Skip to Content.
Sympa Menu

shibboleth-dev - RE: Matching auth to attr request

Subject: Shibboleth Developers

List archive

RE: Matching auth to attr request


Chronological Thread 
  • From: "Scott Cantor" <>
  • To: "'Alistair Young'" <>, "'Shibboleth Dev Team'" <>
  • Subject: RE: Matching auth to attr request
  • Date: Thu, 17 Mar 2005 10:42:46 -0500
  • Organization: The Ohio State University

> Is there any way in shibboleth to link an AuthenticationStatement to a
> providerId? providerId being a shibboleth specific attribute.

The assertion Issuer is always the providerId. For compatibility with 1.1,
you'd have to back off to NameQualifier if Issuer isn't set right.

> On initial GET, the target parameter specifies the resource the user
> wants to access, e.g. http://site.com/page.htm and providerId states
> who is asking.

No. target specifies nothing you should depend on. The spec is clear on this
now. I hope to make it a dummy value in 1.3 like it should have been before.

> When the AA is contacted, the providerId isn't present but the
> AttributeQuery Resource contains the providerId from the GET request.

That is the Shibboleth profile, yes.

> According to SAML1.1 core AttributeQuery Resource is "the start of the
> current document" but shibboleth sets it to the providerId. Is this
> intentional or a config error?

Intentional. We are a profile.

> Or do rules for constructing a providerId somehow tie in with
> the SAML definition of Resource?

No.

> SAML1.1 supports Attribute scoping by requested resource while shibb
> seems to replace that with scoping via provider.

We pushed for the Resource idea but is was a bad mistake and we corrected it
by profiling it out of existence. SAML 2.0 does not support it.

> I can see that a link between auth and attrs can be establised using
> AttributeQuery Resource but only for shibboleth SPs. It wouldn't work
> for non shibb ones.

The only way to identify a pure SAML requester is by the certificate used.
There is no interoperable way to map credentials to a logical name in SAML
1.1. This sucks, so I fixed it using a profile. It has nothing to do with
linking anything, I don't know what you're talking about there. It's about
authentication of the request.

-- Scott




Archive powered by MHonArc 2.6.16.

Top of Page