2/PIbHWj4AzxYMyBf5Gy6HSVOftwjC 45 voQR2qr2xJBixsg+MIORKtmKHLfU 46 </ds:X509Certificate> 47 </ds:X509Data> 48 </ds:KeyInfo> 49 50 </KeyDescriptor> 51 <KeyDescriptor use="signing"> 52 <ds:KeyInfo> 53 <ds:X509Data> 54 <ds:X509Certificate> 55 MIIDEjCCAfqgAwIBAgIVAMECQ1tjghafm5OxWDh9hwZfxthWMA0GCSqGSIb3DQEB 56 CwUAMBYxFDASBgNVBAMMC3NhbWx0ZXN0LmlkMB4XDTE4MDgyNDIxMTQwOVoXDTM4 57 MDgyNDIxMTQwOVowFjEUMBIGA1UEAwwLc2FtbHRlc3QuaWQwggEiMA0GCSqGSIb3 58 DQEBAQUAA4IBDwAwggEKAoIBAQC0Z4QX1NFKs71ufbQwoQoW7qkNAJRIANGA4iM0 59 ThYghul3pC+FwrGv37aTxWXfA1UG9njKbbDreiDAZKngCgyjxj0uJ4lArgkr4AOE 60 jj5zXA81uGHARfUBctvQcsZpBIxDOvUUImAl+3NqLgMGF2fktxMG7kX3GEVNc1kl 61 bN3dfYsaw5dUrw25DheL9np7G/+28GwHPvLb4aptOiONbCaVvh9UMHEA9F7c0zfF 62 /cL5fOpdVa54wTI0u12CsFKt78h6lEGG5jUs/qX9clZncJM7EFkN3imPPy+0HC8n 63 spXiH/MZW8o2cqWRkrw3MzBZW3Ojk5nQj40V6NUbjb7kfejzAgMBAAGjVzBVMB0G 64 A1UdDgQWBBQT6Y9J3Tw/hOGc8PNV7JEE4k2ZNTA0BgNVHREELTArggtzYW1sdGVz 65 dC5pZIYcaHR0cHM6Ly9zYW1sdGVzdC5pZC9zYW1sL2lkcDANBgkqhkiG9w0BAQsF 66 AAOCAQEASk3guKfTkVhEaIVvxEPNR2w3vWt3fwmwJCccW98XXLWgNbu3YaMb2RSn 67 7Th4p3h+mfyk2don6au7Uyzc1Jd39RNv80TG5iQoxfCgphy1FYmmdaSfO8wvDtHT 68 TNiLArAxOYtzfYbzb5QrNNH/gQEN8RJaEf/g/1GTw9x/103dSMK0RXtl+fRs2nbl 69 D1JJKSQ3AdhxK/weP3aUPtLxVVJ9wMOQOfcy02l+hHMb6uAjsPOpOVKqi3M8XmcU 70 ZOpx4swtgGdeoSpeRyrtMvRwdcciNBp9UZome44qZAYH1iqrpmmjsfI9pJItsgWu 71 3kXPjhSfj1AJGR1l9JGvJrHki1iHTA== 72 </ds:X509Certificate> 73 </ds:X509Data> 74 </ds:KeyInfo> 75 76 </KeyDescriptor> 77 <KeyDescriptor use="encryption"> 78 <ds:KeyInfo> 79 <ds:X509Data> 80 <ds:X509Certificate> 81 MIIDEjCCAfqgAwIBAgIVAPVbodo8Su7/BaHXUHykx0Pi5CFaMA0GCSqGSIb3DQEB 82 CwUAMBYxFDASBgNVBAMMC3NhbWx0ZXN0LmlkMB4XDTE4MDgyNDIxMTQwOVoXDTM4 83 MDgyNDIxMTQwOVowFjEUMBIGA1UEAwwLc2FtbHRlc3QuaWQwggEiMA0GCSqGSIb3 84 DQEBAQUAA4IBDwAwggEKAoIBAQCQb+1a7uDdTTBBFfwOUun3IQ9nEuKM98SmJDWa 85 MwM877elswKUTIBVh5gB2RIXAPZt7J/KGqypmgw9UNXFnoslpeZbA9fcAqqu28Z4 86 sSb2YSajV1ZgEYPUKvXwQEmLWN6aDhkn8HnEZNrmeXihTFdyr7wjsLj0JpQ+VUlc 87 4/J+hNuU7rGYZ1rKY8AA34qDVd4DiJ+DXW2PESfOu8lJSOteEaNtbmnvH8KlwkDs 88 1NvPTsI0W/m4SK0UdXo6LLaV8saIpJfnkVC/FwpBolBrRC/Em64UlBsRZm2T89ca 89 uzDee2yPUvbBd5kLErw+sC7i4xXa2rGmsQLYcBPhsRwnmBmlAgMBAAGjVzBVMB0G 90 A1UdDgQWBBRZ3exEu6rCwRe5C7f5QrPcAKRPUjA0BgNVHREELTArggtzYW1sdGVz 91 dC5pZIYcaHR0cHM6Ly9zYW1sdGVzdC5pZC9zYW1sL2lkcDANBgkqhkiG9w0BAQsF 92 AAOCAQEABZDFRNtcbvIRmblnZItoWCFhVUlq81ceSQddLYs8DqK340//hWNAbYdj 93 WcP85HhIZnrw6NGCO4bUipxZXhiqTA/A9d1BUll0vYB8qckYDEdPDduYCOYemKkD 94 dmnHMQWs9Y6zWiYuNKEJ9mf3+1N8knN/PK0TYVjVjXAf2CnOETDbLtlj6Nqb8La3 95 sQkYmU+aUdopbjd5JFFwbZRaj6KiHXHtnIRgu8sUXNPrgipUgZUOVhP0C0N5OfE4 96 JW8ZBrKgQC/6vJ2rSa9TlzI6JAa5Ww7gMXMP9M+cJUNQklcq+SBnTK8G+uBHgPKR 97 zBDsMIEzRtQZm4GIoHJae4zmnCekkQ== 98 </ds:X509Certificate> 99 </ds:X509Data> 100 </ds:KeyInfo> 101 102 </KeyDescriptor> 103 104 <!-- An endpoint for artifact resolution. Please see Wikipedia for more details about SAML 105 artifacts and when you may find them useful. --> 106 107 <ArtifactResolutionService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" 108 Location="https://samltest.id/idp/profile/SAML2/SOAP/ArtifactResolution" index="1"/> 109 110 <!-- A set of endpoints where the IdP can receive logout messages. These must match the public 111 facing addresses if this IdP is hosted behind a reverse proxy. --> 112 <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" 113 Location="https://samltest.id/idp/profile/SAML2/Redirect/SLO"/> 114 <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" 115 Location="https://samltest.id/idp/profile/SAML2/POST/SLO"/> 116 <SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign" 117 Location="https://samltest.id/idp/profile/SAML2/POST-SimpleSign/SLO"/> 118 119 <!-- A set of endpoints the SP can send AuthnRequests to in order to trigger user authentication. --> 120 <SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" 121 Location="https://samltest.id/idp/profile/Shibboleth/SSO"/> 122 <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" 123 Location="https://samltest.id/idp/profile/SAML2/POST/SSO"/> 124 <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign" 125 Location="https://samltest.id/idp/profile/SAML2/POST-SimpleSign/SSO"/> 126 <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" 127 Location="https://samltest.id/idp/profile/SAML2/Redirect/SSO"/> 128 <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" 129 Location="https://samltest.id/idp/profile/SAML2/SOAP/ECP"/> 130 131 </IDPSSODescriptor> 132 133 </EntityDescriptor>