Setting up Shibboleth has been one of my worst experiences in recent memory. I don't want you to suffer as I have, so here are some very explicit instructions. This document aims to walk you through setting up Shibboleth in a specific environment, but many of the concepts found here should help illuminate the opacity that is Shibboleth:


Everyone's installs of software packages can be different. To make this document relevent for YOU fill in these fields (as you learn them) and the document will self-modify with all the right paths.


The first few sections, below, help make sure you're set up properly. Please don't skip them, except maybe the 'get a decent text editor' section. Also, in each section (with the gracious help of Scott Cantor) I've added URL links to the Shibboleth wiki, in case you need to dive deeper.

How does Shibboleth work?

Most explanations of Shibboleth tell you how it acts in the abstract, but not how it works from a programming perspective. I wish sombody had written out how it works somewhere, ANYWHERE, on the internet so that I wouldn't have had to spelunk through it. The way shib works is by running a demon called !!shibd at the same time apache (which is actually the executable !!httpd ) runs, and the apache mod you install called !! knows how to talk to shibd. The shibboleth authors did this, I suspect, to decrease maintenance burden on !!shibd when apache changes (wiki). When web requests come in, apache directs them to mod_shib, amd/or mod_PHP, mod_passenger (ruby) or whatever language you're using. You have to configure apache to hand off the right requests to the right module (more about that later). The daemon !!shibd looks at the file !!shibboleth2.xml to see how to act, and uses !!attribute-map.xml to know what attribs to get from the IdP(s) you're connecting to. You tell Apache which directories are protected by shib in your !!httpd.conf files using the !!<Location> tag. It is typical, by convention, to protect the directory !![WebRoot]/shibboleth so that when a user visits it !!mod_shib and !!shibd perk up and start handling things (wiki). To be secure, you really should be using SSL, so you'll install that on Apache before you do anything else, and your protected directories will go into a Virtual Host that uses SSL. If this is all greek to you, I'm afraid you better go google up: SSL, self-signed certificate, and Apache Virtual Host. In addition to protected directories, shibboleth also needs to own a directory !![WebRoot]/Shibboleth.sso/ . Underneath that directory are a bunch of things it uses to get the job done. For example, when the IdP needs to know how to talk to your site it will ask for a file called !![WebRoot]/Shibboleth.sso/Metadata which shibd will auto-magically construct and deliver. That directory and file will never actually exist in your file system. Another thing that happens under !!/Shibboleth.sso/ is that all the communication between shibd and the IdP happens down there, in subdirectories named things like !!/Shibboleth.sso/SAML . You can ignore that - again, shibd will do it all for you. The last convention is that, when there are errors, shib will look for !!/shibboleth-sp/ to contain a .css file and your logo so it can draw decent error pages. But you can ignore this convention when setting up your error handling. Details below. Once a user has logged in with the IdP, !!shibd causes apache to pass your code all the attributes you asked for with your !!"attribute-map.xml" file. The IdP will pass back only what you're authorized to see. Don't worry if you ask for too many attributes - it won't cause the process to fail. Shib passes attribs EITHER in environment vars (preferred method!), OR http request headers. Either way, you are responsible for picking them out of there with your own code. There are more details below about what attributes to use, and what they mean, and how to read them after a login. BTW, Scott points out "unless you have some evidence that the Ubuntu packages have been maintained (that is to say patched), they are probably insecure. But if they're Debian packages those are typically patched."

Restarting and Logs

As you fumble your way through endless configuration and code, youwill need to restart lots of things and look at their logs to see what went wrong. And you'll forget how. So here they all are, for reference:


[Mac] $$ sudo apachectl restart [Ubuntu] $$ sudo /etc/init.d/apache2 restart (you can also use !!apachectl, but using init.d is consistent with how you will restart shibd, so I prefer it) check it started with the log file: $$ tail -f /private/var/log/apache2/error_log


[Mac] $$ sudo launchctl unload -Fw /Library/LaunchDaemons/org.macports.shibd.plist $$ sudo launchctl load -Fw /Library/LaunchDaemons/org.macports.shibd.plist [Ubuntu] $$ sudo /etc/init.d/shibd restart (BTW the init.d directory contains everything that will get auto-started when the OS boots) check it with the log file: $$ tail -f /opt/local/var/log/shibboleth/shibd.log or, for just warnings, $$ tail -f /opt/local/var/log/shibboleth/shibd_warn.log


$$ touch [AppRoot]/tmp/restart.txt check it with the log file: $$ tail -f [AppRoot]/log/development.log

Get a Decent Editor

If you're not using sublime-text-2 you should go get it, and then configure it as described here: Here are a list of must-have installs, in order: (command line) (basic config) (copy auxiliary files) Don't forget Cmd-P for general file opening, and Cmd-Shift-P for package management.

