Applications tags

Scenario

If you want to conditionally control which parts of your configuration an application can access, you can use application tags.

When a SAML Service Provider (SP) or OIDC Relying Party (RP) connects to Fortified ID Access, acting as a SAML Identity Provider (IdP) or OIDC OpenID Provider (OP), the system can use data provided by the authenticator to determine which configuration elements should be available. For example, this can be based on the application's entityID.

In addition, you can use application tags defined in the application's configuration object to influence behavior. Each SAML or OIDC application has a corresponding application object in Fortified ID Access, where settings such as the metadata path or URL are stored. You can assign one or more tags to this object, and these tags can then be used to apply conditional logic within your configuration.

How it works

When an application connects to Fortified ID Access, the system first checks the corresponding application object for any configured application tags.

For example, if the application has two application tags — swedish_bankid and freja_eid — these application tags are added to the authentication session created for that application and user about to authenticate.

Fortified ID Access has several ways in which it can affect the authentication experience for a user based on conditions. Suppose your Identity Provider (IdP) has several authenticators configured, each associated with a specific tag such as swedish_bankid, freja_eid, uid_password, foreign_id, or yubikey.

In this scenario, only the authenticators that match the application’s tags — in this case, Swedish BankID and Freja eID — will be available for the user to select during login.

More information

Configure application tags for a SAML profile

In Access documentation under MODULES, click SAML -> SAML Profile. Look for app_tag.

Configure application tags for a SAML application

In Access documentation under MODULES, click SAML -> SAML application. Look for app_tag.

Configure application tags for a OIDC Relying Party

In Access documentation under MODULES, click OIDC -> Relying Party. Look for app_tag.

Using application tags with conditional access and authenticators (exec_if)

Click following link

Using application tags with conditional access and selector (include_expr)

Click following link

Last updated