Wisconsin Federation Login Service - Shibboleth Service Provider Configuration File (shibboleth2.xml)

This document will help you configure your service provider to integrate with the Wisconsin Federation.


Some web applications need to be accessed by users of other UW-System campuses (outside of UW-Madison). This document will outline the changes you need to make to your shibboleth2.xml to make your Service Provider (SP) work with the Wisconsin Federation (WiscFed) Identity Provider (IdP). You will also have to fill out an Identity Data Integration Request Form to access UW-System identity data.

If you are trying to integrate your service provider within UW-Madison then use this document instead: https://kb.wisc.edu/iam/internal/page.php?id=86698

Signing Certificate

The signing certificate for the SP can be retrieved at https://wayf.wisconsin.edu/metadata/wayf.wisconsin.edu-signing.pem.


The SPConfig element is the top level element of the shibboleth2.xml file.

Shibboleth documentation: SPConfig

<SPConfig xmlns="urn:mace:shibboleth:3.0:native:sp:config"
  <OutOfProcess tranLogFormat="%u|%s|%IDP|%i|%ac|%t|%attr|%n|%b|%E|%S|%SS|%L|%UA|%a" />


The ApplicationDefaults element defines most of the runtime behavior of the software when it comes to SAML behavior and application session policy. The ApplicationOverride element is nested within to override behavior for different virtual hosts or paths.


  • entityID: Set to the entity id for your app. This is usually in the format of "https://[hostname.for.site]/shibboleth". We're suggesting using "default" as the entityID, the ApplicationOverride element will determine the actual entityID below.
  • REMOTE_USER: Specifies a list of attribute IDs to pull from in a session's cached attributes; the first one found with a value is set as REMOTE_USER.

Shibboleth documentation: ApplicationDefaults

    <!-- The ApplicationDefaults element is where most of Shibboleth's SAML bits are defined. -->
<ApplicationDefaults entityID="default"
      REMOTE_USER="eppn persistent-id targeted-id"


The Sessions element controls how the SSO (Single Sign On) process is managed by the SP.


  • lifetime: Maximum duration in seconds that a session maintained by the SP will be valid. The actual time may be less than this value (if an IdP indicates it should be shorter) but will never be longer. Note that this will not influence sessions maintained by an application.
  • timeout: Maximum inactivity allowed in seconds between requests in a session maintained by the SP. This inactivity applies only to requests to this SP and is not aware of activity between the browser and other web sites.
  • relayState: Controls how information associated with requests for authentication, primarily the original resource accessed, is preserved for the completion of the authentication process. It is recommended to use the SP's persistent storage. "ss:mem" stores it in the SP's internal memory, which works well.
  • checkAddress: The IdP will place the IP address of the user agent it authenticated into the assertions it issues. When true, the SP will check this address against the address of the client presenting an assertion before creating a session.
  • handlerSSL: When true, only web requests over SSL/TLS will be processed by handlers. Other requests may be blocked, or possibly ignored.
  • cookieProps: If set to a custom string, the string is appended to the cookie values maintained by the SP. Used to attach custom meta-properties like path or the secure and HttpOnly flags to the cookies.
  • redirectLimit:
  • redirectAllow:

Child Elements:

  • SSO: Enables support for one or more Single Sign-On / Authentication protocols.
  • Logout: Enables support for one or more Logout protocols.
  • Handler: Generic endpoint for non-specific functionality implemented by the SP or an extension library.
  • discoveryProtocol:
  • discoveryURL:

Shibboleth documentation: Sessions

        <Sessions lifetime="28800" timeout="1800" relayState="ss:mem" 
redirectLimit="exact+allow" redirectAllow="https://wayf.wisconsin.edu/ https://wayftest.wisconsin.edu/ https://wayfqa.wisconsin.edu/ https://wayfdev.wisconsin.edu/"
            checkAddress="false" handlerSSL="true" cookieProps="https">

            Configures SSO for a default IdP. To properly allow for >1 IdP, remove
            entityID property and adjust discoveryURL to point to discovery service.
            You can also override entityID on /Login query string, or in RequestMap/htaccess.

        <SSO discoveryProtocol="SAMLDS" discoveryURL="https://wayf.wisconsin.edu/DS/WAYF">
        SAML2 SAML1

        <!-- SAML and local-only logout. -->
        <Logout>SAML2 Local</Logout>

          <!-- Administrative logout. -->
            <LogoutInitiator type="Admin" Location="/Logout/Admin" acl=" ::1" />

          <!-- Extension service that generates "approximate" metadata based on SP configuration. -->
            <Handler type="MetadataGenerator" Location="/Metadata" signing="false"/>

          <!-- Status reporting service. -->
            <Handler type="Status" Location="/Status" acl=" ::1"/>

          <!-- Session diagnostic service. -->
        <Handler type="Session" Location="/Session" showAttributeValues="false"/>

        <!-- JSON feed of discovery information. -->
        <Handler type="DiscoveryFeed" Location="/DiscoFeed"/>


The Errors element is used to configure error-handling behavior when problems occur during the processing of SSO or logout messages, internal session management, or attribute processing.

Shibboleth documentation: Errors

        <Errors supportContact="admin@yoursite.wisc.edu"


The MetadataProvider element provides the SP details about how to load metadata about the identity providers. Shibboleth is a 100% metadata-driven SAML implementation and has no other means of provisioning relationships with IdPs.