Take care of your apache basics

Make sure you have the basics in place for Apache edit /etc/apache2/httpd.config ServerAdmin ServerName [WebRoot]:80 DocumentRoot "[AppRoot]" BEWARE: It is common to try to make a new doc root for this, but don't forget to chmod that folder to give access permission to the user that apache logs in as. In !!httpd.conf search for !!User and !!Group to determine what apache's logins are. The commands needed to give _www access to your new directory are: $$ sudo dscl . -append /Groups/_www GroupMembership [myUsername] $$ sudo chown -R _www . $$ sudo chgrp -R _www .

Make sure Apache is running with SSL

You'll have to generate your own certs and install them, then configure apache The instructions below are extracted from this URL, just in case.
  1. Generate a host key
  2. $$ mkdir /etc/apache2/ssl $$ cd /etc/apache2/ssl $$ sudo ssh-keygen -f server.key
  3. Create the certificate (with a so-called 'request file') - LEAVE PASSCODE BLANK or you'll regret it
  4. $$ sudo openssl req -new -key server.key -out request.csr $$ sudo openssl x509 -req -days 365 -in request.csr -signkey server.key -out server.crt Here is a sample of what I put in for the request.csr file (my responses are after the colons): Country Name (2 letter code) [AU]: !!US State or Province Name (full name) [Some-State]: !!Texas Locality Name (eg, city) []: !!Austin Organization Name (eg, company) [Internet Widgits Pty Ltd]: !!YourOrganization Organizational Unit Name (eg, section) []: Common Name (e.g. server FQDN or YOUR name) []: !!https://[WebRoot] Email Address []: !! Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []:

Configure Apache

The good news is that configuring apache doesn't vary much between Mac, Ubuntu or any other operating system. The bad news is that it is a pain. I could go on all day about how to configure apache properly - not just for Shibboleth, but in general. Do you know that most apache configs load seventy modules but only use ten? Worse yet, modern "best practices" with apache are to load and configure modules from LOTS of .conf and .load files, making it a horrible chore to actually know what is going on with your configuration. And don't get me started on the fact that module load order matters and yet this so-called "best practice" loads in a random, unpredictable order. Yuck. So chances are good that your !!httpd.conf file is a huge mess. And on some systems it will be called apache.conf, or something else. You'll just have to figure things out. Sorry. NOTE: There is a sample all-in-one !!httpd.conf file at the end of this document. Take a look if you want to see the simplest, viable configuration you can have.
  1. edit !![Apache]/httpd.conf
  2. You'll probably find these in the file and uncomment each of them. LoadModule ssl_module [Mods]/ Include [Apache]/extra/httpd-ssl.conf
  3. edit !![Apache]/extra/httpd-ssl.conf
  4. Point to your certs with the lines that start with !!SSLCertificateFile, !!SSLCertificateKeyFile: SSLCertificateFile "[Apache]/ssl/server.crt" SSLCertificateKeyFile "[Apache]/ssl/server.key" SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
  5. Also check these values in !![Apache]/extra/httpd-ssl.conf
  6. Listen 443 SSLPassPhraseDialog builtin SSLSessionCache "shmcb:/private/var/run/ssl_scache(512000)" SSLSessionCacheTimeout 300 SSLMutex "file:/private/var/run/ssl_mutex"
  7. Now on to configuring your VirtualHost. These things can be confusing, but the main thing to know is that:
  8. <VirtualHost *:443> SSLEngine on ServerName [WebRoot] DocumentRoot "[AppRoot]" </VirtualHost> To test it, put an index.html file into the appropriate directory and try to access it.
  9. Check your work so far
  10. $$ sudo apachectl configtest (This will tell if your config is valid, mostly) $$ sudo apachectl restart (Do this each time you need to reboot) You shouldn't see any major problems. Open a web browser and navigate to https://localhost and see if you get the !!index.html file

