33Configuration of pySAML2 entities
44=================================
55
6- Whether you plan to run a pySAML2 Service Provider, Identity provider or an
6+ Whether you plan to run a pySAML2 Service Provider, Identity Provider or an
77attribute authority you have to configure it. The format of the configuration
8- file is the same disregarding which type of service you plan to run.
9- What differs is some of the directives.
10- Below you will find a list of all the used directives in alphabetic order.
8+ file is the same regardless of which type of service you plan to run.
9+ What differs are some of the directives.
10+ Below you will find a list of all the used directives in alphabetical order.
1111The configuration is written as a python module which contains a named
1212dictionary ("CONFIG") that contains the configuration directives.
1313
14- The basic structure of the configuration file is therefor like this::
14+ The basic structure of the configuration file is therefore like this::
1515
1616 from saml2 import BINDING_HTTP_REDIRECT
1717
@@ -90,9 +90,9 @@ The attribute map module contains a MAP dictionary with three items. The
9090The *to * and *fro * sub-dictionaries then contain the mapping between the names.
9191
9292As you see the format is again a python dictionary where the key is the
93- name to convert from and the value is the name to convert to.
93+ name to convert from, and the value is the name to convert to.
9494
95- Since *to * in most cases are the inverse of the *fro * file, the
95+ Since *to * in most cases is the inverse of the *fro * file, the
9696software allowes you to only specify one of them and it will
9797automatically create the other.
9898
@@ -111,7 +111,7 @@ contact_person
111111
112112This is only used by *make_metadata.py * when it constructs the metadata for
113113the service described by the configuration file.
114- This is where you described who can be contacted if questions arises
114+ This is where you describe who can be contacted if questions arise
115115about the service or if support is needed. The possible types are according to
116116the standard **technical **, **support **, **administrative **, **billing **
117117and **other **.::
@@ -148,7 +148,7 @@ Format::
148148
149149The globally unique identifier of the entity.
150150
151- .. note :: There is a recommendation that the entityid should point to a real
151+ .. note :: It is recommended that the entityid should point to a real
152152 webpage where the metadata for the entity can be found.
153153
154154key_file
@@ -160,13 +160,13 @@ Format::
160160
161161*key_file * is the name of a PEM formatted file that contains the private key
162162of the service. This is presently used both to encrypt/sign assertions and as
163- client key in a HTTPS session.
163+ the client key in an HTTPS session.
164164
165165metadata
166166^^^^^^^^
167167
168168Contains a list of places where metadata can be found. This can be either
169- a file accessible on the server the service runs on or somewhere on the net.::
169+ a file accessible on the server the service runs on, or somewhere on the net.::
170170
171171 "metadata" : {
172172 "local": [
@@ -180,8 +180,8 @@ a file accessible on the server the service runs on or somewhere on the net.::
180180 },
181181
182182The above configuration means that the service should read two local
183- metadata files and on top of that load one from the net. To verify the
184- authenticity of the file downloaded from the net the local copy of the
183+ metadata files, and on top of that load one from the net. To verify the
184+ authenticity of the file downloaded from the net, the local copy of the
185185public key should be used.
186186This public key must be acquired by some out-of-band method.
187187
@@ -205,7 +205,7 @@ Where you describe the organization responsible for the service.::
205205service
206206^^^^^^^
207207
208- Which services the server will provide, those are combinations of "idp","sp"
208+ Which services the server will provide; those are combinations of "idp", "sp"
209209and "aa".
210210So if a server is a Service Provider (SP) then the configuration
211211could look something like this::
@@ -228,13 +228,13 @@ could look something like this::
228228
229229There are two options common to all services: 'name' and 'endpoints'.
230230The remaining options are specific to one or the other of the service types.
231- Which one is specified along side the name of the option
231+ Which one is specified along side the name of the option.
232232
233233timeslack
234234^^^^^^^^^
235235
236236If your computer and another computer that you are communicating with are not
237- in synch regarding the computer clock. Then you here can state how big a
237+ in synch regarding the computer clock, then here you can state how big a
238238difference you are prepared to accept.
239239
240240.. note :: This will indiscriminately effect all time comparisons.
@@ -275,7 +275,7 @@ policy
275275
276276If the server is an IdP and/or an AA then there might be reasons to do things
277277differently depending on who is asking; this is where that is specified.
278- The keys are 'default' and SP entity identifiers, default is used whenever
278+ The keys are 'default' and SP entity identifiers. Default is used whenever
279279there is no entry for a specific SP. The reasoning is also that if there is
280280no default and only SP entity identifiers as keys, then the server will only
281281except connections from the specified SPs.
