This guide describes how to change the security certificate for SAML messaging for Shibboleth and Haka metadata only. Also remember to renew the certificate from Tomcat / web server

Change of SAML-service (SP) certificate

The process described in this guide ensures uninterrupted certificate exchange with services that operate in accordance with the SAML specifications. There are SAML products on the market that do not support the key exchange process. Certificate exchange requires either manual action, scheduled certificate exchange, or service login does not work at all while two certificates are published in the metadata. Haka does not support scheduled certificate exchange without strong reasons, as it is impossible to agree on a common metadata update time for all services.


<CredentialResolver type="Chaining">
  <CredentialResolver type="File">
    <Key>
      <Name>OldKey</Name>
      <Path>/etc/shibboleth/old.key</Path>
    </Key>
    <Certificate>
      <Path>/etc/shibboleth/old.crt</Path>
    </Certificate>
  </CredentialResolver>
  <CredentialResolver type="File">
    <Key>
      <Name>NewKey</Name>
      <Path>/etc/shibboleth/new.key</Path>
    </Key>
    <Certificate>
      <Path>/etc/shibboleth/new.crt</Path>
    </Certificate>
  </CredentialResolver>
</CredentialResolver>



Change the SAML authentication source (IdP) certificate