Install shibd and mod_shib on Apache

This will vary wildly depending on your operating system, so read carefully and don't be surprised if I get a directorty name wrong. Also, it is critical that you know which version of shibboleth you are dealing with. If you go looking online for help, as I did, you'll see instructions for version 2.3.1, or 2.5, or whatever, but nobody will ever mention which version. And things you do for a later version will be wrong for an earlier version! In my case, after struggling to get a 2.5 install working, I later discovered that Ubuntu's pre-packaged shibboleth install only supported up to 2.3.1, and there were a lot of differences bwteen the versions, especially in the !!shibboleth2.xml file.

Get Shibboleth on Mac OSX

For reference, here is the 'official' how-to on installing a Shib SP on Mac. But parts of it didn't work for me, so I wrote instructions below. I recommend following the instructions at this page and reading my instructions below. In summary, here is what you need to do:
  1. Get MacPorts
  2. Get Shibboleth
  3. These instructions differ slightly from those online because the 'boost' library is a pig. $$ sudo -s $$ port install curl +ssl $$ sudo port -v install boost (see below) $$ port install shibboleth WARNING:

    Get Shibboleth on Ubuntu

    This can be easy, or very hard. It's a deal with the devil really: take the easy way (using apt-get) and you end up with an older v2.3.1, harder to configure version of Shibboleth. Take the hard way (by manually installing v2.5) and your shib configuration just got a lot easier. I'm only going to cover the easy install here. Sorry. $$ sudo apt-get install shibboleth-sp2-schemas libshibsp-dev $$ sudo apt-get install libshibsp-doc libapache2-mod-shib2 opensaml2-tools You might have to generate your own keys after doing this, but I found that I didn't have to do so for my already-installed version of shibboleth.
  4. Make Apache aware of Shibboleth
  5. edit !!/etc/apache2/httpd.conf Tell apache where to find the mod_shib you just installed (assumes you are using Apache 2.2) LoadModule mod_shib [Shib]/

Install and configure shibd

  1. Configure [Shib]/shibboleth2.xml
  2. UT's generator:
    1. Make a clean copy of the file:
    2. $$ cd [Shib] $$ cp shibboleth2.xml.dist shibboleth2.xml
    3. Make sure the 'entityID' points at your machine:
    4. <ApplicationDefaults REMOTE_USER="eppn persistent-id targeted-id" entityID="https://[WebRoot]/shibboleth"> Now you would think that because the entityID is a URL, that maybe that URL has to exist on your server. NOPE! It's just an identifier, pure and simple. It might as well be a GUID for all shibd cares (but don't try that!) - (wiki)
    5. Configure the IdP you want to use.
    6. For example, to use the handy IdP you would do this: <SSO entityID="">SAML2 SAML1</SSO> or if you wanted to use University of Texas: <SSO entityID="" discoveryURL="" discoveryProtocol="SAMLDS" forceAuthn="true"> SAML2 SAML1 </SSO>
    7. Also, setup where the metadata will come from:
    8. <MetadataProvider type="XML" uri="" backingFilePath="testshib-two-idp-metadata.xml" reloadInterval="180000"/> or if you wanted to use University of Texas: <MetadataProvider type="XML" reloadInterval="86400" backingFilePath="/etc/shibboleth/UTfed-metadata.xml" uri=""/>
    9. Pray that all the <Handler> tags are correct. No idea what these do.
    10. Check your Certs
      • Remember that although SSL creates a secure COMMUNICATION layer, shib has it's own additional certs that it uses to talk to IdP's. That is the <CredentialResolver> tag.
    11. Make sure your error handling will work properly. <Errors styleSheet="/shibboleth-sp/main.css" logoLocation="/shibboleth-sp/logo.jpg" supportContact=""/> You need to point 'styleSheet' and 'logoLocation' to real assets on your server. You can make your own /shibboleth-sp/ directory, or just point them to other assets you've already got. For example, mine are pointed to: styleSheet="/stylesheets/base.css" logoLocation="/images/appsoma_logo.png"
    12. Force Authentication if needed
      • If you aren't exactly protecting resources with Shibboleth, but are instead using it to link to a logal account (as I was) you will learn that "logging out" doesn't exist. So if a new person comes to the machine, you need to make sure they don't get logged in as the prior user! The way to do this is for force the user to have to re-login every time their browser points to your protected shibboleth directory.
      To make this work, in the <SSO> tag add the element: forceAuthn="true"
  3. Configure your Metadata file
  4. If you read the instructions at the shibboleth site they seem to VERY STRONGLY IMPLY that you need to construct your own Metadata file for an SP. It is PARTLY true. To start off with, let !![WebRoot]/Shibboleth.sso/Metadata provide a Metadata file for you. !!shibd will create one on-the-fly and serve it to you auto-magically. So, if somebody asks you for your "SP Metadata File", just visit: https://[WebRoot]/Shibboleth.sso/Metadata and you'll be served your own Metadata file. Scott points out: "Constructing your own metadata file is often a requirement for effective use of SAML... there are substantial operational constraints when you don't control metadata independently of a configuration." When you might need to generate a metadata file by hand, whether for SAML config or because you need to give it to your IdP and your shibd setup is too broken to serve the Metadata file as described above. In a case like that, the easiest way to generate the Metadata file is to use the bash script that comes with shibboleth: $$ cd [Shib] $$ sudo bash -h [WebRoot] > Metadata_myUniqueSiteName

