forked from SUNET/soc-ops
Add missing shib config
This commit is contained in:
parent
3332545dc8
commit
f3b9059f4f
6 changed files with 135 additions and 5 deletions
|
@ -50,5 +50,5 @@ monitor-dev.cert.sunet.se:
|
|||
domain: monitor-dev.cert.sunet.se
|
||||
thruk_admins:
|
||||
- bjorklund@sunet.se
|
||||
default_host_group: sunet::nagios:nrpe
|
||||
default_host_group: sunet::nagios::nrpe
|
||||
nrpe_group: sunet::nagios::nrpe
|
||||
|
|
|
@ -0,0 +1,22 @@
|
|||
<Attributes xmlns="urn:mace:shibboleth:2.0:attribute-map" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
|
||||
|
||||
<!--
|
||||
SWAMID standard attribute-map.xml for SAML 2.0
|
||||
==============================================
|
||||
The mappings are agreed to within the Shibboleth community or directly LDAP attribute names.
|
||||
|
||||
Version: 2017-01-04
|
||||
|
||||
REMEMBER to notify SWAMID saml-admins list when updating this file!
|
||||
-->
|
||||
|
||||
<!-- eduPerson attributes until version 201310 -->
|
||||
<Attribute name="urn:oid:1.3.6.1.4.1.5923.1.1.1.6" id="eppn">
|
||||
<AttributeDecoder xsi:type="ScopedAttributeDecoder"/>
|
||||
</Attribute>
|
||||
<Attribute name="urn:oid:1.3.6.1.4.1.5923.1.1.1.11" id="assurance"/>
|
||||
|
||||
<!-- Attribute to extract SWAMID Assurance Profiles -->
|
||||
<Attribute name="urn:oasis:names:tc:SAML:attribute:assurance-certification" id="Assurance-Certification"/>
|
||||
|
||||
</Attributes>
|
|
@ -0,0 +1,82 @@
|
|||
<afp:AttributeFilterPolicyGroup
|
||||
xmlns="urn:mace:shibboleth:2.0:afp:mf:basic"
|
||||
xmlns:saml="urn:mace:shibboleth:2.0:afp:mf:saml"
|
||||
xmlns:basic="urn:mace:shibboleth:2.0:afp:mf:basic"
|
||||
xmlns:afp="urn:mace:shibboleth:2.0:afp"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
|
||||
|
||||
<!-- Shared rule for affiliation values. -->
|
||||
<afp:PermitValueRule id="eduPersonAffiliationValues" xsi:type="OR">
|
||||
<Rule xsi:type="AttributeValueString" value="faculty"/>
|
||||
<Rule xsi:type="AttributeValueString" value="student"/>
|
||||
<Rule xsi:type="AttributeValueString" value="staff"/>
|
||||
<Rule xsi:type="AttributeValueString" value="alum"/>
|
||||
<Rule xsi:type="AttributeValueString" value="member"/>
|
||||
<Rule xsi:type="AttributeValueString" value="affiliate"/>
|
||||
<Rule xsi:type="AttributeValueString" value="employee"/>
|
||||
<Rule xsi:type="AttributeValueString" value="library-walk-in"/>
|
||||
</afp:PermitValueRule>
|
||||
|
||||
<!--
|
||||
Shared rule for all "scoped" attributes, but you'll have to manually apply it inside
|
||||
an AttributeRule for each attribute you want to check.
