Seitenhistorie
...
Adjust /opt/shibboleth-idp/conf/ldap.properties
to taste, according to section "Basic General Configuration" from the documentation.
Hinweis | ||||
---|---|---|---|---|
| ||||
If you're using LDAPS to connect to your LDAP servers (use of LDAP+STARTTLS shouldn't need anything special) be sure to also follow the steps mentioned in the LDAPonJava>8 documentation in the Shibboleth wiki, i.e. within your
|
After changes to (any) property files you'll need to restart the whole container (i.e., Tomcat) for the changes to become active:
The properties file If OTOH you intend to use the |
Tipp |
---|
Kein Format |
In order to test/verify your authentication configuration |
...
use the |
...
methods described in our Testing an IDP documentation. |
Further reading for more advanced needs:
- https://wiki.shibboleth.net/confluence/display/IDP30/AuthenticationConfiguration
- https://wiki.shibboleth.net/confluence/display/IDP30/PasswordAuthnConfiguration
...
E.g. you may be interested in the automated account lockout feature (even though this allows anyone to DoS individual accounts simply by repeatedly providing an incorrect passwort for given accounts), see Account Lockout under Advanced Features in the Shibboleth IDP documentation. In the simplest case you just need to uncomment the bean with id="shibboleth.authn.Password.AccountLockoutManager"
in the file /opt/shibboleth-idp/conf/authn/password-authn-config.xml
(and optionally adjust the parameters to taste). The page for Account Lockout Management explains how to lock/unlock accounts via HTTP and therefore also from the command line using cURL.
As always, after changes to any property files you'll need to restart the whole container (i.e., Tomcat) for the changes to become active:
Kein Format |
---|
systemctl restart tomcat9 |