This wiki site is offered to assist Cornell web site administrators who are interested in using Shibboleth authentication and authorization technology for access to their website, or to a vendor's website. The Shibboleth Service Provider can usually be used as a replacement for CUWebAuth. The advantage of using Shibboleth is that you can enable access to your site to users from other institutions that are members of the InCommon Federation.
See the InCommon website for more information and a list of Colleges and Universities that are members.
Shibboleth will not enable people from all colleges and universities to have access to your site, only those that are members of the InCommon Federation. In addition, you can restrict your site to only certain members of InCommon, and only if those members have certain attributes (such as student, faculty, staff, etc.)
Shibboleth is also a popular method for enabling cloud vendor sites to authenticate and authorize Cornell users.
Integrators outside of InCommon who would like to make use of Cornell's Identity Provider may point to the test IDP first and work through any initial issues. When you are ready to move your integration into production, please submit a request at https://shibrequest.cit.cornell.edu to start the process.
Please join Cornell Shibboleth admins mailing list by sending an email to cornell-shib-users-Lemail@example.com with the word join as the subject line. Leave the body of the message blank.
Cornell IDP Info
Generally, vendors will have the following questions. You can send them a link to this page to get started
Cornell is the member of InCommon. Cornell's metadata is included in InCommon's metadata. Get Cornell's metadata from InCommon:
If you just need the content of Cornell IDP metadata, get it from:
If you are integrating test instance of your application, please point it to Cornell IDP test instance. Test IDP's metadata can be accessed from https://shibidp-test.cit.cornell.edu/idp/shibboleth
Prod IDP login URL(POST binding): https://shibidp.cit.cornell.edu/idp/profile/SAML2/POST/SSO
Prod IDP login URL(Redirect binding): https://shibidp.cit.cornell.edu/idp/profile/SAML2/Redirect/SSO
Test IDP login URL (POST binding): https://shibidp-test.cit.cornell.edu/idp/profile/SAML2/POST/SSO
Test IDP login URL(Redirect binding): https://shibidp-test.cit.cornell.edu/idp/profile/SAML2/Redirect/SSO
Currently we release the following public attributes. Other attributes are available but must be configured - please send email to firstname.lastname@example.org if you don't see the attribute you are looking for.
Majority of Service Providers use Attribute Name In SAML Assertion(value in second column) to map to the attribute in their system, but some service providers use Friendly name in SAML Assertion.
|AttributeNameInEnterpriseDirectory||Attribute Name In SAML Assertion|
|givenName (first name)||urn:oid:18.104.22.168|
TransientId is the default NameID.
Service Provider Installation
There are many Service Provider products, for example Shibboleth, SimpleSAMLphp, passport-saml, etc. You should choose one that fit your hosting environment. We have installation instructions for Shibboleth Service Provider. For other Service Providers please refer to its own product documentation.
How to install Shibboleth Service Provider on Windows
How to Install Shibboleth Service Provider on Linux