it Yadav; users@cloudstack.apache.org; fabrice.pol...@etrs.fr
Subject: Re: Shibboleth and CloudStack
Hello,
I made some changes in my configuration. Instead of editing the
/etc/cloudstack/management/idp-metadata.xml file from my SP to force SSO-CAS
authentication (https://idp.etrs.terre.defense.go
Subject: Re: Shibboleth and CloudStack
Hello,
Thank you very much for your answer.
Maybe I misunderstood because in my current configuration, CloudStack refers to
https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword without any
modification and that corresponds to the native authentication
t; file (saved in /etc/cloudstack/management/)
> to https://idp.etrs.terre.defense.gouv.fr/idp/Authn/UserPassword and
> see if that works for you.
>
>
> Regards.
>
> rohit.ya...@shapeblue.com
> www.shapeblue.com
> @shapeblue
>
>
>
>
>
gards.
From: Fabrice Pollet
Sent: 27 April 2017 14:30:53
To: Rohit Yadav; users@cloudstack.apache.org; fabrice.pol...@etrs.fr
Subject: Re: Shibboleth and CloudStack
I tried your solution to save the IdP metadata in file
/etc/cloudstack/management/idp-metadata.xml
tiple idps defined (for example,
>> in case of a federation it will retrieve and list all the available
>> SSO site, for example search for CAFe saml federation).
>>
>>
>> Regards.
>>
>>
>> *From:* F
multiple idps defined (for example,
> in case of a federation it will retrieve and list all the available
> SSO site, for example search for CAFe saml federation).
>
>
> Regards.
>
> --------
> *From:* Fabrice
rch for CAFe saml federation).
Regards.
From: Fabrice Pollet
Sent: 26 April 2017 17:31:46
To: users@cloudstack.apache.org
Subject: Shibboleth and CloudStack
Hello,
I'm trying to configure SAML2 SSO support to connect CloudStack 4.9.2.0
as a service provider (SP) to our own identity pr
Hello,
I'm trying to configure SAML2 SSO support to connect CloudStack 4.9.2.0
as a service provider (SP) to our own identity provider Shibboleth 2.4.4
(IdP - Authentication Service and Authorization based on XML).
I have completed the following CloudStack SAML2 settings:
saml2.append.idpdomain