...
Up-to-date information on the Shibboleth MDA can be found at https://shibboleth.atlassian.net/wiki/spaces/MA1/overview
Prerequisites and assumptions
- This guide assumes that the administrator is familiar with Linux, editing text based configuration files and running shell commands.
- The guide assumes that the administrator has access to a Linux system where a Java Runtime (OpenJDK 8 or newer is recommended) is installed.
- You have installed openssl and Java 17 (or later). JAVA_HOME is set and exported.
- You have created the /opt/mda directory for installationIt is assumed that the installation directory will be ‘/opt/eduGAIN-Metadata-Processing’. Root access might be needed to install this software.
- In order to run cronjobs more securely, an unprivileged user mda-user is recommended to use
...
In the following, we assume that the latest version of the metadata aggregator is 0.9.2. Please perform a search-and-replace on this document in case a newer version is available. If the version number differs from 0.9.2 the configuration in mda.xml may have to be adapted. Please inform the author 1.0.0. Please inform support@edugain.org if you find inconsistencies in newer versions.
- First, download the directory structure and the necessary files for this distribution. Download the file: EduGAIN-Metadata-Processing.zip
Unarchive the distribution:
unzip eduGAIN-Metadata-Processing.zip- Change the working directory:
cd eduGAIN-Metadata-Processing - Download latest version of the Shibboleth Metadata Aggregator Command Line Interface:
wget http://shibboleth.net/downloads/metadata-aggregator/latest/aggregator-cli-0.9.2-bin.zipwget http://shibboleth.net/downloads/metadata-aggregator/latest/aggregator-cli-0.9.2-bin.zip.asc - Verify fingerprint of the downloaded ZIP file:
gpg aggregator-cli-0.9.2-bin.zip.asc
The resulting output should be that the signature was created by “Ian A. Young <ian@iay.org.uk>” with key D7079C77. - Unarchive the downloaded file
unzip aggregator-cli-0.9.2-bin.zip - Create a symlink
ln -s aggregator-cli-0.9.2 aggregator-cliIn order to verify eduGAIN metadata, it is necessary to provide the eduGAIN signing certificate to the Metadata Aggregator. - Check the signature of the eduGAIN signer certificate:
openssl x509 -fingerprint -in pki/eduGAIN-signer-ca.pemThe SHA1 Fingerprint should be 5A:D7:3F:8A:C1:0C:74:56:41:77:45:45:EB:92:76:1F:3D:0D:E6:7C - Adapt the main configuration in conf/mda.properties
This file allows a very simple configuration of the eduGAIN Metadata Processing tool by setting a few properties. These properties then are used in the conf/mda.xml file that is a standard Spring context. More advanced configuration can be done directly in the file mda.xml. In the mda.properties file the parameters BasePath, EntitiesDescriptor, RegistrationAuthorityFilter, SigningKey and SigningCert should be set at minimum.
Create run script
Open the file ‘bin/run-mda.sh’ in a text editor and edit the parameters. In particular edit BASE_PATH, JAVA_HOME
Make the file run file and the cron job files executable:chmod a+x bin/run-mda.shchmod a+x cron-jobs/run-mda
Test deployment
Run the Metadata Aggregator./bin/run-mda.shThe output should be three new metadata files in the ‘output’ directory.
- Download
into /opt/mda and unpack the tarfileView file name eduGAIN-metadata-example.tar.gz height 250 - Download the Shibboleth MDA to /opt/mda, as per the MDA instructions: https://shibboleth.atlassian.net/wiki/spaces/MA1/pages/1476984838/Installation+Guide
- Unpack the MDA distribution
- Download the eduGAIN signing certificate from https://technical.edugain.org/metadata
- Check its integrity and authenticity using
openssl x509 -fingerprint -sha256 -in /opt/mda/mds-v2.cer -noout - run
eduGAIN-setup.shto generate signing key and certificate - run
eduGAIN-run.shto download and process the eduGAIN metadata aggregate
There should now be three new metadata files in /opt/mda
You can check Then check if the signature on these files can be verified using the certificate whose private key was used to sign the file. Using XMLSecTool this can be verified with:
xmlsectool.sh --verifySignature --inFile output/ metadata-all.interfederation.xml --certificate pki/example-signer-cert.pem
Install Cronjob to run job regularly
...
federation.crt
Post-installation
- Set up a cron job to
...
