-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
springSecurityFilterChain bean missing #9
Comments
Hi, in order to use SSO, please also provide the relevant config in the lightbend config files. You can do this BEFORE enabling saml via Admin Tools / System Config or directly via helm configs: edusharing_repository:
edusharing_repository_service:
config:
override:
config:
application:
settings: |
spring.profiles.active=samlEnabled
security.sso.saml{
useHomeApplicationKeys: true
idp: {
metadata: {
url: "http://"
}
}
}
Details on what is possible to be overriden (additional parameters) can be found in the default config file: Best Regards |
Hi Torsten and thanks for your quick response! |
Hi! As stated in the first answer, you need to set the "url" in the config to the desired discovery url of your IDP. All metadata will be fetched from there. |
Ah, I see. And are those env not needed at all, when using the internal shibboleth:
And I suppose this is also meant to be used with the internal shibboleth:
What about using an external Shibboleth SP (shibd) that also functions as a reverse proxy? Would this be a better approach in terms of microservices? What would you recommend? Thanks a lot! |
Hi, edu-sharing is currently not supporting the use of an external shibboleth service provider in k8s environment. Best Regards |
Thank you for your response! Unfortunately, this is a pity... Do you have any plans for when the feature will be supported? |
on a kubernetes cluster when enabling saml with:
we are getting
please provide some documentation!
The text was updated successfully, but these errors were encountered: