To make SFO calls, engine needs the config of the SFO IdP Entity and the SFO AuthnConextClassRefs to use. Because these differ from the AuthnConextClassRefs that engine must communicate to SPs, a "translation table" is needed.
SAML Metadata
In order to be able to call the remote OpenConext-Stepup SFO endpoint, EB needs to know its metadata (I.e. the metadata of the SAML IdP Entity published at https:///second-factor-only/metadata):
Needed information is:
EntityID
SSO location
SAML Signing Certificate
These can be global configuration file parameters. We do not want to dynamically import/configure these from the metadata published by the Stepup-Gateway. These parameters must not be mandatory for regular EB operation (since an install may not also have a OpenConext-Stepup setup).
AuthnConextClassRefs
The AuthnConextClassRef values are specific to an OpenConext-Stepup installation. Moreover the values used by the "standard" authentication endpoint of the Stepup-Gateway (which engine will emulate) differ from those used by the SFO endpoint. This means that a translation table is required to be able to convert between two.
Additionally engine needs to be able to express to the SP that, if allowed by the configuration, a user did not have an (active) token that allowed authentication at the requested level (see: Scenario 3 in https://www.pivotaltracker.com/story/show/166729297). This corresponds to the LoA 1 authentication policy of the Stepup-Gateway.
A two-way mapping from "AuthnConextClassRef configured in manage and used in the assertion to the SP" to "AuthnConextClassRef to use with she SFO endpoint of the Stepup-Gateway". For the Current Stepup-Gateway this table will have two entries (but I suggest not limiting the number of entries in this table):
These can be global configuration file parameters. These parameters must not be mandatory for regular EB operation (since an install may not also have a OpenConext-Stepup setup).
This issue is imported from pivotal - Originaly created at Jun 14, 2019 by Thijs Kinkhorst
To make SFO calls, engine needs the config of the SFO IdP Entity and the SFO AuthnConextClassRefs to use. Because these differ from the AuthnConextClassRefs that engine must communicate to SPs, a "translation table" is needed.
SAML Metadata In order to be able to call the remote OpenConext-Stepup SFO endpoint, EB needs to know its metadata (I.e. the metadata of the SAML IdP Entity published at https:///second-factor-only/metadata):
Needed information is:
These can be global configuration file parameters. We do not want to dynamically import/configure these from the metadata published by the Stepup-Gateway. These parameters must not be mandatory for regular EB operation (since an install may not also have a OpenConext-Stepup setup).
AuthnConextClassRefs The AuthnConextClassRef values are specific to an OpenConext-Stepup installation. Moreover the values used by the "standard" authentication endpoint of the Stepup-Gateway (which engine will emulate) differ from those used by the SFO endpoint. This means that a translation table is required to be able to convert between two.
Additionally engine needs to be able to express to the SP that, if allowed by the configuration, a user did not have an (active) token that allowed authentication at the requested level (see: Scenario 3 in https://www.pivotaltracker.com/story/show/166729297). This corresponds to the LoA 1 authentication policy of the Stepup-Gateway.
So the needed information is:
These can be global configuration file parameters. These parameters must not be mandatory for regular EB operation (since an install may not also have a OpenConext-Stepup setup).
Estimation: 6 - 8h