Subject canonicalization flow selection strategy
Cantor, Scott
cantor.2 at osu.edu
Wed May 6 14:35:20 EDT 2015
On 5/6/15, 6:07 PM, "Misagh Moayyed" <mmoayyed at unicon.net> wrote:
>
>So let's see if understand interceptors: A master list is available that
>defines the flows, and each RP may inject itself into that flow by
>modifying
>the postAuthentationFlows property. Given that the property is a list, I
>suppose flow ids will be called in sequence (or alternative, I might even
>call into a subflow from an interceptor flow).
Yes, that's correct. There is actually one other interceptor injection
point, immediately after the message is decoded. It can be overridden if
need be, but it's defaulted to run the security rulesets we defined so
normally it's invisible, but in principle it's the same mechanism. There
may be others defined later, don't know yet.
>I can see quite a large number of predicates available which is great. Is
>there one that can examine the RequestedAuthnContext? I can't see one in
>the
>hierarchy.
It's all pretty haphazard at the moment. There are predicates used all
over the place so there may be one done for some other purpose that could
be reused there, but I don't know offhand, probably not. The catch-all for
now is the ScriptedPredicate, though actually writing them in Java is
pretty trivial Java of course once you know what you're looking for in the
tree.
The data extracted from any RequestedAuthnContext is in:
PRC -> AuthenticationContext -> RequestedPrincipalContext
Any other protocols we support that offer method request criteria will
always be mapped to that context, so you don't want to (or need to)
actually examine the SAML request directly.
-- Scott
>
More information about the users
mailing list