servicenow SAML 2 integration

Douglas E Engert deengert at gmail.com
Fri Apr 25 08:37:56 EDT 2014



On 4/24/2014 11:16 AM, Christopher Bongaarts wrote:
> On 4/24/2014 11:08 AM, Cantor, Scott wrote:
>> On 4/24/14, 12:04 PM, "Tom Scavo" <trscavo at gmail.com> wrote:
>>> Nice tip! Could you accomplish the same thing using entity attributes?
>> No, that IdP version is not pluggable in that code.
>
> You could use entity attributes for the attribute filter, but not for
> the relying-party.

You could do something like this:

attribute_resolver.xml:

    <!-- Service-Now  - wants a nameID  taken from sAMAccountName - 05/15/2013 -->
     <!-- Others may want the same thing, so make it generic -->
     <resolver:AttributeDefinition xsi:type="ad:Simple" id="NameIDsAMAccountName" sourceAttributeID="sAMAccountName">
     <resolver:Dependency ref="myLDAP" />
         <resolver:AttributeEncoder xsi:type="enc:SAML2StringNameID" nameFormat="urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified" />
     </resolver:AttributeDefinition>



attribute-filter.xml:

     <!-- Some sites (Service-Now) want a NameID to use as a user_name.
          We will release the NameIDsAMAccountName to these sites
          but not the transientId
          - 05/15/2013 -->
     <afp:AttributeFilterPolicy id="releaseNameIDsAMAccountName" >
     <afp:PolicyRequirementRule xsi:type="basic:AttributeRequesterRegex"
          regex="^https://.*[.]service-now[.]com" />
     <afp:AttributeRule attributeID="NameIDsAMAccountName">
         <afp:PermitValueRule xsi:type="basic:ANY" />
     </afp:AttributeRule>
     <afp:AttributeRule attributeID="transientId">
         <afp:DenyValueRule xsi:type="basic:ANY" />
     </afp:AttributeRule>
     </afp:AttributeFilterPolicy>


>

-- 

  Douglas E. Engert  <DEEngert at gmail.com>



More information about the users mailing list