Thiss.io Login

This page is for testing the Discovery Service for thiss.io. Each button below corresponds to a different trust profile. A trust profile is a mechanism that an SP can use to constrain the results that the DS can serve the end users. The full list of available entities can be seen here (when browsing it it, be sure to, if using firefox, click on "JSON", and if using chrome, click on "Pretty print", to get a human readable list). The list of trust profiles that can be used to restrict results (including all profiles used in the buttons below) can be found here.

No profile


Strict profile that selects all IdPs with inCommon as metadata source

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: incommon-wayfinder

Strict profile that selects all IdPs with both SWAMID and eduGAIN as metadata source

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: swamid-edugain

Strict profile that selects all IdPs with SWAMID as metadata source

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: swamid

Strict profile that selects all IdPs with SWAMID as registration authority

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: global1

Strict profile that just selects 2 IdPs, the one of "Université de Picardie" and the one for "USF"

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: provider

NON Strict profile that just selects the "eduID Sweden" IdP

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: other

Strict profile that selects the IdP "Universidad Laica Eloy Alfaro de Manabí - uleam" (from the extra metadata provided by the profile) and in addition all IdPs with SWAMID as registration authority

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: customer

NON Strict profile that selects all IdPs with SWAMID as registration authority

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: customer2

Strict profile that selects all IdPs with registration authority other than SWAMID

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: customer3

NON Strict profile that selects all IdPs with registration authority other than SWAMID

  • entityID: https://cpauth.icos-cp.eu/saml/cpauth
  • trustProfile: customer4

Strict profile that selects all IdPs with entity category of "http://refeds.org/category/research-and-scholarship" or "http://www.geant.net/uri/dataprotection-code-of-conduct/v1"

  • entityID: https://box-idp.nordu.net/simplesaml/module.php/saml/sp/metadata.php/default-sp
  • trustProfile: customer

NON Strict profile that selects all IdPs with entity category of "http://refeds.org/category/research-and-scholarship" or "http://www.geant.net/uri/dataprotection-code-of-conduct/v1"

  • entityID: https://box-idp.nordu.net/simplesaml/module.php/saml/sp/metadata.php/default-sp
  • trustProfile: customer2

Strict profile that selects all IdPs that do not have the entity category "http://refeds.org/category/research-and-scholarship"

  • entityID: https://box-idp.nordu.net/simplesaml/module.php/saml/sp/metadata.php/default-sp
  • trustProfile: customer3

NON Strict profile that selects all IdPs that do not have the entity category "http://refeds.org/category/research-and-scholarship"

  • entityID: https://box-idp.nordu.net/simplesaml/module.php/saml/sp/metadata.php/default-sp
  • trustProfile: customer4

Strict profile that selects all IdPs with SWAMID as registration authority excluding "eduID Sweden"

  • entityID: https://csucoast.infoready4.com/shibboleth
  • trustProfile: customer

NON strict profile that selects the 29mayis.edu.tr IdP

  • entityID: http://fs.liu.se/adfs/services/trust
  • trustProfile: other

To use in your web application include the following code:

<script src="https://deploy-preview-275--thiss.netlify.app/thiss.js"/>
<div id="login"> </div>
<script>
    window.onload = function() {
       thiss.DiscoveryComponent({
           loginInitiatorURL: 'https://localhost/Shibboleth.sso/Login?target=https://google.com',
           entityID: 'https://localhost/shibboleth',
           trustProfile: 'example-profile'
       }).render('#login');
    };
</script>