The Incommon Federation wiki has moved.

Please visit the new InCommon Federation Library wiki for updated content. Remember to update your bookmarks.

Click in the link above if you are not automatically redirected in 15 seconds.



Deprecated

Note that this page has been deprecated. The information it contains is no longer current.

Dynamic Analysis of IdP Endpoints in Metadata

InCommon Operations periodically probes browser-facing endpoints in IdP metadata for liveness. The goal of this probing operation is to alert site administrators about possible deployment issues involving InCommon IdPs.

There are service providers in the Federation that offer a comprehensive list of IdPs on their discovery interface. If your IdP has issues, your users may hit a dead end when they choose your IdP on a discovery interface. This results in a poor user experience and reflects badly on the Federation. Consequently, if you, as an IdP operator, are unable to fix or repair your IdP in short order, it is strongly RECOMMENDED that you self-assert the Hide From Discovery Category until the issues can be resolved. Once you insert the hide-from-discovery entity attribute (via the Federation Manager), your IdP will be removed from the list below.

The following tables list the codes used to classify IdPs and endpoints:

Curl Exit CodeInterpretationIdP Classification
0SuccessfulAlive
6DNS name resolution failedDead
7Host unreachableDead
28TimeoutUnresponsive
35SSL connection errorIndeterminate
51SSL certificate of peer was unacceptableIndeterminate
52The server did not reply to the requestIndeterminate
56Receipt of network data failedIndeterminate
HTTP Response CodeInterpretationEndpoint Classification
000No responseSee curl exit code
200OKSuccess
302FoundSee curl exit code
400Bad RequestUnknown
401UnauthorizedBasic Auth required?
404Not FoundBad endpoint location
500Internal Server ErrorServer misconfiguration?
503Service UnavailableUnknown

An endpoint probe results in a curl exit code. A zero exit code indicates success while a nonzero exit code indicates failure. See the curl man page for a brief description of possible exit codes.

An endpoint probe that produces both curl exit code 0 and HTTP response code 200 is considered a successful probe. All unsuccessful probes are listed in the following table (which was produced on May 20, 2016):