- run the metadata aggregator
...
- regularly
- Publish the metadata regularly
Install a cron job that moves the eduGAIN metadata from the ‘output’ directory to a web server where the eduGAIN-enabled entities of your federation can download it. Because the metadata is signed, it can also be served on an http site.
pyFF Federation Feeder
Prerequisites
- This guide assumes that the administrator is familiar with Linux, editing text based configuration files and running shell commands.
- The guide assumes that the administrator has access to a Linux system where Python 2.7 Python >=3.9 is installed.
- It is assumed that the installation directory will be ‘
/opt/pyff’. Root access might be needed to install this software. - It is assumed that the output metadata directory will be ‘
/opt/pyff/output’. Root access might be needed to create this directory. - In order to run cronjobs more securely, it is recommended to create and use an unprivileged user pyff-user.
...
In the following, we assume that the latest version of the pyFF Federation Feeder is 02.91.45. Please perform a search-and-replace on this document in case a newer version is available. Please inform the author support@edugain.org if you find inconsistencies in newer versions.
- Follow the instructions provided by pyFF Documentation to install pyFF software.
- Create the needed directories:
cd /opt/pyff ; mkdir output ; mkdir certs ; mkdir scripts - Create the certificate and the key needed to sign the output metadata:
- Generate Metadata Signer Key:openssl genrsa -out /opt/pyff/certs/sign.key 2048
- Generate Metadata Signer Certificate:openssl req -key /opt/pyff/certs/sign.key -new -x509 -days 3650 -out /opt/pyff/certs/sign.crt - Download and Check the eduGAIN Signer certificate (see https://technical.edugain.org/metadata):
wget https://technical.edugain.org/mds-v2.cer -O /opt/pyff/certs/eduGAIN-signer-ca.pem - Check the signature of the eduGAIN signer certificate:
openssl x509 -fingerprint -in /opt/pyff/certs/eduGAIN-signer-ca.pemThe SHA1 SHA256 Fingerprint should be 5A:D7:3F:8A
BD:21:40:48:9A:9B:D7:40:44:DD:68:05:34:F7:78:88:A9:C1:0C3B:740A:56C1:417C:774F:453A:4503:EB6E:920F:76EC:1F6D:3D89:0D99:E6:7C95 - Create the interfederation configuration file(
/opt/pyff/interfederation.fd) by adapting this content to your needs:
...
| Code Block | ||
|---|---|---|
| ||
### Load eduGAIN Metadata ### - load: # Load from the eduGAIN Metadata URL - httphttps://mds.edugain.org/feededugain-sha256v2.xml as edugain-md certs/eduGAIN-signer-ca.pem # LoadIf fromyour afederation specificfeed directoryhas containsentities thethat eduGAINare Metadata not published on #- /opt/pyff/metadata as edugain-md certs/eduGAIN-signer-ca.pem ### Replace the value of '###YOUR-REG-AUTH###' with your registrationAuthority to exclude the entities of your federation. ###eduGAIN # load your federation feed as well - uncomment the line below #- ###YOUR-FEDERATION-FEED-URL### as myfederation-md ###PATH-TO-YOUR-FEDERATION-SIGNING-CERT### - select: - "edugain-md!//md:EntityDescriptor[md:Extensions/mdrpi:RegistrationInfo/@registrationAuthority and not(md:Extensions/mdrpi:RegistrationInfo/@registrationAuthority='###YOUR-REG-AUTH###')]" ### Remove comments# andIf replace 'entityID_X' with the entityID of the eduGAIN your federation feed has entities that youare wantnot excludepublished from your interfederation metadata. ### #- fork merge remove: # - select: # - entityID_1 # - entityID_2 ### Fork to produce the Interfederation Identity Providers on eduGAIN # uncomment the line below #- myfederation-md ### Produce the Interfederation Metadata ### ### Replace the value of '###YOUR-ENTITIESDESCRIPTOR-NAME-FOR-INTERFEDERATION###' and '###YOUR-ENTITIESDESCRIPTOR-ID-FOR-INTERFEDERATION###' with the values of XML attributes "Name" and "ID" chosen for your interfederation metadata stream ### - fork: - select: - "edugain-md!