@@ -301,12 +301,12 @@ An example might be::
301301 }
302302
303303*lifetime *
304- is the maximum amount of time before the information should be
304+ This is the maximum amount of time before the information should be
305305 regarded as stale. In an Assertion this is represented in the NotOnOrAfter
306306 attribute.
307307*attribute_restrictions *
308308 By default there is no restrictions as to which attributes should be
309- return. Instead all the attributes and values that is gathered by the
309+ return. Instead all the attributes and values that are gathered by the
310310 database backends will be returned if nothing else is stated.
311311 In the example above the SP with the entity identifier
312312 "urn:mace: umu.se:saml: roland:sp"
@@ -332,7 +332,7 @@ regular expressions.::
332332 }
333333 }
334334
335- Here only mail addresses that ends with ".umu.se" will be returned.
335+ Here only mail addresses that end with ".umu.se" will be returned.
336336
337337sp
338338^^
@@ -345,7 +345,7 @@ authn_requests_signed
345345Indicates if the Authentication Requests sent by this SP should be signed
346346by default. This can be overriden by application code for a specific call.
347347
348- This set the AuthnRequestsSigned attribute of the SPSSODescriptor node.
348+ This sets the AuthnRequestsSigned attribute of the SPSSODescriptor node
349349of the metadata so the IdP will know this SP preference.
350350
351351Valid values are "true" or "false". Default value is "false".
@@ -362,9 +362,9 @@ Example::
362362idp
363363"""
364364
365- Defines the set of IdPs that this SP is allowed to use. If not all the IdPs in
366- the metadata is allowed , then the value is expected to be a list with entity
367- identifiers for the allowed IdPs.
365+ Defines the set of IdPs that this SP is allowed to use; if unset, all listed
366+ IdPs may be used. If set , then the value is expected to be a list with entity
367+ identifiers for the allowed IdPs.
368368A typical configuration, when the allowed set of IdPs are limited, would look
369369something like this::
370370
@@ -376,8 +376,6 @@ something like this::
376376
377377In this case the SP has only one IdP it can use.
378378
379- If all IdPs present in the metadata loaded this directive must be left out.
380-
381379optional_attributes
382380"""""""""""""""""""
383381
@@ -415,7 +413,7 @@ want_assertions_signed
415413""""""""""""""""""""""
416414
417415Indicates if this SP wants the IdP to send the assertions signed. This
418- set the WantAssertionsSigned attribute of the SPSSODescriptor node.
416+ sets the WantAssertionsSigned attribute of the SPSSODescriptor node
419417of the metadata so the IdP will know this SP preference.
420418
421419Valid values are "true" or "false". Default value is "true".
@@ -440,7 +438,7 @@ endpoints
440438"""""""""
441439
442440Where the endpoints for the services provided are.
443- This directive has as value a dictionary with one of the following keys:
441+ This directive has as value a dictionary with one or more of the following keys:
444442
445443* artifact_resolution_service (aa, idp and sp)
446444* assertion_consumer_service (sp)
@@ -474,7 +472,7 @@ Indicates if this entity will sign the Logout Requests originated from it.
474472
475473This can be overriden by application code for a specific call.
476474
477- Valid values are "true" or "false". Default value is "false"
475+ Valid values are "true" or "false". Default value is "false".
478476
479477Example::
480478
@@ -491,7 +489,7 @@ The name of a database where the map between a local identifier and
491489a distributed identifier is kept. By default this is a shelve database.
492490So if you just specify name, then a shelve database with that name
493491is created. On the other hand if you specify a tuple then the first
494- element in the tuple specifise which type of database you want to use
492+ element in the tuple specifies which type of database you want to use
495493and the second element is the address of the database.
496494
497495Example::
@@ -519,7 +517,7 @@ Gives information about common identifiers for virtual_organizations::
519517 },
520518
521519Keys in this dictionary are the identifiers for the virtual organizations.
522- The arguments per organization is 'nameid_format' and 'common_identifier'.
520+ The arguments per organization are 'nameid_format' and 'common_identifier'.
523521Useful if all the IdPs and AAs that are involved in a virtual organization
524522have common attribute values for users that are part of the VO.
525523
@@ -562,8 +560,8 @@ We start with a simple but fairly complete Service provider configuration::
562560 }
563561
564562This is the typical setup for a SP.
565- A metadata file to load is *always * needed, but it can of course be
566- containing anything from 1 up to many entity descriptions.
563+ A metadata file to load is *always * needed, but it can of course
564+ contain anything from 1 up to many entity descriptions.
567565
568566------
569567
0 commit comments