Added one new view with the warning message, one new config file to configure the warning module, and a one-line change to relying_party.xml to enable the warning flow for the google.com relying party.
Note that I put the relying party name and groupId (subgroup of our idpauthz groups) in the warning config instead of as properties in idp.properties. I think this is appropriate because these are only used by this specific intercept.
…h shared netids accessing Google.
Added one new view with the warning message, one new config file to configure the warning module, and a one-line change to relying_party.xml to enable the warning flow for the google.com relying party. Note that I put the relying party name and groupId (subgroup of our idpauthz groups) in the warning config instead of as properties in idp.properties. I think this is appropriate because these are only used by this specific intercept.