Use Cases
HomeIntegrityControlManagement CenterSolutions
  • Get Started
  • Integrity | Access
    • Auth. methods
      • LDAP (Username/Password)
      • LDAP (Username/Password) + OTP (SMTP)
      • LDAP (Username/Password) + OTP (SMS)
      • Swedish BankID
      • Microsoft Entra ID (SAMLSPBroker)
      • Foregin eID (SAMLSPBroker)
    • Auth. methods (SAML)
      • One-Time Password (OATH)
      • Inera IdP (SITHS) (SAMLSPBroker)
      • ID-porten (Norway) (SAML IdP with OIDC RP)
      • Multiple SAML IdP's configured
        • Multiple JSON files
    • Auth. methods (OIDC)
      • Static values (OIDC) - Test only
      • Swedish BankID (OIDC)
      • UID/PWD (OIDC)
    • Auth. methods (MISC)
      • Selector filtering
      • AuthZ control
      • External links and Cancel location
    • Add a Federation or SAML SP
  • Integrity | Portal
    • Portal
  • Integrity | Enrollment
    • Software token (OATH)
    • Best practice configuration
  • Integrity | Radius
    • UID/OATH token
    • UID/Password/OATH token
    • UID/Password/SMTP
  • Integrity | API
    • Swedish Siths eID
    • Oath Token
  • Control | Applications
    • Password Reset
    • Password Reset for Entra ID
    • Password Reset for Google Workspace
  • OPERATION
    • Rolling upgrade - cluster
  • TROUBLESHOOTING
    • Wrong relaystate
  • Misc
    • Address configuration externally
    • ADFS
      • Protect Fortified ID apps
      • Install and configure Fortified ID ADFS adapter for Siths eID
      • Install and configure Fortified ID ADFS adapter for Oath
    • AWS
      • Protect AWS Cognito with eID MFA
      • Protect AWS IAM Identity Center with eID MFA
    • Customization
      • Overlay - WEB
      • Overlay - Portal
      • Overlay - Password Reset
      • Overlay - Enrollment
      • Logout page
    • Dependency-Track - protect with eID MFA and SSO
    • Digitala Nationella Prov (DNP) / Skolfederation
      • Active Directory Federation Services (ADFS) with BankID as step-up-method
      • Active Directory / LDAP with BankID as step-up-method
      • Entra ID (Azure AD) with BankID as step-up-method
      • Google with BankID as step-up-method
      • Generate eduPersonPrincipalName (eppn) and store in Google
      • Generate eduPersonPrincipalName (eppn) and store in Entra ID
      • Common configuration
    • Encrypt configuration secrets
    • Microsoft Entra
      • Protect Entra ID (Azure AD) with eID MFA
      • Entra External - Support for eID (SAML)
      • Entra External - Support for eID (OIDC)
    • Expressions
    • Google
      • Common configuration for Google Workspace - Directory API
      • Common configuration for Google Workspace - authentication for Fortified ID products
      • Delegated administration for Google Workspace - teacher updates student guardians
      • Delegated administration for Google Workspace - teacher updates student password
      • Protect Google Workspace with eID MFA
    • HTTPS
    • Protect sensitive data, such as social security numbers, through obfuscation
    • Reverse proxy
      • Install Apache Web Server on Windows
      • Add SSL certificate and enable https
      • Add a Fortified ID virtual host
    • Set AuthnContextClassRef
    • Wiki.js - OpenID Connect (OIDC)
Powered by GitBook
On this page
  • Background
  • Configuration
  • Exporting the value
  • Configure SAML IdP authenticator
  • Common values to use as AuthnContextClassRef
  1. Misc

Set AuthnContextClassRef

The SAML IdP will use urn:oasis:names:tc:SAML:2.0:ac:classes:Password as the default value for AuthnContextClassRef. This guide will tell you how to change this to another value.

Background

The AuthnContextClassRef has to be configured manually as all authentication methods are separated from the federation protocol.

Configuration

The configurations has to be done in two steps.

  1. Export the value to be used from the autenticator.

  2. Configure the SAML IdP authenticator to use the exported property.

Exporting the value

The example below exports AuthnContextClassRef


{
"id": "otp",
"type": "OTPValidator",
"config": {
		"base_path": "/saml/authn",
		"context_path": "/saml/authn/otp",
		"pipe_id": "otp_validation_pipe",
		"webroot_dir": "web/authenticator/otp_validation",
		   "exports": [
			{
				"name": "AuthnContextClassRef",
				"value": "urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorContract"
			}		
		]
	}
}

Configure SAML IdP authenticator

The example below includes configuration to use the value from AuthnContextClassRef in auth_context_parameter.

{
    "id": "auth00",
    "type": "SAMLIDP",
    "config": {
        "context_path": "/saml/authn/chain",
        "base_path": "/saml/authn",
        "force_re_auth": false,
        "idp": "myidp1",
        "chain": [
            {
                "id": "otp",
                "required": true
            }
        ],
        "assertion_config": [
            {
                "target_sp": [
                    "*"
                ],
                "nameid_paramter": "mail",
                "auth_context_parameter": "AuthnContextClassRef",
                "additional_attribute_parameter": [
                    "givenName"
                ],
                "pre_assertion_pipe": "pre_pipe"
            }
        ]
    }
}

Common values to use as AuthnContextClassRef

Usage
Value

Username & Password (unprotected)

urn:oasis:names:tc:SAML:2.0:ac:classes:Password

Username & Password (protected)

urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport

Username, Password and OTP

urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorContract

Certificate

urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient

BankID

urn:oasis:names:tc:SAML:2.0:ac:classes:XMLDSig

PreviousAdd a Fortified ID virtual hostNextWiki.js - OpenID Connect (OIDC)

Last updated 2 years ago

Please look at . Example values below:

https://docs.oasis-open.org/security/saml/v2.0/saml-authn-context-2.0-os.pdf