|
1 | 1 | <?php
|
2 | 2 |
|
| 3 | +if (isset($_GET['_debug']) && $_GET['_debug'] === '1') { |
| 4 | + echo '<pre>'; |
| 5 | + print_r(getenv()); |
| 6 | + exit; |
| 7 | +} |
| 8 | + |
3 | 9 | /**
|
4 | 10 | * The configuration of SimpleSAMLphp
|
5 | 11 | */
|
|
196 | 202 | * This password will give access to the installation page of SimpleSAMLphp with
|
197 | 203 | * metadata listing and diagnostics pages.
|
198 | 204 | * You can also put a hash here; run "bin/pwgen.php" to generate one.
|
| 205 | + * |
| 206 | + * If you are using Ansible you might like to use |
| 207 | + * ansible.builtin.password_hash(hashtype='blowfish', ident='2y', rounds=13) |
| 208 | + * to generate this hashed value. |
199 | 209 | */
|
200 | 210 | 'auth.adminpassword' => 'debugpass',
|
201 | 211 |
|
|
366 | 376 | * loggingdir above to 'null'.
|
367 | 377 | */
|
368 | 378 | 'logging.level' => SimpleSAML\Logger::DEBUG,
|
369 |
| - 'logging.handler' => 'stderr', |
| 379 | + 'logging.handler' => 'syslog', |
370 | 380 |
|
371 | 381 | /*
|
372 | 382 | * Specify the format of the logs. Its use varies depending on the log handler used (for instance, you cannot
|
|
451 | 461 | * Proxy to use for retrieving URLs.
|
452 | 462 | *
|
453 | 463 | * Example:
|
454 |
| - * 'proxy' => 'tcp://proxy.example.com:5100' |
| 464 | + * 'proxy' => 'http://proxy.example.com:5100' |
455 | 465 | */
|
456 | 466 | 'proxy' => null,
|
457 | 467 |
|
|
661 | 671 | /*
|
662 | 672 | * Option to override the default settings for the auth token cookie
|
663 | 673 | */
|
664 |
| - 'session.authtoken.cookiename' => 'SimpleSAMLAuthTokenIdp', |
| 674 | + 'session.authtoken.cookiename' => 'SimpleSAMLAuthToken', |
665 | 675 |
|
666 | 676 | /*
|
667 | 677 | * Options for remember me feature for IdP sessions. Remember me feature
|
|
821 | 831 | */
|
822 | 832 | 'language.available' => [
|
823 | 833 | 'en', 'no', 'nn', 'se', 'da', 'de', 'sv', 'fi', 'es', 'ca', 'fr', 'it', 'nl', 'lb',
|
824 |
| - 'cs', 'sk', 'sl', 'lt', 'hr', 'hu', 'pl', 'pt', 'pt-br', 'tr', 'ja', 'zh', 'zh-tw', |
825 |
| - 'ru', 'et', 'he', 'id', 'sr', 'lv', 'ro', 'eu', 'el', 'af', 'zu', 'xh', 'st', |
| 834 | + 'cs', 'sk', 'sl', 'lt', 'hr', 'hu', 'pl', 'pt', 'pt_BR', 'tr', 'ja', 'zh', 'zh_TW', |
| 835 | + 'ru', 'et', 'he', 'id', 'sr', 'lv', 'ro', 'eu', 'el', 'af', 'zu', 'xh', 'st' |
826 | 836 | ],
|
827 | 837 | 'language.rtl' => ['ar', 'dv', 'fa', 'ur', 'he'],
|
828 | 838 | 'language.default' => 'en',
|
|
993 | 1003 | // Adopts language from attribute to use in UI
|
994 | 1004 | 30 => 'core:LanguageAdaptor',
|
995 | 1005 |
|
996 |
| - 45 => [ |
997 |
| - 'class' => 'core:StatisticsWithAttribute', |
998 |
| - 'attributename' => 'realm', |
999 |
| - 'type' => 'saml20-idp-SSO', |
1000 |
| - ], |
1001 |
| - |
1002 | 1006 | /* When called without parameters, it will fallback to filter attributes 'the old way'
|
1003 | 1007 | * by checking the 'attributes' parameter in metadata on IdP hosted and SP remote.
|
1004 | 1008 | */
|
|
0 commit comments