    Configure shibboleth attributes

    Edit the file !![Shib]/attribute-map.xml and uncomment any attributes that you might need. Don't forget that most institutions will want you to confer with them and tell them which attribs you need - if you don't, your code will ask for them and get nothing.
    1. About Attributes
    2. There are two pieces to an attribute - a long unique 'name' and a short, more readable 'id'. It's the 'id' that you'll use in your code to access these things. <Attribute name="[LongPainfulUniqueName]" id="[ShortIdYouWillUseInYourCode]"/> A wrinkle: Because there are multiple versions of SAML/Shibboleth, common attribs have TWO definitions. Uncomment them BOTH. For example: <Attribute name="urn:mace:dir:attribute-def:mail" id="mail"/> <Attribute name="urn:oid:0.9.2342.19200300.100.1.3" id="mail"/> The fact is that MOST attribs are common across institutions, and you can typically just find them and un-comment them in attribute-map.xml (wiki)
    3. Picking Attributes
    4. So, which attribs do you want? Well, if you're going for a simple login situation, I suggest: !!eppn - This is a unique identifier for a user. It happens to stand for "eduPersonPrincipalName" which isn't really a name. It's a UID. Most institutions make this !! !!mail - The email address !!sn - stands for 'surname' which is the person's last name !!givenName - the person's first name !!affiliation - which institution is the person from There is obviously a lot more (wiki), but this is a start.

    Test !!shibd to make sure it will launch

    Here is the Shib wiki shibd command line reference: Here is the Ubuntu shibd command line reference:
    1. Run this by hand and see if there are any errors:
    2. $$ sudo /opt/local/sbin/shibd -f -c [Shib]/shibboleth2.xml -p /opt/local/var/run/shibboleth/ -t (the -t means 'check the configuration and give me errors if it is broken') When you get errors you can inspect them here: /opt/local/var/log/shibboleth/
    3. Once the -t version checks out, try to run it with this:
    4. $$ sudo /opt/local/sbin/shibd -f -c [Shib]/shibboleth2.xml -p /opt/local/var/run/shibboleth/ (if it complains it can't start it's listener, reboot.)
  5. Make sure the shibd demon will start automatically when your machine starts
  6. [Mac] $$ sudo launchctl load -Fw /Library/LaunchDaemons/org.macports.shibd.plist (this will also start the demon at the same time) ... and conversely to uninstall it when needed ... $$ sudo launchctl unload -Fw /Library/LaunchDaemons/org.macports.shibd.plist [Ubuntu] $$ sudo chmod +x /etc/init.d/shibd $$ sudo update-rc.d shibd defaults To restart shibd see the instructions near the top of this file.
  7. Test that shibd thinks your configuration is OK $$ shibd -check

