This guide shows how to adapt existing institutional systems to a SAML federated environment. The access management solution used on this example is OpenAM. OpenAM uses SAML as default authentication protocol. Please replace every openam.sso.appsedudemo.com with OpenAM domain and sso.appsedudemo.com with your domain where your application is installed. Prerequisites:
Instructions:
<?php $spBaseUrl = 'http://sso.appsedudemo.com/php-saml'; //or http://<your_domain> $settingsInfo = array ( 'debug' => true, 'strict' => false, 'sp' => array ( 'entityId' => $spBaseUrl.'/demo1/metadata.php', 'assertionConsumerService' => array ( 'url' => $spBaseUrl.'/demo1/index.php?acs', ),/* 'singleLogoutService' => array ( 'url' => $spBaseUrl.'/demo1/index.php?sls', ),*/ 'NameIDFormat' => 'urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress', ), 'idp' => array ( 'entityId' => 'http://openam.sso.appsedudemo.com:8080/openam/saml2/jsp/exportmetadata.jsp?entityid=http://openam.sso.appsedudemo.com:8080/openam&realm=/sp-google-idp-ldap', 'singleSignOnService' => array ( 'url' => 'http://openam.sso.appsedudemo.com:8080/openam/SSORedirect/metaAlias/sp-google-idp-ldap/idp', ), 'singleLogoutService' => array ( 'url' => 'http://openam.sso.appsedudemo.com:8080/openam/UI/Logout?goto=http://openam.sso.appsedudemo.com:8080/openam/UI/Login?realm=sp-google-idp-ldap', ), 'certFingerprint' => 'DE:F1:8D:BE:D5:47:CD:F3:D5:2B:62:7F:41:63:7C:44:30:45:FE:33', ), );
|
Home > SSO Single Sign-On >