## Basic service configuration eidas.ms.context.url.prefix= eidas.ms.core.configRootDir=file:./ ##Directory for static Web content eidas.ms.webcontent.static.directory=webcontent/ eidas.ms.webcontent.templates=templates/ eidas.ms.webcontent.properties=properties/messages ##Monitoring eidas.ms.monitoring.eIDASNode.metadata.url= ## extended validation of pending-request Id's eidas.ms.core.pendingrequestid.digist.secret=pendingReqIdSecret ############################################# #### eIDAS Ref. Implementation connector #### eidas.ms.auth.eIDAS.node_v2.proxy.entityId=ownSpecificProxy eidas.ms.auth.eIDAS.node_v2.proxy.forward.endpoint= # Mandate configuration eidas.ms.auth.eIDAS.proxy.mandates.enabled=false #eidas.ms.auth.eIDAS.proxy.mandates.profiles.natural.default= #eidas.ms.auth.eIDAS.proxy.mandates.profiles.legal.default= ## special foreign eIDAS-Connector configuration #eidas.ms.connector.0.uniqueID= #eidas.ms.connector.0.countryCode=CC #eidas.ms.connector.0.mandates.enabled=false #eidas.ms.connector.0.mandates.natural= #eidas.ms.connector.0.mandates.legal= #eidas.ms.connector.0.auth.idaustria.entityId= ## PVP2 S-Profile communication with ID Austria System # EntityId and optional metadata of ID Austria System eidas.ms.modules.idaustriaauth.idp.entityId=https://eid.oesterreich.gv.at/auth/idp/shibboleth # Common SAML2 configuration eidas.ms.pvp2.metadata.organisation.name=JUnit eidas.ms.pvp2.metadata.organisation.friendyname=For testing with jUnit eidas.ms.pvp2.metadata.organisation.url=http://junit.test eidas.ms.pvp2.metadata.contact.givenname=Max eidas.ms.pvp2.metadata.contact.surname=Mustermann eidas.ms.pvp2.metadata.contact.email=max@junit.test # SAML2 client configuration eidas.ms.modules.idaustriaauth.keystore.type=jks eidas.ms.modules.idaustriaauth.keystore.path=keys/.... eidas.ms.modules.idaustriaauth.keystore.password= eidas.ms.modules.idaustriaauth.metadata.sign.alias= eidas.ms.modules.idaustriaauth.metadata.sign.password= eidas.ms.modules.idaustriaauth.request.sign.alias= eidas.ms.modules.idaustriaauth.request.sign.password= eidas.ms.modules.idaustriaauth.response.encryption.alias= eidas.ms.modules.idaustriaauth.response.encryption.password= # TrustStore IDA SAML2 Metadaten eidas.ms.modules.idaustriaauth.truststore.type=jks eidas.ms.modules.idaustriaauth.truststore.path=keys/truststore_ida.jks eidas.ms.modules.idaustriaauth.truststore.password=password ############################################################################# ## advanced eIDAS attribute processing # BORIS attribute for eJustice eidas.ms.advanced.attributes.ejusticerole.mandate.profiles=eJusticePortalVip1 eidas.ms.advanced.attributes.ejusticerole.mandate.mode=forceLegal eidas.ms.advanced.attributes.ejusticerole.additional.ida.attributes=urn:oid:1.2.40.0.10.2.1.1.261.76,urn:oid:1.2.40.0.10.2.1.1.261.84,urn:oid:1.2.40.0.10.2.1.1.261.100 eidas.ms.advanced.attributes.ejusticerole.value.1=eJusticePortalVip1=VIP1