//md:EntityDescriptor[md:IDPSSODescriptor]" - xslt: stylesheet: tidy.xsl - finalize: Name: ###YOUR-ENTITIESDESCRIPTOR-NAME-FOR-INTERFEDERATION### ID: ###YOUR-ENTITIESDESCRIPTOR-ID-FOR-INTERFEDERATION### cacheDuration: PT5H validUntil: P5D - sign: key: certs/sign.key cert: certs/sign.crt - publish: - output/my-interfederation-idp-metadata.xml # The rest of pipe could be removed if you do not plan to publish interfederation feeds which contain # only SPs (for consuming by IdPs) and only IdPs (for consuming by IdPs) # Feeds dedicated for IdPs and SPs are a good way to avoid a large feed problem which e.g. requires # increasing memory_limit for php when simpleSAMLPHP is used ### Fork to produce the Interfederation ServiceIdentity Providers Metadata ### ### Replace the value of '###YOUR-ENTITIESDESCRIPTOR-NAME-FOR-INTERFEDERATION###' and '###YOUR-ENTITIESDESCRIPTOR-ID-FOR-INTERFEDERATION###' with the values of XML attributes "Name" and "ID" chosen for your interfederation metadata stream ### - fork: - select: - "edugain-md!//md:EntityDescriptor[md:SPSSODescriptorIDPSSODescriptor]" - xslt: stylesheet: tidy.xsl - finalize: Name: ###YOUR-ENTITIESDESCRIPTOR-NAME-FOR-INTERFEDERATION### ID: ###YOUR-ENTITIESDESCRIPTOR-ID-FOR-INTERFEDERATION### cacheDuration: PT5H validUntil: P5D - sign: key: certs/sign.key cert: certs/sign.crt - publish: - output/my-interfederation-spidp-metadata.xml ### ProduceFork to produce the Interfederation Service Providers Metadata ### ### Replace the value of '###YOUR-ENTITIESDESCRIPTOR-NAME-FOR-INTERFEDERATION###' and '###YOUR-ENTITIESDESCRIPTOR-ID-FOR-INTERFEDERATION###' with the values of XML attributes "Name" and "ID" chosen for your interfederation metadata stream ### - fork: - select: - "edugain-md!//md:EntityDescriptor[md:SPSSODescriptor]" - xslt: stylesheet: tidy.xsl - finalize: Name: ###YOUR-ENTITIESDESCRIPTOR-NAME-FOR-INTERFEDERATION### ID: ###YOUR-ENTITIESDESCRIPTOR-ID-FOR-INTERFEDERATION### cacheDuration: PT5H validUntil: P5D - sign: key: certs/sign.key cert: certs/sign.crt - publish: - output/my-interfederation-sp-metadata.xml |
Create run script
1) vim /opt/pyff/scripts/run-pyff.sh :
...
| Code Block | ||||
|---|---|---|---|---|
| ||||
MAILTO="your.monitoring.address@your.organisation.org" 55 * * * * root su -c /opt/pyff/scripts/run-pyff.sh - pyff-user |
Test deployment
Run the pyFF Federation Feeder./opt/pyff/scripts/run-pyff.shThe output should be three new metadata files in the ‘output’ directory.
Then check if the signature on these files can be verified using the certificate whose private key was used to sign the file. Using XMLSecTool this can be verified with:
xmlsectool.sh --verifySignature --inFile output/metadata.interfederation.xml --certificate certs/sign.crt
Publish metadata regularly
Install a cron job that moves the eduGAIN metadata from the ‘output’ directory to a web server where the eduGAIN-enabled entities of your federation can download it. Because the metadata is signed, it can also be served on an http site.
Useful notes
The version 0.9.4 of pyff signing the output metadata with SHA-1 algorithm by default.
If you want to sign the metadata with another algorithm supported by the software, you must replace the value of 'ALGORITHM_SIGNATURE_RSA_SHA1' and 'ALGORITHM_DIGEST_SHA1' inside the '/opt/pyff/lib/python2.7/ site-packages/xmlsec/__init__.py' file with one of these values:
...