Shibboleth Installation notes Soffid Federation is based on shibboleth open source project. Actually the installation is a mixed procedure between Shibboleth installation and Soffid configuration. In the future Shibboleth installation will be integrated on Soffid installation in order to assume better integration level. This guides help administrators to streamline shibboleth installation process, but it does not replace the oficial shibboleth documentation in any way. Install shibboleth On ubuntu sudo apt-get install shibboleth-sp2-schemas libshibsp-dev sudo apt-get install libshibsp-doc libapache2-mod-shib2 opensaml2-tools sudo apt-get install libapr-memcache-dev libapr-memcache0 policycoreutils On RedHat Follow Installing via Yum instructions on shibboleth wiki: https://wiki.shibboleth.net/confluence/display/SHIB2/NativeSPLinuxRPMInstall On Windows Server Follow installing via Windows Server instructions on Shibboleth wiki: https://wiki.shibboleth.net/confluence/display/SHIB2/NativeSPWindowsInstall Configure SELinux (if needed) create shibd.te file with this content: module httpd_shibd 1.0; require { type tmp_t; type var_run_t; type httpd_t; type initrc_t; class sock_file write; class unix_stream_socket connectto; } #============= httpd_t ============== allow httpd_t initrc_t:unix_stream_socket connectto; allow httpd_t var_run_t:sock_file write; Execute sudo checkmodule -M -m -o shibd.mod shibd.te sudo semodule_package -o shibd.pp -m shibd.mod sudo semodule -i shibd.pp sudo setsebool -P httpd_can_network_connect 1 Create service provider Shibboleth keys & metadata Execute sudo shib-keygen -h HOSTNAME -e https://HOSTNAME/shibboleth Verify the permissions of the generated key. At this point, verify the hostname specified matches the ServerName directive at Apache config file, including scheme and port. Edit configuration file Update shibboleth2.xml in order to download the federation data from Soffid master or backup Synchronization Server. You will need to specify the Identity Provider public ID, as it is created on Soffid SAML Federation ... SAML2 SAML1 SAML2 Local ... ... ... Finally, uncomment the required attributes on attribute-map.xml. You must also add the following ones: Enable Single Logout back-channel It's advisable to use single logout back-channel while using non SAML-aware applications. To do this, add a new Logout intitator configuration at shibboleth2.xml file: For security reasons, you should at the signing parameter at the application defaults tag in order to enable logout message signature: ..  Finally Restart services: sudo service apache2 start sudo service shibd start