|
||||
-->
|
||||
<afp:PermitValueRule id="ScopingRules" xsi:type="AND">
|
||||
<Rule xsi:type="NOT">
|
||||
<Rule xsi:type="AttributeValueRegex" regex="@"/>
|
||||
</Rule>
|
||||
<Rule xsi:type="saml:AttributeScopeMatchesShibMDScope"/>
|
||||
</afp:PermitValueRule>
|
||||
|
||||
<afp:AttributeFilterPolicy>
|
||||
<!-- This policy is in effect in all cases. -->
|
||||
<afp:PolicyRequirementRule xsi:type="ANY"/>
|
||||
|
||||
<!-- Filter out undefined affiliations and ensure only one primary. -->
|
||||
<afp:AttributeRule attributeID="affiliation">
|
||||
<afp:PermitValueRule xsi:type="AND">
|
||||
<RuleReference ref="eduPersonAffiliationValues"/>
|
||||
<RuleReference ref="ScopingRules"/>
|
||||
</afp:PermitValueRule>
|
||||
</afp:AttributeRule>
|
||||
<afp:AttributeRule attributeID="unscoped-affiliation">
|
||||
<afp:PermitValueRuleReference ref="eduPersonAffiliationValues"/>
|
||||
</afp:AttributeRule>
|
||||
<afp:AttributeRule attributeID="primary-affiliation">
|
||||
<afp:PermitValueRuleReference ref="eduPersonAffiliationValues"/>
|
||||
</afp:AttributeRule>
|
||||
|
||||
<afp:AttributeRule attributeID="subject-id">
|
||||
<afp:PermitValueRuleReference ref="ScopingRules"/>
|
||||
</afp:AttributeRule>
|
||||
|
||||
<afp:AttributeRule attributeID="pairwise-id">
|
||||
<afp:PermitValueRuleReference ref="ScopingRules"/>
|
||||
</afp:AttributeRule>
|
||||
|
||||
<afp:AttributeRule attributeID="eppn">
|
||||
<!-- Disabled scope check since the proxy does it for us and the proxies metadata doesn't include scopes from our customers.
|
||||
<afp:PermitValueRuleReference ref="ScopingRules"/>
|
||||
-->
|
||||
</afp:AttributeRule>
|
||||
|
||||
<afp:AttributeRule attributeID="targeted-id">
|
||||
<afp:PermitValueRuleReference ref="ScopingRules"/>
|
||||
</afp:AttributeRule>
|
||||
|
||||
<!-- Require NameQualifier/SPNameQualifier match IdP and SP entityID respectively. -->
|
||||
<afp:AttributeRule attributeID="persistent-id">
|
||||
<afp:PermitValueRule xsi:type="saml:NameIDQualifierString"/>
|
||||
</afp:AttributeRule>
|
||||
|
||||
<!-- Enforce that the values of schacHomeOrganization are a valid Scope. -->
|
||||
<afp:AttributeRule attributeID="schacHomeOrganization">
|
||||
<afp:PermitValueRule xsi:type="saml:AttributeValueMatchesShibMDScope" />
|
||||
</afp:AttributeRule>
|
||||
|
||||
<!-- Catch-all that passes everything else through unmolested. -->
|
||||
<afp:AttributeRule attributeID="*" permitAny="true"/>
|
||||
|
||||
</afp:AttributeFilterPolicy>
|
||||
|
||||
</afp:AttributeFilterPolicyGroup>
|
File diff suppressed because one or more lines are too long
|
@ -100,10 +100,22 @@ class soc::naemon_monitor (
|
|||
# assume cert is in cosmos repo (overlay)
|
||||
}
|
||||
if $custom_shib {
|
||||
file { '/opt/naemon_monitor/shibboleth2.xml':
|
||||
ensure => file,
|
||||
content => template('soc/naemon_monitor/shibboleth2.xml.erb'),
|
||||
mode => '0444',
|
||||
file {
|
||||
'/opt/naemon_monitor/shibboleth2.xml':
|
||||
ensure => file,
|
||||
content => template('soc/naemon_monitor/shibboleth2.xml.erb'),
|
||||
mode => '0444',
|
||||
;
|
||||
'/opt/naemon_monitor/attribute-map.xml':
|
||||
ensure => file,
|
||||
content => file('soc/naemon_monitor/attribute-map.xml'),
|
||||
mode => '0444',
|
||||
;
|
||||
'/opt/naemon_monitor/attribute-policy.xml':
|
||||
ensure => file,
|
||||
content => file('soc/naemon_monitor/attribute-policy.xml'),
|
||||
mode => '0444',
|
||||
;
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -60,6 +60,8 @@ services:
|
|||
- '/opt/naemon_monitor/menu_local.conf:/etc/thruk/menu_local.conf'
|
||||
<%- if @custom_shib -%>
|
||||
- '/opt/naemon_monitor/shibboleth2.xml:/etc/shibboleth/shibboleth2.xml:ro'
|
||||
- '/opt/naemon_monitor/attribute-map.xml:/etc/shibboleth/attribute-map.xml:ro'
|
||||
- '/opt/naemon_monitor/attribute-policy.xml:/etc/shibboleth/attribute-policy.xml:ro'
|
||||
<% end -%>
|
||||
<%- @thruk_extra_volumes.each do |extra_volume| -%>
|
||||
- "<%= extra_volume %>"
|
||||
|
|
Loading…
Add table
Reference in a new issue