Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

The <AttributeFilter> element configures the component used to "filter" incoming attributes to prevent applications protected by an SP from seeing data that violates whatever policies the filter implements. A few example use cases include:

  • limiting the values of an attribute whose values are required to be from an enumeration (e.g., the eduPersonScopedAffiliation attribute)
  • applying automated rules for the acceptance of attribute "scopes" based on SAML metadata
  • blocking self asserted personal identification data from known "open" IdPs
  • limiting custom attributes intended to be used by only a single IdP

While there are no specifically "mandated" points at which filters run, the SP generally invokes filtering immediately prior to the caching of a set of attributes into a user's session. Actually performing the filtering process is typically up to an AssertionConsumerService handler (in the case of attributes delivered during SSO) or an AttributeResolver.

Types

TypeDescription
XMLThe only type included with the software, implements an XML-based rule syntax for filtering rules that is a derivation of the original filtering syntax from the Shibboleth IdP software

Reference

Common Attributes

All <AttributeFilter> plugins support the following attributes:

NameTypeReq?Description

type

stringY

Specifies the type of AttributeFilter plugin to use

  • No labels