Skip to content

Commit

Permalink
doc
Browse files Browse the repository at this point in the history
  • Loading branch information
Choon-Chern Lim committed Mar 8, 2016
1 parent bc03ebc commit c193fe1
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ class AppSecurityConfig extends SAMLWebSecurityConfigurerAdapter {
protected SAMLConfigBean samlConfigBean() {
return new SAMLConfigBeanBuilder()
.setAdfsHostName("idp-adfs-server")
.setKeyStoreResource(new DefaultResourceLoader().getResource("classpath:keystore.jks"))
.setKeystoreResource(new DefaultResourceLoader().getResource("classpath:keystore.jks"))
.setKeystorePassword("storepass")
.setKeystoreAlias("alias")
.setKeystorePrivateKeyPassword("keypass")
Expand Down Expand Up @@ -91,15 +91,15 @@ class AppSecurityConfig extends SAMLWebSecurityConfigurerAdapter {
|Property |Required? |Description |
|---------------------------|----------|----------------------------------------------------------------------------------------------------------|
|adfsHostName |Yes |ADFS host name without HTTPS protocol.<p>If ADFS link is `https://idp-adfs-server/adfs/ls`, the value should be `idp-adfs-server`.|
|keyStoreResource |Yes |App's keystore containing its public/private key and ADFS' certificate with public key. |
|keystoreResource |Yes |App's keystore containing its public/private key and ADFS' certificate with public key. |
|keystorePassword |Yes |Password to access app's keystore. |
|keystoreAlias |Yes |Alias of app's public/private key pair. |
|keystorePrivateKeyPassword |Yes |Password to access app's private key. |
|successLoginDefaultUrl |Yes |Where to redirect user on successful login if no saved request is found in the session. |
|successLogoutUrl |Yes |Where to redirect user on successful logout. |
|failedLoginDefaultUrl |No |Where to redirect user on failed login. This value is set to null, which returns 401 error code on failed login. But, in theory, this will never be used because IdP will handled the failed login on IdP login page.<br/><br/>Default is `''`, which return 401 error code.|
|samlUserDetailsService |No |For configuring user authorities (ex: `ROLE_*`) if needed.<br/><br/>Default is `null`. |
|authnContexts |No |Determine what authentication methods to use. To use the order of authentication methods defined by IdP, set as empty set. To enable Windows Integrated Auth (WIA) cross browsers and OSes, use `CustomAuthnContext.WINDOWS_INTEGRATED_AUTHN_CTX`.<br/><br/>Default is `AuthnContext.PASSWORD_AUTHN_CTX` where IdP login page is displayed to obtain user/password.|
|authnContexts |No |Determine what authentication methods to use. To use the order of authentication methods defined by IdP, set as empty set. To enable Windows Integrated Auth (WIA), use `CustomAuthnContext.WINDOWS_INTEGRATED_AUTHN_CTX`.<br/><br/>Default is `AuthnContext.PASSWORD_AUTHN_CTX` where IdP login page is displayed to obtain user/password.|


## Important SAML Endpoints
Expand Down

0 comments on commit c193fe1

Please sign in to comment.