| ... | ... | @@ -7,9 +7,9 @@ The identity providers' X509 certificate expired. |
|
|
|
### Solution:
|
|
|
|
1. Download the current SAML entity from [https://idp.zid.tuwien.ac.at/saml2](https://idp.zid.tuwien.ac.at/saml2). For other identity providers see [https://eduid.at/entities/idp/](https://eduid.at/entities/idp/)
|
|
|
|
2. Go to the [keycloak admin console](https://keycloak.sharing-codeability.uibk.ac.at/auth/admin)
|
|
|
|
2. Navigate to *Identity Providers* (left sidebar)
|
|
|
|
3. Choose *Vienna University of Technology*
|
|
|
|
4. Scroll to *Validating X509 Certificates*
|
|
|
|
3. Navigate to *Identity Providers* (left sidebar)
|
|
|
|
4. Choose *Vienna University of Technology*
|
|
|
|
5. Scroll to *Validating X509 Certificates*
|
|
|
|
6. Insert X509 certificate from SAML entity and click save
|
|
|
|
|
|
|
|
## "500 Internal Server Error" @ TU Wien Identity Provider (ZID)
|
| ... | ... | @@ -20,5 +20,7 @@ When logging out at [oeresource](https://oeresource-dev.logic.at/en/), the user |
|
|
|
In our case, the *single logout endpoint* was not passed on to the identity provider correctly.
|
|
|
|
### Solution:
|
|
|
|
1. Go to the [keycloak admin console](https://keycloak.sharing-codeability.uibk.ac.at/auth/admin)
|
|
|
|
2. Enable "backchannel logout" and save
|
|
|
|
2. Navigate to *Identity Providers* (left sidebar)
|
|
|
|
3. Choose *Vienna University of Technology*
|
|
|
|
4. Enable "backchannel logout" and save
|
|
|
|
 |
|
|
\ No newline at end of file |