Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RequestedAuthnContext: Comparison type #252

Open
theo-beers opened this issue Dec 14, 2017 · 7 comments
Open

RequestedAuthnContext: Comparison type #252

theo-beers opened this issue Dec 14, 2017 · 7 comments

Comments

@theo-beers
Copy link

Comparison type for RequestedAuthnContext is currently fixed on 'exact'. It would be great if it was configurable as:

  • better
  • exact
  • maximum
  • minimum
@markstos
Copy link
Contributor

markstos commented Jan 3, 2018

If there's interest in this, first link to the part of the SAML spec where this is behavior is mentioned.

Second, provide a complete PR to implement it, including code, test and docs.

There are no maintainers here waiting to implement feature requests for others.

@theo-beers
Copy link
Author

The attribute is specified in the SAML 2.0 Oasis docs (pdf) at: 3.3.2.2.1 Element

I might put some effort into creating a PR, but not before issue #181 is accepted and merged.

@theo-beers
Copy link
Author

Here's the link to the docs I was referring to:
https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf

@cjbarth
Copy link
Collaborator

cjbarth commented Sep 11, 2018

#181 has been superseded by #298

@markstos
Copy link
Contributor

@tjbeers #298 has been merged with multiple authentication context support and is planned to be replaced soon. Are you or @cjbarth interested in adding support for the comparison options supported by the SAML spec?

@cjbarth
Copy link
Collaborator

cjbarth commented Sep 11, 2018

At this time, I'm not.

@theo-beers
Copy link
Author

Same. But I'm not saying never

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants