-
Notifications
You must be signed in to change notification settings - Fork 8
Match "Requested Attributes" from metadata to ARP #449
Comments
Now that we store the ARP in the SP connection instead of separately, this should be much easier to implement. @maartenk how many SPs (that you import) publish this information? |
@pmeulen The exact amounts i'm not sure, but basically every (new) edugain SP as well as every new SP which provide the requested attributes correctly via SURFconext Registration form.
|
ARP currently only have the power to filter attributes, not halt SSO because attributes are missing. |
Agreed. Blocking access based on (absense of) attributes is a different (but existing) project. |
Agree. That is what i aimed for. |
I now have an initial implementation that uses all RequestedAttribute fields it finds in the first AttributeConsumingService and tries to make an ARP out of that. Note that while I did do denormalization of OID to URN and the other way, the normalization that SSP has is not as good as the one EngineBlock has. For instance on one test SP it was unable to see that the SP requested the SHO attribute because we use the URN and the SP had the URI in it's RequestedAttributes but SSP doesn't have the mapping for that. Also you can't chose to NOT import the new ARP, much like Allowed Connections you'll always get it. And we don't do anything with RequestedAttribute > AttributeValue elements, we just always do *. And of course we don't do anything with isRequired. |
…quested-attributes Fix for issue #449 Match "Requested Attributes" from metadata to ARP
The requested attributes for an SP can be set in the SAML metadata. Currently these values are not handeld by Janus
As a feature request: the Requested Attributes to be concept ARP for that specific SP, so we don't need to set those manually anymore (just check/adjust them).
The text was updated successfully, but these errors were encountered: