The Shibboleth V2 IdP and SP software have reached End of Life and are no longer supported. This documentation is available for historical purposes only. See the IDP v4 and SP v3 wiki spaces for current documentation on the supported versions.

NativeSPAccountChecking

User Account Checking Using a (persistent) NameID

Besides being a unique identifier attribute that has many good properties (opaque, revocable, targeted), the persistent Name Identifier can also be used for account checking.

The Problem

To illustrate this, consider an e-learning platform that is used by thousands of Shibboleth users from many different organizations. For each user the platform will most likely allocate an internal account that is created using a Shibboleth identifier attribute or NameID as well as any common Shibboleth attribute like given name, surname, mail etc. Also assume that this platform has been used for quite some years. It then is clear that the total number of internal accounts will be growing constantly. In fact it may be the case that accounts never will be deleted because the administrators of this platform cannot know which accounts and related data on their e-learning platform can be deleted. Even if the administrators have a last login timestamp of an account, they cannot be sure that the person that owns this account never will log in again on their platform. Whether such accounts (and related data) can be deleted is not trivial to find out.

The Solution

In order to determine whether an internal account of the above-mentioned e-learning platform or another service can be deleted, the administrator first must know whether the user behind that account still has an account at his home organization. This could be easily checked if the administrator could force the users in question to authenticate again and access the platform. This however requires user interaction that cannot be enforced and probablay wouldn't be very reliable anyway.

However, assuming the administrator knows the NameID of his users and assuming this NameID is persistent, the administrator can relatively easy determine whether an account still exists for a user at his home organization. The basic principle here is to do an attribute request and ask the user's home organization for his attributes as if the user just had accessed the platform. If the user's account still exists the attribute request will return the user's attributes that this SP is allowed to receive. Based on these attributes the administrator or a script then can define a condition that must be met in order to assume that an account still exists.

The Service Provider 2.x already comes with a handy tool called resolvertest that can be used to do the attribute query. All that is needed then in order to find out whether a user's account still is active is the user's persistent NameID. The above-mentioned condition that should be met will  most likely be something of the sort 'If the user's eduPersonPrincipal or mail attribute is returned, his account probably still exists'. Of course it must be made sure that the Service Provider which does the attribute request would receive the eduPersonPrincipal or mail attribute for a user because the Identity Provider will only return attributes that this SP is allowed to receive according to rules in the attribute-filter.xml.

An Example Script

Below you find a script that can be used to check whether a user's account still exists at his home organization (Identity Provider). Read the code or execute

$ ./AccountChecker.sh -h

for details on how to use it:

Save in a file AccountChecker.sh and chmod +x AccountChecker.sh
#!/bin/sh 
#set -x
################################################################################
DESCRIPTION="
This shell script will check whether a user account identified by
a SAML2 NameID exists at a given Identity Provider.

accountChecking.sh -h     Print these instructions
                   -w     Print instructions for setuid wrapper script
                   -v     Enable verbose mode
                   -s     Enable silent mode and just output status code
                   -i     NameID value to check 
                   -f     File containing NameIDs to check

accountChecking.sh -h
accountChecking.sh -w
accountChecking.sh [-v] [-s] -i <NameID>
accountChecking.sh [-v] [-s] -f <file>

The script will do an attribute query using a provided NameID and the
resolvertest binary that comes with every Shibboleth Service Provider.
If the Identity Provider then returns at least one of the personal 
attributes that can be configured below, the script assumes that 
the account still exists.

In order to execute the script, it must be copied to a host where 
a Shibboleth Service Provider (SP) 2.x is installed because it requires
the resolvertest binary that comes bundled with the SP. The script has to
be called as user that is able to read the private key that is used
by the Service Provider. Otherwise, resolvertest will output errors saying
it cannot read the private key.

The script can be executed with a NameID or a file as an argument.
If the value that is provided to the script does not consist of the tripel 
'SP!IdP!NameID', the entityID of the default application of this SP is used
as well as a default IdP that can be configured in this script.

