installation guide for the Shibboleth IDP 4

The following is an example of a complete set of instructions for the installation and basic configuration of a current Shibboleth 4.x IDP on Debian 11 ("Bullseye"), using Java 11 and Tomcat 9. (Alternatively Ubuntu 18.04 LTS can also be used without any changes to the steps described in this guide.)

What about RHEL/CentOS?

See out notes on deploying the Shibboleth IDP on RHEL/CentOS for our take on the (unfortunate) status quo.

The installation instructions provided in this guide are specific to a deployment without Apache httpd, using Apache Tomcat both as Java Servlet Container and as TLS/SSL-enabled webserver. Do not follow these installtion instructions if you're determined to use Apache httpd (which is also possible, but sufficiently documented elsewhere) – though you can still follow the rest of our documentation (for metadata, resolver, filter, etc. configuration).

There is no point in duplicating the existing Shibboleth IDP documentation. The installation part of this guide is complete but the guide for configuration of a Shibboleth IDP is necessarily incomplete, as deployments can vary significantly and the IDP has tons of (optional) advanced features. Please use the upstream documentation for further steps or more advanced configurations, as hinted at below.

This guide is broken up into several steps in order to allow simple intermediate tests. After step 1 you should have a working TLS-enabled webserver based on Tomcat. Do not move on to step 2 unless you have completed step 1 successfully. Do follow those instructions in the order given. You can always come back to other sections later.

  1. Install and configure Java and Tomcat as webserver with TLS/SSL support, running Tomcat and the JVM as non-root user
  2. Install the Shibboleth IDP software and integrate it with Tomcat
  3. Load SAML Metadata using the Metadata and Metadata Verification Key
    • For new members: Send a copy of your IDP Metadata (by default in /opt/shibboleth-idp/metadata/idp-metadata.xml) to the Operations Team, ideally signed with your S/MIME or OpenPGP key.
  4. Configuring authentication & attribute lookup and generation is somewhat site-dependent
  5. Configure attribute release filters, including controlled, scalable attribute release based on Service Categories

Upstream documentation

Until more steps/topics are covered in the instructions in this wiki please refer to the upstream documentation and engage with the community:

Please make use of the community which has been configuring and running Shibboleth IDPs for over a decade by now! The Contact page has the details for the eduid-discuss mailing list which should be able to help you with any and all problems in this space (Shibboleth IDP-related or maybe even Identity and Access Management issues).

The Shibboleth Wiki has many more suggestions of what to do, esp in the IDP Configuration overview and in the Productionalization sections.
You will also want to do the following:

  • No labels