Moving to the DS protocol from the legacy WAYF discovery protocol
If your Service Provider currently allows people to choose their Home Organization's IdP by redirecting them to the UK federation CDS (Central Discovery Service) using the WAYF protocol, you must reconfigure your SP to use the DS protocol with our CDS.
- Why should I re-configure my SP to use the DS protocol?
- How can I tell if my SP uses the WAYF protocol?
- Steps to switch from WAYF to DS protocol with no loss of service
- Configuration for a Shibboleth SP using the SSO element
- Configuration for a Shibboleth SP using the Sessions element
- OpenAthens SP
- Other SPs
Why should I re-configure my SP to use the DS protocol?
The DS protocol supersedes the WAYF protocol in several ways:
- It is protocol-independent and supports SAML 2 and SAML 1 operation, not just the legacy SAML 1 protocol
- It is less fragile, relying only on the
entityID
of the IdP rather than theentityID
and location of anAssertionConsumerService
URL - It includes an anti-phishing measure to ensure people are only redirected to trusted URLs
The UK federation therefore deprecated the use of the WAYF protocol on our CDS in June 2017 and will remove support for the legacy protocol in the future.
How can I tell if my SP uses the WAYF protocol?
If your SP redirects people to the CDS with parameters providerId
and shire
then it is using the WAYF protocol. You MUST take action because the WAYF protocol is deprecated.
If your SP redirects to the CDS with parameter entityID
(and not providerId
and shire
) then your SP already uses the DS protocol and you should not have to make any changes.
How to re-configure your SP
General procedure to switch from WAYF to DS protocol with no loss of service
The general steps to migrate from the WAYF protocol to the DS protocol are:
- Before reconfiguring your SP, you MUST ensure that there is a
DiscoveryResponse
URL registered for your SP. This is the trusted URL that the CDS will redirect people to. - Wait for the new URL to propagate to the CDS. We refresh metadata every day at approximately 1630 UK time and the CDS refreshes metadata every 4 hours, so typically you would wait until the next morning to move onto the next step.
- Reconfigure your SP to use the DS protocol instead of the WAYF protocol
You MUST add the DiscoveryResponse
endpoint to your SP's published metadata and let that new endpoint propagate to the federations' discovery services before you make any change to the configuration of your SP. If you do not, the remote discovery service will not trust your DiscoveryResponse
endpoint and the discovery flow will fail. Note also that the error message that the disocvery service displays is typically incomprehensible to the typical service user.
How to migrate a Shibboleth SP that is configured using the SSO element
The Shibboleth SP has a SSO
configuration element that allows simple reconfiguration between WAYF and DS protocols. If your SP is configured using this element, you can reconfigure your SP as in our documentation at https://www.ukfederation.org.uk/content/Documents/Setup2SP#SSO and then restart the shibd
daemon.
Please be aware that
- You MUST register the
DiscoveryResponse
endpoint before you reconfigure your SP - This change will immediately migrate the operation of your SP from WAYF to DS protocol use, and won't allow you to run a separate testing endpoint in parallel.
- your SP may be configured through the
Sessions
element rather than theSSO
element, especially if you have a complex deployment or if your SP was initially deployed in 2011 or earlier
Configuration for a Shibboleth SP using the Sessions element
If you want to configure a parallel login endpoint to test the DS protocol, or if your SP is configured to use the Sessions
element already, please contact the UK federation helpdesk to work through the details. The general shape of the migration is:
- Register a new
RequestInitiator
andDiscoveryResponse
endpoint suitable for use in the UK federation - Reconfigure your SP to support the DS protocol on the new endpoint (enabling SAML 2 operation)
- Test using the UK federation's Test IdP
- Test with your customers' IdPs to ensure that any personalisations are retained when moving from SAML 1 to SAML 2 (that is to say, the targetedID has the same value when transported using either protocol)
- If anyone has an issue, ask them to use the old login link. Tell the UK federation helpdesk and we can negotiate with the IdP operator.
- Move the login link to use the new
RequestInitiator
If you use OpenAthens SP software
The latest version of the OpenAthens SP can now support the DS protocol. As in the above process, you MUST add the DiscoveryResponse
endpoint to your SP's published metadata and let that new endpoint propagate to the federations' discovery services before you make any change to the configuration of your SP. If you do not, the remote discovery service will not trust your DiscoveryResponse
endpoint and the discovery flow will fail spectacularly.
Typically the endpoint to add to metadata will be of the form
<idpdisc:DiscoveryResponse xmlns:idpdisc="urn:oasis:names:tc:SAML:profiles:SSO:idp-discovery-protocol" Binding="urn:oasis:names:tc:SAML:profiles:SSO:idp-discovery-protocol" Location="https://yourdomain.com/oa/disco-ret" index="1"/>
Some documentation about OpenAthens' use of the DS protocol is at https://docs.openathens.net/display/public/OAAccess/Enabling+OpenAthens+Wayfinder
If you use other SP software
We don't know, please contact the UK federation helpdesk at contact the UK federation helpdesk