  • type: Determines which type of metadata plugin to use. Here, XML directs the SP to load metadata from a file or HTTP resource.
  • url: Remote location of an XML resource containing the required configuration.
  • backingFilePath: If a url attribute is used, the downloaded resource is copied to this location. If the software is started and the remote resource is unavailable or invalid, the backing file is loaded instead.
  • reloadInterval: If a url attribute is used, this attribute sets the time between attempts to download a fresh copy of the resource.

Child Elements:

  • MetadataFilter: Configures a filter that examines metadata supplied by a metadata provider and adds, modifies, or deletes information depending on the filter's behavior.

Shibboleth documentation: MetadataProvider

        <MetadataProvider type="XML" url="https://wayf.wisconsin.edu/metadata/wi-federation-metadata-idp-only.xml" backingFilePath="wayf.wisconsin.edu-metadata.xml"  reloadInterval="7200">   
            <MetadataFilter type="RequireValidUntil" maxValidityInterval="2419200"/>  
            <MetadataFilter type="Signature" certificate="wayf.wisconsin.edu-signing.pem"/>  


The AttributeExtractor element configures how SAML attributes are decoded.


  • type: Specifies the type of AttributeExtractor plugin to use.
  • url: Remote location of an XML resource containing the IDP attribute map.
  • backingFilePath: If a url attribute is used, the downloaded resource is copied to this location. If the software is started and the remote resource is unavailable or invalid, the backing file is loaded instead.
  • reloadInterval: If a url attribute is used, this attribute sets the time between attempts to download a fresh copy of the resource.

Shibboleth documentation: AttributeExtractor

        <!-- Map to extract attributes from SAML assertions. -->
        <AttributeExtractor type="XML" validate="true" url="https://wayf.wisconsin.edu/metadata/attribute-map.xml"
            backingFilePath="wayf.wisconsin.edu-attribute-map.xml" reloadInterval="1800"/>


The AttributeFilter element configures the component that filters out unacceptable attribute information.


  • type: Specifies the type of AttributeFilter plugin to use.

Shibboleth documentation: AttributeFilter

        <!-- Default filtering policy for recognized attributes, lets other data pass. -->
        <AttributeFilter type="XML" validate="true" path="attribute-policy.xml"/>


The CredentialResolver element configures the component that provides the SP with access to public and private keys and certificates or credentials. Keys are used to sign messages sent to IDPs or authenticate TLS connections, and to decrypt data sent to the SP.


  • type: Specifies the type of CredentialResolver plugin to use.

Shibboleth documentation: CredentialResolver

        <!-- Simple file-based resolvers for separate signing/encryption keys. -->
        <CredentialResolver type="File" use="signing"
            key="sp-signing-key.pem" certificate="sp-signing-cert.pem"/>
        <CredentialResolver type="File" use="encryption"
            key="sp-encrypt-key.pem" certificate="sp-encrypt-cert.pem"/>


The ApplicationOverride element overrides SP behaviour for a set of resources that are associated with the override using the applicationId content setting. The association can be made via the RequestMapper component or native web server commands as in Apache.

Shibboleth documentation: ApplicationOverride

        <ApplicationOverride id="https://www.yoursite.wisc.edu/shibboleth" entityID="https://www.yoursite.wisc.edu/shibboleth">
            <Sessions lifetime="28800" timeout="1800" checkAddress="false" consistentAddress="false" relayState="ss:mem" handlerURL="/Shibboleth.sso" cookieProps="; path=/; secure; HttpOnly">
                <SSO entityID="https://idp.iam.wisconsin.edu/uwproxy/shibboleth">
                SAML2 SAML1


The SecurityPolicyProvider element configures the component that guides the low-level security and XML processing performed during the runtime operation of the SP. This shouldn't need to be modified.


  • type: implements a custom XML syntax for expressing security processing and policy rules for different protocols and profiles, and for enabling and disabling algorithms.

Shibboleth documentation: SecurityPolicyProvider

	<!-- Policies that determine how to process and authenticate runtime messages. -->
	<SecurityPolicyProvider type="XML" validate="true" path="security-policy.xml"/>


No Documentation. This configuration does not require any changes.

	<!-- Low-level configuration about protocols and bindings available for use. -->
	<ProtocolProvider type="XML" validate="true" reloadChanges="false" path="protocols.xml"/>

Example Apache2 Service Provider


IIS Specific Elements


The InProcess element contains settings governing the portion of the SP that runs inside the web server. Required for Microsoft IIS integrations in order to define IIS site mappings and general module configuration.

Child Elements:

  • ISAPI: Controls the Integration with the Microsoft IIS web server, ignored by other modules.

Shibboleth documentation: InProcess

        <ISAPI safeHeaderNames="true">
            <Site id="0" name="www.yoursite.wisc.edu"/>


The RequestMapper element configures the component used by the SP to map incoming requests to the configuration options that should be applied to them. This is equivalent to the Apache Location directive.

Shibboleth documentation: RequestMapper

        <RequestMapper type="Native">
        <RequestMap applicationId="default">
            <Host name="www.yoursite.wisc.edu" applicationId="https://www.yoursite.wisc.edu/shibboleth" requireSession="true"/>

Keywordsnetid login service wisconsin federation wiscfed shibboleth sp idp system shibboleth2.xml   Doc ID62574
OwnerMST SupportGroupIdentity and Access Management
Created2016-04-07 13:23:30Updated2023-08-09 14:04:54
SitesIdentity and Access Management
Feedback  0   0