OrganizationNameIdP DisplayNameIdP entityIDEndpoint LocationCurl Exit CodeHTTP Response Code
Virginia Community College SystemVirginia Community College Systemhttp://adfs.directory.vccs.edu/adfs/services/trusthttps://adfs.directory.vccs.edu/adfs/ls/6000
ServiceNowServiceNowhttp://idp.devsnc.com/openamhttps://idp.devsnc.com/openam/SSORedirect/metaAlias/idp0500
Chaminade University of HonoluluChaminade University of Honoluluhttps://auth.chaminade.edu/idp/shibbolethhttps://auth.chaminade.edu/idp/profile/SAML2/Redirect/SSO0500
University of MiamiUniversity of Miamihttps://caneid.miami.edu/idp/shibbolethhttps://caneid.miami.edu/idp/profile/SAML2/Redirect/SSO56200
California Maritime AcademyCalifornia Maritime Academyhttps://cma-shibboleth.csum.edu/idp/shibbolethhttps://cma-shibboleth.csum.edu/idp/profile/SAML2/Redirect/SSO0401
Emerson CollegeEmerson Collegehttps://duo.emerson.edu/dag/saml2/idp/metadata.phphttps://duo.emerson.edu/dag/saml2/idp/SSOService.php0500
Comodo CA Ltd.Comodo CA Ltd.https://heimdall.comodo.net/idp/shibbolethhttps://heimdall.comodo.net/idp/profile/SAML2/Redirect/SSO0404
Carnegie Mellon UniversityCarnegie Mellon University Tartan-ConnectID for Guestshttps://identity.andrew.cmu.edu/idp/shibbolethhttps://identity.andrew.cmu.edu/idp/profile/SAML2/Redirect/SSO0401
National Science FoundationNational Science Foundationhttps://identity.research.gov/ssohttps://identity.research.gov/sso/SSORedirect/metaAlias/research/idp0500
California State University, Office of the ChancellorCalifornia State University, Office of the Chancellorhttps://idp-co.calstate.edu/idp/shibbolethhttps://idp-co.calstate.edu/idp/profile/SAML2/Redirect/SSO0401
Contra Costa Community College DistrictContra Costa Community College Districthttps://idp.4cd.edu/idp/shibbolethhttps://idp.4cd.edu/idp/profile/SAML2/Redirect/SSO7000
Bridgewater CollegeBridgewater Collegehttps://idp.bridgewater.edu/simplesamlhttps://idp.bridgewater.edu/simplesaml/saml2/idp/SSOService.php0500
RSmartRSmarthttps://idp.cloud.rsmart.com/samlhttps://idp.cloud.rsmart.com/saml/saml2/sso0404
Fermi National Accelerator LaboratoryFermi National Accelerator Laboratoryhttps://idp.fnal.gov/idp/shibbolethhttps://pingprod.fnal.gov:9031/idp/SSO.saml20500
Lock Haven UniversityLock Haven Universityhttps://idp.lhup.edu/idp/shibbolethhttps://idp.lhup.edu/idp/profile/SAML2/Redirect/SSO28000
Merit Network, Inc.Merit Network, Inc.https://idp.merit.eduhttps://merit-idp01.merit.edu/ssp/saml2/idp/SSOService.php0401
Oak Ridge National LaboratoryOak Ridge National Laboratoryhttps://idp.ornl.gov/idphttps://extidp.ornl.gov:9031/idp/SSO.saml20500
Parchment, Inc.Parchment, Inc.https://idp.parchment.com/idp/shibbolethhttps://idp.parchment.com/idp/profile/SAML2/Redirect/SSO0404
SHI International CorporationSHI International Corporationhttps://idp.shi.comhttps://internal.shi.com/idp/profile/SAML2/Redirect/SSO28000
Symplicity CorporationSymplicity Corporationhttps://idp.symplicity.com/idp/shibbolethhttps://idp.symplicity.com/idp/profile/SAML2/Redirect/SSO28000
University of the District of ColumbiaUniversity of the District of Columbiahttps://idp.udc.edu/idp/shibbolethhttps://idp.udc.edu/idp/profile/SAML2/Redirect/SSO28000
University of Texas-Pan AmericanUniversity of Texas-Pan Americanhttps://idp1.utpa.edu/idp/shibbolethhttps://idp1.utpa.edu/idp/profile/SAML2/Redirect/SSO35000
Wake Tech Community CollegeWake Tech Community Collegehttps://incommon.waketech.edu/idp/shibbolethNo HTTP-Redirect endpointNANA
Thomas Jefferson National Accelerator FacilityThomas Jefferson National Accelerator Facilityhttps://jidp.jlab.org/idp/shibbolethhttps://jidp.jlab.org/idp/profile/SAML2/Redirect/SSO28000
LIGO Scientific CollaborationLIGO Scientific Collaborationhttps://login.ligo.org/idp/shibbolethhttps://login.ligo.org/idp/profile/SAML2/Redirect/SSO0401
Regis UniversityRegis Universityhttps://login.regis.eduhttps://login.regis.edu/idp/SSO.saml20404
Coppin State UniversityCoppin State Universityhttps://oba.coppin.edu/idp/shibbolethhttps://oba.coppin.edu/idp/profile/SAML2/Redirect/SSO0404
University of Colorado DenverUniversity of Colorado Denverhttps://passport.ucdenver.edu/oam/fedhttps://passport.ucdenver.edu/oamfed/idp/samlv2056302
Adventist University of Health SciencesAdventist University of Health Scienceshttps://saml.adu.eduhttps://saml.adu.edu/simplesaml/saml2/idp/SSOService.php0500
Nelnet Business SolutionsNelnet Business Solutionshttps://saml.nelnet.nethttps://gatekeeper.factsmgt.com/idp/SSO.saml20500
Southern Illinois UniversitySouthern Illinois Universityhttps://shib-idp.siu.edu/idp/shibbolethhttps://shib-idp.siu.edu/idp/profile/SAML2/Redirect/SSO35302
University of Texas Health Science Center At HoustonUniversity of Texas Health Science Center At Houstonhttps://shib-idp2.uth.tmc.edu/idp/shibbolethhttps://shib-idp2.uth.tmc.edu/idp/profile/SAML2/Redirect/SSO0400
Florida State UniversityFlorida State Universityhttps://shib.its.fsu.edu/idp/shibbolethNo HTTP-Redirect endpointNANA
McNally Smith CollegeMcNally Smith Collegehttps://shib.mcnallysmith.edu/idp/shibbolethhttps://shib.mcnallysmith.edu/idp/profile/SAML2/Redirect/SSO7000
University of Texas of the Permian BasinUniversity of Texas of the Permian Basinhttps://shibb.utpb.edu/idp/shibbolethhttps://shibb.utpb.edu/idp/profile/SAML2/Redirect/SSO0400
University of California Hastings College of the LawUniversity of California Hastings College of the Lawhttps://shibboleth.uchastings.edu/idp/shibbolethhttps://shibboleth.uchastings.edu/idp/profile/SAML2/Redirect/SSO56000
West Chester University of PennsylvaniaWest Chester University of Pennsylvaniahttps://shibidp.wcupa.edu/idp/shibbolethhttps://shibidp.wcupa.edu/idp/profile/SAML2/Redirect/SSO28000
Augsburg CollegeAugsburg Collegehttps://sso.augsburg.edu/simplesaml/saml2/idp/metadata.phphttps://sso.augsburg.edu/simplesaml/saml2/idp/SSOService.php0500
Hampden-Sydney CollegeHampden-Sydney Collegehttps://sso.hsc.edu/adfs/services/trusthttps://sso.hsc.edu/adfs/ls/35000
Merchant Preservation ServicesMerchant Preservation Serviceshttps://thelonious.campusguard.com/idp/shibbolethhttps://thelonious.campusguard.com/idp/profile/SAML2/Redirect/SSO28000
Meredith CollegeMeredith Collegehttps://webauth.meredith.edu/idp/shibbolethhttps://webauth.meredith.edu/idp/profile/SAML2/Redirect/SSO0404
Davie County SchoolsDavie County Schoolsurn:mace:incommon:davie.k12.nc.usNo HTTP-Redirect endpointNANA
Medical University of South CarolinaMedical University of South Carolinaurn:mace:incommon:musc.eduNo HTTP-Redirect endpointNANA
OhioLinkOhioLinkurn:mace:incommon:ohiolink.eduhttps://authdb.ohiolink.edu/idp/profile/SAML2/Redirect/SSO0401


#trackbackRdf ($trackbackUtils.getContentIdentifier($page) $page.title $trackbackUtils.getPingUrl($page))
  • No labels