Persistent NameID attribute does not appear to be released.

Mathis, Bradley bmathis at pima.edu
Wed Apr 8 11:16:51 EDT 2020


Howdy all,    Note: Please I'm using idp 2.x for reasons beyond my control
.. please don't crucify me for that... I'm sure there are many other things
to crucify me for :-)

  I'm attempting to setup SSO with the cloud service product "Beyond Trust"
.... the metadata being generated from the SP side appears to require a
persistent nameid as that's the only type listed in the metadata.   I
attempted to get it to work by just using the default attribute that are
released to everyone.   That caused a message similar to invalid NameId or
NameID format not supported.  That wasn't surprising.  I don't think I have
any other relying parties that require persistent name id.  so I have never
configured this before

So my problem is I have now configured an attribute "BeyondTrustUsername"
in the attribute-resolver that uses the persistent nameid ... I get past
the invalid nameid format message.   But the attribute does not appear to
be released.  I have configured the "BeyondTrustUsername" attribute in
the attribute-filter.xml to release to anyone.  When starting shib I can
see references to the Attribute definition being parsed in the idp-process
log and no errors.    But when I attempt to login to the application I
don't see the attribute being released ...(at least not in SAML tracer) .
To me appears that the attribute is available but not being released.  The
attribute I created was "BeyondTrustUsername"

Here's what I added to attribute-resolver.xml for it:

<resolver:AttributeDefinition id="BeyondTrustUsername" xsi:type="Simple"

                              xmlns="urn:mace:shibboleth:2.0:resolver:ad"

                              sourceAttributeID="uid">


    <resolver:Dependency ref="myLDAP"/>


    <resolver:AttributeEncoder xsi:type="SAML2StringNameID"

                               xmlns=
"urn:mace:shibboleth:2.0:attribute:encoder"

                               nameFormat=
"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" />

</resolver:AttributeDefinition>

The AttributeDefinition above appears to load OK  ..

Here's what I added to the attribute-filer.xml  in the release to anyone
section:

        <afp:AttributeRule attributeID="BeyondTrustUsername">

            <afp:PermitValueRule xsi:type="basic:ANY" />

        </afp:AttributeRule>


The other attributes release OK ...(though the are not of the persistent
nameid format)



Here's what I get in my saml trace .... sorry for posting all of this but I
want to make sure I have given enough information to be helpful.


<saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"
Destination="https://pima.beyondtrustcloud.com/saml/sso" ID=
"_351200422a172aea25cd30be76dbcddf" InResponseTo=
"BG_f625d575141079be3df1d946780cf2b434b84194" IssueInstant=
"2020-04-08T09:44:40.384Z" Version="2.0" > <saml2:Issuer xmlns:saml2=
"urn:oasis:names:tc:SAML:2.0:assertion" Format=
"urn:oasis:names:tc:SAML:2.0:nameid-format:entity" >
https://idp.pima.edu/idp/shibboleth</saml2:Issuer> <saml2p:Status> <
saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" /> </
saml2p:Status> <saml2:Assertion xmlns:saml2=
"urn:oasis:names:tc:SAML:2.0:assertion" ID=
"_45cbaeda010b480dec5ae25542abfdca" IssueInstant="2020-04-08T09:44:40.384Z"
Version="2.0" xmlns:xs="http://www.w3.org/2001/XMLSchema" > <saml2:Issuer
Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">
https://idp.pima.edu/idp/shibboleth</saml2:Issuer> <ds:Signature xmlns:ds="
http://www.w3.org/2000/09/xmldsig#"> <ds:SignedInfo> <
ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#
" /> <ds:SignatureMethod Algorithm="
http://www.w3.org/2000/09/xmldsig#rsa-sha1" /> <ds:Reference URI=
"#_45cbaeda010b480dec5ae25542abfdca"> <ds:Transforms> <ds:Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" /> <
ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"> <
ec:InclusiveNamespaces xmlns:ec="http://www.w3.org/2001/10/xml-exc-c14n#"
PrefixList="xs" /> </ds:Transform> </ds:Transforms> <ds:DigestMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" /> <ds:DigestValue>
zC3J771Z4myufNbeoZL3dqUfxu8=</ds:DigestValue> </ds:Reference> </
ds:SignedInfo> <ds:SignatureValue>
SCcJ6oB2KdDqMAivUtr8FZOd4QOvjt/jBm3U7kOkc36fpBsqWDZN3kjMlCFgvrpEgzJnUqP84sDgRHL3/8wlAObeY0niphMztfOibKaijMp5DzsKt01n0F8SAUgiCMCtMNyRDcUlAKA5rSEwz7Oom6KIhzaB51evaEr8Wx0Ig+UOhdzMN7VLSKWzoFqZUW76nEc+6lMDZ5teMMj00xcBaQewyR/Q/uAgOl+7gxcRpL5WnFaXYkx58sUtCS4PeFrznAlTHxTF2uHbdX72enst7hcerJPVM3q1J5/TP7FwrHaFLlINNGy4D0lQhyuqOxjRz/xQe2caCPyLMjek1H/9Kw==
</ds:SignatureValue> <ds:KeyInfo> <ds:X509Data>
<ds:X509Certificate>MIIDHDCCAgSgAwIBAgIVAI8RApJaLNJSvMXpCrnt7hb5JMR2MA0GCSqGSIb3DQEBBQUAMBcxFTAT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</ds:X509Certificate> </ds:X509Data> </ds:KeyInfo> </ds:Signature> <
saml2:Subject> <saml2:NameID Format=
"urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" NameQualifier="
https://idp.pima.edu/idp/shibboleth" SPNameQualifier="
https://pima.beyondtrustcloud.com" >trename01</saml2:NameID> <
saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"> <
saml2:SubjectConfirmationData Address="144.90.132.128" InResponseTo=
"BG_f625d575141079be3df1d946780cf2b434b84194" NotOnOrAfter=
"2020-04-08T09:49:40.384Z" Recipient="
https://pima.beyondtrustcloud.com/saml/sso" /> </saml2:SubjectConfirmation>
</saml2:Subject> <saml2:Conditions NotBefore="2020-04-08T09:44:40.384Z"
NotOnOrAfter="2020-04-08T09:49:40.384Z" > <saml2:AudienceRestriction> <
saml2:Audience>https://pima.beyondtrustcloud.com</saml2:Audience> </
saml2:AudienceRestriction> </saml2:Conditions> <saml2:AuthnStatement
AuthnInstant="2020-04-08T09:44:40.208Z" SessionIndex=
"_4e6aa2f2f8b87542705c10630fd9fb2c" > <saml2:SubjectLocality Address=
"144.90.132.128" /> <saml2:AuthnContext> <saml2:AuthnContextClassRef>
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</
saml2:AuthnContextClassRef> </saml2:AuthnContext> </saml2:AuthnStatement> <
saml2:AttributeStatement> <saml2:Attribute FriendlyName="uid" Name=
"urn:oid:0.9.2342.19200300.100.1.1" NameFormat=
"urn:oasis:names:tc:SAML:2.0:attrname-format:uri" > <saml2:AttributeValue
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string" >
trename01</saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute
FriendlyName="eduPersonPrincipalName" Name=
"urn:oid:1.3.6.1.4.1.5923.1.1.1.6" NameFormat=
"urn:oasis:names:tc:SAML:2.0:attrname-format:uri" > <saml2:AttributeValue
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string" >
trename01 at pima.edu</saml2:AttributeValue> </saml2:Attribute> <
saml2:Attribute FriendlyName="sn" Name="urn:oid:2.5.4.4" NameFormat=
"urn:oasis:names:tc:SAML:2.0:attrname-format:uri" > <saml2:AttributeValue
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string" >
rename01</saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute
FriendlyName="givenName" Name="urn:oid:2.5.4.42" NameFormat=
"urn:oasis:names:tc:SAML:2.0:attrname-format:uri" > <saml2:AttributeValue
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string" >
Testing</saml2:AttributeValue> </saml2:Attribute> <saml2:Attribute
FriendlyName="mail" Name="urn:oid:0.9.2342.19200300.100.1.3" NameFormat=
"urn:oasis:names:tc:SAML:2.0:attrname-format:uri" > <saml2:AttributeValue
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string" >
trename01 at pima.edu</saml2:AttributeValue> </saml2:Attribute> </
saml2:AttributeStatement> </saml2:Assertion> </saml2p:Response>



If you have any ideas as to what I'm missing please let me know ... I have
also tried to release the "BeyondTrustUsername" attribute directly by
adding this the attribute-filter.xml


<!-- add for BeyondTrust -->

  <afp:AttributeFilterPolicy>

        <afp:PolicyRequirementRule xsi:type="basic:AttributeRequesterString"
value="https://pima.beyondtrustcloud.com" />

        <afp:AttributeRule attributeID="BeyondTrustUsername">

            <afp:PermitValueRule xsi:type="basic:ANY" />

        </afp:AttributeRule>

    </afp:AttributeFilterPolicy>



I hope what I have tried to explain makes sense.  Thanks ahead of time for
your input





Brad Mathis
IT Systems Architect
Infrastructure Services - Applications
Pima Community College
520.206.4826
bmathis at pima.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://shibboleth.net/pipermail/users/attachments/20200408/2a32d69f/attachment.html>


More information about the users mailing list