When called with the -i option the script returns the following status codes:
    0     If account probably doesn't exist anymore
    1     If account still exists
  255     If an error occured

If the script is called with a file as argument (-f), it assumes that each line
of the file consists either of a NameID or the tripel 'SP!IdP!NameID'. It then 
will check each NameID and create a comma separated copy of the given file with 
the suffix '.result.csv'. This new file contains an additonal column where 
the numbers stand for the above-mentioned status codes.

Status: Beta
Version: 20091102
Authors: lukas.haemmerle@switch.ch
"
################################################################################

### CONFIG SECTION START ###
# Path to Service Provider's resolvertest binary
RESOLVERTEST=/usr/bin/resolvertest

# NameID format to use
FORMAT=urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

# Default IdP to use if IdP is not provided as argument
IDP=https://aai-logon.vho-switchaai.ch/idp/shibboleth

# Personal attributes to check as proof of account's existence
# The following values should correspond to the IDs or aliases of attribute
# definitions in Shibboleth's attribute-map.xml file
ATTRIBUTES=( eppn 
uniqueID Shib-SwissEP-UniqueID 
mail Shib-InetOrgPerson-mail 
givenName Shib-InetOrgPerson-givenName
surname Shib-Person-surname 
Shib-SwissEP-DateOfBirth dateOfBirth 
employeeNumber Shib-InetOrgPerson-employeeNumber)
### CONFIG SECTION END ###

################################################################################

SCRIPTPATH="`pwd`/$(basename $0)"
WRAPPERDESCRIPTION="
Account Checking SETUID Wrapper Script:

###############################################################################
USE THIS AT YOUR OWN RISK AND BE AWARE THAT FOLLOWING THESE INSTRUCTIONS
COULD RESULT IN POTENTIAL SECURITY HOLES!
###############################################################################

It might be that you have to run the script as root user in order to allow 
access to the Service Provider's private key. If this is the case, you could 
use the following procedure:

1. Create a file called runAccountCheckingScript.c with this content: 
-----------------------8<-----------------------------
#include <unistd.h>
#include <errno.h>

main(int argc, char** argv)
{
        if( setgid(getegid()) ) perror( \"setgid\" );
        if( setuid(geteuid()) ) perror( \"setuid\" );
        execv(\"$SCRIPTPATH\", argv);
        return errno;
}
-----------------------8<-----------------------------

2. Compile the C file with:
   $ gcc runAccountCheckingScript.c -o runAccountCheckingScript

3. Change owner of binary to root user:
   $ chown root:root runAccountCheckingScript

4. Set the setuid bit with:
   $ chmod 4755 runAccountCheckingScript

Now any user can exeucte runAccountCheckingScript as root user who
can read the Service Provider's private key. 
"

# Reset IFS for security
IFS=$' \t\n'

# Prevent all sorts of alias trickery
unset -f unalias
\unalias -a 
unset -f command

# Reset path variables for security
path=/bin:/usr/bin


#-------------------------------------------------------------------------------
# Checks whether attributes are returned for NameID
parseNameID(){
	
	#Filter any suspicous characters	
	TLINE=`/bin/echo "$1" | sed 's/[$;]//g'`

	# Parse complete NameID
	NAMEIDP1=`/bin/echo "$TLINE" | cut -d! -f1`
	NAMEIDP2=`/bin/echo "$TLINE" | cut -d! -f2`
	NAMEIDP3=`/bin/echo "$TLINE" | cut -d! -f3`
	
	# Check if we got the full NameID
	if [ "$NAMEIDP1" != "$NAMEIDP3" ] ; then
		ID=$NAMEIDP3
		IDP=$NAMEIDP1
	else 
		ID=$NAMEIDP1
	fi
	
	if [ $VERBOSE -eq 1 -a $ID ] ; then
		/bin/echo "Checking NameID: $ID against Identity Provider: $IDP"
	fi
	