Setup a shibboleth-protected directory

  1. edit !!/etc/apache2/extra/httpd-ssl.conf
  2. I tried the !!SetHandler directive, which forces Apache to use !! when processing this location, but it did bad things with the content type. I've seen some people refer to it online as helpful for force !!shibd to handle a directory or location. YMMV. <Location /auth/shibboleth/callback> # this Location directive is what redirects apache over to the IdP. AuthType shibboleth ShibRequestSetting requireSession 1 require valid-user </Location> More details here:
  3. Important Detail In !!httpd.conf place this directive just below the !!DocumentRoot directive: UseCanonicalName on


Open a browser and visit https://[WebRoot]/shibboleth/index.html NOTE: I experienced a bug in which Shibboleth+Apache sometimes don't seem to respect the DirectoryIndex directive! If you get this, something is fundamentally wrong (never figured out what). Check your Apache config against the one at the end of this tutoprial. You should now be done configuring Apache, SSL and Shib. If you code in Ruby, see below for more.


Let me apologize in advance for the fact that this is more of a sketch than complete instructions on how to do this. You'll get Passenger and Omniauth installed, and get most of your programming done, but you'll have to take things the 'last mile' yourself, by truly understanding the code and integrating with your own solution.

Install Passenger

  1. install ruby and rubygems (you probably already have them)
  2. Get the Passenger gem
  3. $$ sudo gem install passenger
  4. Install passenger into apache
  5. Add the following lines into httpd.conf LoadModule passenger_module /SOMEWHERE/.rvm/gems/ruby-1.9.3-p194/gems/passenger-3.0.17/ext/apache2/ PassengerRoot /SOMEWHERE/.rvm/gems/ruby-1.9.3-p194/gems/passenger-3.0.17 PassengerRuby /SOMEWHERE/.rvm/wrappers/ruby-1.9.3-p194/ruby
  6. Configure hosts file
  7. If testing locally, edit /etc/hosts to include the line [WebRoot]
  8. Make apache aware of the rails project
  9. <VirtualHost *:80> ServerName "[WebRoot]" DocumentRoot "[AppRoot]/public" <Directory [AppRoot]/public> Options Indexes FollowSymLinks MultiViews Order allow,deny Allow from all AllowOverride all Options -MultiViews </Directory> </VirtualHost>

Configure your project to diagnose problems

  1. Make sure to use settings that let you diagnose the inevitable failures.
  2. In !!config/development.rb set config.cache_classes = false config.consider_all_requests_local = true config.action_controller.perform_caching = false Also, if you are using the 'assets' module, include this: config.assets.compile = true config.assets.debug = true
  3. Make sure you're running in development mode.
  4. In !!config/environment.rb add this as the very first line: ENV['RAILS_ENV'] = 'development' Remember that you need to restart Passenger when you make changes to the .rb files.
  5. Install omniauth
  6. Install all the omni-auth gems you will need. edit the [AppRoot]/Gemfile and add gem 'omniauth-github' gem 'omniauth-openid' gem 'omniauth-shibboleth' then run $$ bundle install

Include omniauth in the project

You'll make changes to all of the following files in [AppRoot] in order to integrate: /config/initializers/omniauth.rb /app/models/authorization.rb /app/models/user.rb /app/controllers/sessions_controller.rb
  1. Populate the file [AppRoot]/config/initializers/omniauth.rb with:
  2. require 'openid/store/filesystem' Rails.application.config.middleware.use OmniAuth::Builder do provider :shibboleth, { :shib_session_id_field => "Shib-Session-ID", :shib_application_id_field => "Shib-Application-ID", :uid_field => "eppn", :name_field => "displayName", :debug => false, :extra_fields => [ :givenName, :sn, :eppn, :mail, :affiliation, :entitlement ] } provider :github, "GITHUB_KEY", "GITHUB_SECRET" end NOTE: The so-called 'extra_fields' named here should be customized to match your attribute_map.xml file.
  3. create !![AppRoot]/app/models/authorization.rb
  4. You'll notice that I'm extracting a lot of difference information from the shibboleth response. You might not need as much as this. Remember that my purpose was to make a local account, so I contract "john smith" to "jsmith" in this code. class Authorization < ActiveRecord::Base attr_accessible :provider, :uid, :user_id belongs_to :user validates :provider, :uid, :presence => true def self.extract_info(auth_hash) if auth_hash == nil return nil end account = auth_hash["uid"].split('@')[0] idpdomain = auth_hash["uid"].split('@')[1] begin name = auth_hash["extra"]["raw_info"]["givenName"][0,1].downcase + auth_hash["extra"]["raw_info"]["sn"].downcase rescue name = auth_hash["uid"].split('@')[0] end email = auth_hash["extra"]["raw_info"]["mail"] if email == nil email = "" end return Hash["name" => name, "account" => account, "idpdomain" => idpdomain, "email" => email, "provider" => auth_hash["provider"], "uid" => auth_hash["uid"] ] end def self.find_via_info(info) auth = find_by_provider_and_uid(info["provider"], info["uid"]) return auth end def self.create_for_user( user_id, info ) Rails.logger.debug "KD: creating auth linkage for = "+user_id.inspect auth = create :user_id => user_id, :provider => info["provider"], :uid => info["uid"] return auth end end
  5. In !![AppRoot]/app/models/user.rb
  6. make sure these are all in the declarations: attr_accessible :email, :name has_many :authorizations validates :name, :email, :presence => true and also declare: def add_provider(auth_hash) # Check if the provider already exists, so we don't add it twice unless authorizations.find_by_provider_and_uid(auth_hash["provider"], auth_hash["uid"]) Authorization.create :user_id =>, :provider => auth_hash["provider"], :uid => auth_hash["uid"] end end
  7. Follow this tutorial:
  8. NOTE: It doesn't mention things "everyone should know", for example:


A few handy links

Main shibboleth web site How to make a certificate: Shibboleth's X509 Keys and Cert locations: key: [Shib]/sp-key.pem cert: [Shib]/sp-cert.pem A shib plugin for rails' omniauth: UT's Shib pages: Upgrade Shibboleth $ sudo port sync $ sudo port upgrade shibboleth

Sample httpd.conf file

This single file puts ALL directives in one place, and takes a minimalist approach to loading modules. If you're just trying to setup a simple site, use this. By the way, if your apaches setup uses !!/mods-enabled/ you might consider NOT using that directory for mod_shib. Remember that the !!<Location> directives may vary if you're not using passenger with omniauth. Also, this particular setup used env vars, so anywhere you see ${...} it is an environment variable reference. Here are the env vars we happened to be using: APACHE_RUN_USER=www-data APACHE_RUN_GROUP=www-data APACHE_PID_FILE=/var/run/ APACHE_RUN_DIR=/var/run/apache2 APACHE_LOCK_DIR=/var/lock/apache2 APACHE_LOG_DIR=/var/log/apache2
### BASIC APACHE BEHAVIOR ### LockFile ${APACHE_LOCK_DIR}/accept.lock PidFile ${APACHE_PID_FILE} Timeout 60 KeepAlive On MaxKeepAliveRequests 100 KeepAliveTimeout 15 User ${APACHE_RUN_USER} Group ${APACHE_RUN_GROUP} NameVirtualHost *:80 Listen 80 Listen 443 DefaultType text/plain UseCanonicalName on ### CAREFULLY SCREENED MODULES THAT WE ACTUALLY NEED ### LoadModule authz_host_module [Mods]/ LoadModule ext_filter_module [Mods]/ LoadModule filter_module [Mods]/ LoadModule deflate_module [Mods]/ LoadModule env_module [Mods]/ LoadModule setenvif_module [Mods]/ LoadModule status_module [Mods]/ LoadModule info_module [Mods]/ LoadModule dir_module [Mods]/ LoadModule alias_module [Mods]/ ServerName UseCanonicalName on ### MIME TYPES ### LoadModule mime_module [Mods]/ # Unclear whether this is really needed - we SHOULD know every file's type by extension... # LoadModule mime_magic_module [Mods]/ TypesConfig /etc/mime.types AddCharset UTF-8 .utf8 AddType application/x-compress .Z AddType application/x-gzip .gz .tgz AddType application/x-bzip2 .bz2 AddType text/html .shtml ### FALLBACK DIRECTORY BEHAVIOR ### <Directory /> Options FollowSymLinks AllowOverride None Order deny,allow Deny from all </Directory> DirectoryIndex index.html ### SSL ### LoadModule ssl_module [Mods]/ SSLCertificateFile /etc/apache2/ssl/ SSLCertificateKeyFile /etc/apache2/ssl/ SSLCertificateChainFile /etc/apache2/ssl/gd_bundle.crt SSLRandomSeed startup builtin SSLRandomSeed startup file:/dev/urandom 512 SSLRandomSeed connect builtin SSLRandomSeed connect file:/dev/urandom 512 AddType application/x-x509-ca-cert .crt AddType application/x-pkcs7-crl .crl SSLSessionCache shmcb:${APACHE_RUN_DIR}/ssl_scache(512000) SSLSessionCacheTimeout 300 SSLMutex file:${APACHE_RUN_DIR}/ssl_mutex SSLCipherSuite HIGH:MEDIUM:!ADH:!MD5 SSLProtocol all -SSLv2 ### SHIBBOLETH ### LoadModule mod_shib [Mods]/ ### PASSENGER ### LoadModule passenger_module /home/deploy/.rvm/gems/ruby-1.9.2-p290/gems/passenger-3.0.14/ext/apache2/ PassengerRoot /home/deploy/.rvm/gems/ruby-1.9.2-p290/gems/passenger-3.0.14 PassengerRuby /home/deploy/.rvm/wrappers/ruby-1.9.2-p290/ruby ### FIX BUSTED BEHAVIOR IN EARLY BROWSERS ### BrowserMatch "Mozilla/2" nokeepalive BrowserMatch "MSIE 4\.0b2;" nokeepalive downgrade-1.0 force-response-1.0 BrowserMatch "RealPlayer 4\.0" force-response-1.0 BrowserMatch "Java/1\.0" force-response-1.0 BrowserMatch "JDK/1\.0" force-response-1.0 ### MULTI-PROCESS SETUP ### <IfModule mpm_prefork_module> StartServers 5 MinSpareServers 5 MaxSpareServers 10 MaxClients 150 MaxRequestsPerChild 0 </IfModule> <IfModule mpm_worker_module> StartServers 2 MinSpareThreads 25 MaxSpareThreads 75 ThreadLimit 64 ThreadsPerChild 25 MaxClients 150 MaxRequestsPerChild 0 </IfModule> <IfModule mpm_event_module> StartServers 2 MinSpareThreads 25 MaxSpareThreads 75 ThreadLimit 64 ThreadsPerChild 25 MaxClients 150 MaxRequestsPerChild 0 </IfModule> AccessFileName .htaccess <Files ~ "^\.ht"> Order allow,deny Deny from all Satisfy all </Files> HostnameLookups Off ErrorLog ${APACHE_LOG_DIR}/error.log LogLevel warn LogFormat "%v:%p %h %l %u %t \"%r\" %>s %O \"%i\" \"%i\"" vhost_combined LogFormat "%h %l %u %t \"%r\" %>s %O \"%i\" \"%i\"" combined LogFormat "%h %l %u %t \"%r\" %>s %O" common LogFormat "%i -> %U" referer LogFormat "%i" agent <VirtualHost *:80> ServerName [WebRoot] DocumentRoot [AppRoot] <Directory [AppRoot]> Allow from all Options -MultiViews </Directory> <Location "/Shibboleth.sso"> SetHandler shib-handler PassengerEnabled off </Location> <Location /auth/shibboleth/callback> AuthType shibboleth ShibRequestSetting requireSession 1 Require valid-user </Location> ErrorLog ${APACHE_LOG_DIR}/error.log LogLevel warn CustomLog ${APACHE_LOG_DIR}/access.log combined </VirtualHost> <VirtualHost _default_:443> ServerAdmin ErrorDocument 503 /503.html ServerName [WebRoot] DocumentRoot [AppRoot] <Directory [AppRoot]> Allow from all Options -MultiViews </Directory> <Location "/Shibboleth.sso"> SetHandler shib-handler PassengerEnabled off </Location> <Location /auth/shibboleth/callback> AuthType shibboleth ShibRequestSetting requireSession 1 Require valid-user </Location> ErrorLog ${APACHE_LOG_DIR}/error.log LogLevel warn CustomLog ${APACHE_LOG_DIR}/access.log combined SSLEngine on <FilesMatch "\.(shtml|phtml|php)$"> SSLOptions +StdEnvVars </FilesMatch> BrowserMatch "MSIE [2-6]" \ nokeepalive ssl-unclean-shutdown \ downgrade-1.0 force-response-1.0 BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown </VirtualHost>