3 //This is variable is an example - Just make sure that the urls in the 'idp' config are ok.
4 $idp_host = env('SAML2_IDP_HOST', 'http://localhost:8000/simplesaml');
6 return $settings = array(
9 * Whether the SAML login is enabled
11 'enabled' => env("SAML2_ENABLED", false),
14 * If 'useRoutes' is set to true, the package defines five new routes:
17 * -------|--------------------------|------------------
18 * POST | {routesPrefix}/acs | saml_acs
19 * GET | {routesPrefix}/login | saml_login
20 * GET | {routesPrefix}/logout | saml_logout
21 * GET | {routesPrefix}/metadata | saml_metadata
22 * GET | {routesPrefix}/sls | saml_sls
26 'routesPrefix' => '/saml2',
29 * which middleware group to use for the saml routes
30 * Laravel 5.2 will need a group which includes StartSession
32 'routesMiddleware' => ['saml'],
35 * Indicates how the parameters will be
36 * retrieved from the sls request for signature validation
38 'retrieveParametersFromServer' => false,
41 * Where to redirect after logout
46 * Where to redirect after login if no other option was provided
52 * Where to redirect after login if no other option was provided
65 // If 'strict' is True, then the PHP Toolkit will reject unsigned
66 // or unencrypted messages if it expects them signed or encrypted
67 // Also will reject the messages if not strictly follow the SAML
68 // standard: Destination, NameId, Conditions ... are validated too.
69 'strict' => true, //@todo: make this depend on laravel config
71 // Enable debug mode (to print errors)
72 'debug' => env('APP_DEBUG', false),
74 // If 'proxyVars' is True, then the Saml lib will trust proxy headers
75 // e.g X-Forwarded-Proto / HTTP_X_FORWARDED_PROTO. This is useful if
76 // your application is running behind a load balancer which terminates
80 // Service Provider Data that we are deploying
83 // Specifies constraints on the name identifier to be used to
84 // represent the requested subject.
85 // Take a look on lib/Saml2/Constants.php to see the NameIdFormat supported
86 'NameIDFormat' => 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent',
88 // Usually x509cert and privateKey of the SP are provided by files placed at
89 // the certs folder. But we can also provide them with the following parameters
90 'x509cert' => env('SAML2_SP_x509',''),
91 'privateKey' => env('SAML2_SP_PRIVATEKEY',''),
93 // Identifier (URI) of the SP entity.
94 // Leave blank to use the 'saml_metadata' route.
95 'entityId' => env('SAML2_SP_ENTITYID',''),
97 // Specifies info about where and how the <AuthnResponse> message MUST be
98 // returned to the requester, in this case our SP.
99 'assertionConsumerService' => array(
100 // URL Location where the <Response> from the IdP will be returned,
101 // using HTTP-POST binding.
102 // Leave blank to use the 'saml_acs' route
105 'binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect',
107 // Specifies info about where and how the <Logout Response> message MUST be
108 // returned to the requester, in this case our SP.
109 // Remove this part to not include any URL Location in the metadata.
110 'singleLogoutService' => array(
111 // URL Location where the <Response> from the IdP will be returned,
112 // using HTTP-Redirect binding.
113 // Leave blank to use the 'saml_sls' route
118 // Identity Provider Data that we want connect with our SP
120 // Identifier of the IdP entity (must be a URI)
121 'entityId' => env('SAML2_IDP_ENTITYID', $idp_host . '/saml2/idp/metadata.php'),
122 // SSO endpoint info of the IdP. (Authentication Request protocol)
123 'singleSignOnService' => array(
124 // URL Target of the IdP where the SP will send the Authentication Request Message,
125 // using HTTP-Redirect binding.
126 'url' => env('SAML2_IDP_SSO', $idp_host . '/saml2/idp/SSOService.php'),
128 // SLO endpoint info of the IdP.
129 'singleLogoutService' => array(
130 // URL Location of the IdP where the SP will send the SLO Request,
131 // using HTTP-Redirect binding.
132 'url' => env('SAML2_IDP_SLO', $idp_host . '/saml2/idp/SingleLogoutService.php'),
134 // Public x509 certificate of the IdP
135 'x509cert' => env('SAML2_IDP_x509', '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'),
137 * Instead of use the whole x509cert you can use a fingerprint
138 * (openssl x509 -noout -fingerprint -in "idp.crt" to generate it)
140 // 'certFingerprint' => '',
144 * OneLogin compression settings
148 /** Whether requests should be GZ encoded */
150 /** Whether responses should be GZ compressed */
156 * OneLogin advanced settings
163 /** signatures and encryptions offered */
165 // Indicates that the nameID of the <samlp:logoutRequest> sent by this SP
166 // will be encrypted.
167 'nameIdEncrypted' => false,
169 // Indicates whether the <samlp:AuthnRequest> messages sent by this SP
170 // will be signed. [The Metadata of the SP will offer this info]
171 'authnRequestsSigned' => false,
173 // Indicates whether the <samlp:logoutRequest> messages sent by this SP
175 'logoutRequestSigned' => false,
177 // Indicates whether the <samlp:logoutResponse> messages sent by this SP
179 'logoutResponseSigned' => false,
182 False || True (use sp certs) || array (
183 keyFileName => 'metadata.key',
184 certFileName => 'metadata.crt'
187 'signMetadata' => false,
190 /** signatures and encryptions required **/
192 // Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest> and
193 // <samlp:LogoutResponse> elements received by this SP to be signed.
194 'wantMessagesSigned' => false,
196 // Indicates a requirement for the <saml:Assertion> elements received by
197 // this SP to be signed. [The Metadata of the SP will offer this info]
198 'wantAssertionsSigned' => false,
200 // Indicates a requirement for the NameID received by
201 // this SP to be encrypted.
202 'wantNameIdEncrypted' => false,
204 // Authentication context.
205 // Set to false and no AuthContext will be sent in the AuthNRequest,
206 // Set true or don't present thi parameter and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'
207 // Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509'),
208 'requestedAuthnContext' => true,
211 // Contact information template, it is recommended to suply a technical and support contacts
212 'contactPerson' => array(
213 'technical' => array(
214 'givenName' => 'name',
218 'givenName' => 'Support',
223 // Organization information template, the info in en_US lang is recomended, add more if required
224 'organization' => array(
227 'displayname' => 'Display Name',
228 'url' => 'http://url'
232 /* Interoperable SAML 2.0 Web Browser SSO Profile [saml2int] http://saml2int.org/profile/current
234 'authnRequestsSigned' => false, // SP SHOULD NOT sign the <samlp:AuthnRequest>,
235 // MUST NOT assume that the IdP validates the sign
236 'wantAssertionsSigned' => true,
237 'wantAssertionsEncrypted' => true, // MUST be enabled if SSL/HTTPs is disabled
238 'wantNameIdEncrypted' => false,