	(CheckNameID "$ID" "$IDP")

	RETURNCODE=$?	

	if [ $SILENT -eq 1 ] ; then
		/bin/echo $RETURNCODE
	fi

	return $RETURNCODE
}

#-------------------------------------------------------------------------------

# Checks whether attributes are returned for NameID
CheckNameID(){
	TID=$1
	TIDP=$2
	
	RESULT="`\
$RESOLVERTEST \
-saml2 \
-f $FORMAT \
-n $TID \
-i $TIDP \
`"
	
	ERRORS="`/bin/echo \"$RESULT\" | /bin/grep ERROR`"
	
	if [ "$ERRORS" != "" -a "$NAMEID" != "" -a $SILENT -eq 0 ] ; then
		/bin/echo "Erorr occured:"
		/bin/echo "$ERRORS"
		return 255
	elif [ "$ERRORS" != "" ] ; then
		return 255
	fi
	
	for name in ${ATTRIBUTES[@]}
	do
		FOUND="`/bin/echo \"$RESULT\" | /bin/grep \"[^ID: $name:|^$name: ]\"`"
		if [ "$FOUND" != "" ] ; then
			if [ $VERBOSE -eq 1 ] ; then
				/bin/echo "Found personal attribute $name -> User account with NameID $TID still exists";
			fi
		return 1
	fi
	done
	
	if [ $VERBOSE -eq 1 ] ; then
		/bin/echo  "No personal attributes found for user account with NameID $TID -> User account probably doesn't exist anymore"
	fi
	return 0
}

#-------------------------------------------------------------------------------

# Init some variables
VERBOSE=0;
SILENT=0;

# Parse arguments
while getopts hvswf:i: c
do
	case $c in
		v) VERBOSE=1;;
		s) SILENT=1;;
		f) FILE=$OPTARG;;
		i) NAMEID=$OPTARG;;
		w) /bin/echo "$WRAPPERDESCRIPTION"
		exit 0;;
		h)
		/bin/echo "$0 [-h] [-v] -i persistentID"
		/bin/echo "$0 [-h] [-v] -f file"
		/bin/echo "$DESCRIPTION"
		exit 0;;
		[?]) 
		/bin/echo "$0 [-h] [-v] -i persistentID"
		/bin/echo "$0 [-h] [-v] -f file"
		/bin/echo "$DESCRIPTION"
		exit 255;;
	esac
done

if [ "$FILE" == "" -a "$NAMEID" == "" ] ; then
	/bin/echo "You must provide at least the options -i or -f"
	exit 1
fi

if [ "$FILE" != "" -a "$NAMEID" != "" ] ; then
	/bin/echo "You can only use -i or -f as options!"
	exit 1
fi

# Parse file
if [ "$FILE" != "" ] ; then
	if [ ! -f $FILE  ] ; then
		/bin/echo "File $FILE doesn't exist!"
		exit 1
	fi 
	
	if [ $VERBOSE -eq 1 -a $FILE ] ; then
		/bin/echo "Parsing file: $FILE"
	fi
	
	RESULTFILE="$FILE.result.csv"
	/bin/echo "#NAMEID,#RESULT" > $RESULTFILE
	while read LINE ;do
		(parseNameID "$LINE")
		/bin/echo "$LINE,$?" >> $RESULTFILE
	done < $FILE
	exit 0;

elif [ "$NAMEID" != "" ] ; then
	# Parse single NameID
	(parseNameID "$NAMEID")
	exit $?

else
	/bin/echo "Something unexpected happened  :-("
	exit 255
fi

#-------------------------------------------------------------------------------

You will of course need a *NIX operating system to execute the script. The script assumes that tools like grep and cut are available as well as the resolvertest binary, which comes with the Service Provider 2.x. All of these binaries should be in the search path of the shell script.