Giving an SP the authnContextClassRef they asked for
Cantor, Scott
cantor.2 at osu.edu
Thu Jan 13 19:01:55 UTC 2022
My point is....what big problem do you create by treating any SP requesting this as a request for MFA? How many SPs are requesting PPT and when would that NOT be a bug? I think you're solving for a non-problem really.
On 1/13/22, 1:47 PM, "users on behalf of Wessel, Keith" <users-bounces at shibboleth.net on behalf of kwessel at illinois.edu> wrote:
> Now that I'm no longer using a second factor script, that's no longer an option.
You could re-add such a script into the steps you're following.
> Is there any way to work around this until the vendor gets a clue? Can I map acrs for a specific relying party?
> Or can I create a translation strategy bean and associate it with this SP to essentially translate requests of PPT
> into MFA?
You could instantiate a dedicated copy of the class that's used internally with the map structure and inject a dedicated map into that copy. Then inject that bean into the slot in the relying party override. That's wiring, but no custom code.
The default wiring is:
<property name="defaultAuthenticationMethodsLookupStrategy">
<bean class="net.shibboleth.idp.saml.saml2.profile.config.navigate.ProxyAwareDefaultAuthenticationMethodsLookupFunction"
p:mappings="#{getObject('shibboleth.PrincipalProxyRequestMappings')}" />
</property>
Do that but with a different p:mappings source and you get per-RP mappings.
-- Scott
More information about the users
mailing list