website/docs/users-sources/sources/social-logins/shibboleth/index.md
Allows users to authenticate using their Shibboleth credentials by configuring Shibboleth as a federated identity provider via SAML.
The following placeholders are used in this guide:
authentik.company is the FQDN of the authentik installation.shibboleth.company is the FQDN of the Shibboleth IdP installation.shibboleth-slug is the slug you will assign to the SAML source in authentik (e.g., shibboleth).To integrate Shibboleth with authentik you will need to create a SAML source in authentik.
Shibboleth.shibboleth (this sets the slug used in Shibboleth's metadata url).https://shibboleth.company/idp/profile/SAML2/Redirect/SSO.Redirect.https://authentik.company/source/saml/<shibboleth-slug>/metadata/.Transient.
:::warning NameID Policy
Shibboleth supports the Transient NameID by default. You will need to reconfigure Shibboleth to use other NameIDs.
:::authentik Self-signed Certificate).authentik Self-signed Certificate).:::info Display new source on login screen For instructions on how to display the new source on the authentik login page, refer to the Add sources to default login page documentation. :::
:::info Embed new source in flow :ak-enterprise For instructions on embedding the new source within a flow, such as an authorization flow, refer to the Source Stage documentation. :::
To integrate Shibboleth with authentik you will need to add authentik as a service provider in your Shibboleth IdP.
/opt/shibboleth-idp/conf/metadata-providers.xml on the Shibboleth IdP server.MetadataProvider element before the final closing tag of the existing MetadataProvider block:<MetadataProvider id="Authentik"
xsi:type="FileBackedHTTPMetadataProvider"
backingFile="%{idp.home}/metadata/authentik-metadata.xml"
metadataURL="https://authentik.company/source/saml/<shibboleth-slug>/metadata/" />
Source property mappings allow you to modify or gather extra information from sources. See the overview for more information.