Skip to content
This repository was archived by the owner on Oct 6, 2020. It is now read-only.

Proof of Concept

Okke Harsta edited this page Jun 6, 2016 · 4 revisions

The Attribute Mapper in the PoC setup requires configuration and additional services deployed before a successful demo is possible.

Required components / services

The following services need to be deployed and configured correctly in the service registry:

  • EngineBlock 5.x branch with attribute aggregation feature
  • Attribute Aggregation
  • PDP Authz
  • eduProxy SP
  • iDIN IdP
  • Attribute Mapper

Configuration of the eduProxy SP in the service registry

Ensure the eduProxy SP is configured for attribute aggregation and authorization policy enforcement by enabling the following checks in service registry:

  • coin:attribute_aggregation_required
  • coin:policy_enforcement_decision_required

Ensure the eduProxy SP can only access the iDIN IdP and vice versa.

Attribute Aggregation

Add an attribute aggregation for the eduProxy SP and at a minimal add the iDIN Attribute Authority with all attributes.

PDP Authorization

Add a PDP Policy Authorization for the eduProxy and iDIN IdP that requires the attribute urn:mace:dir:attribute-def:isMemberOf with value surf.nl to be present. Use the default Permit setting and add the https://attribute-mapper.test2.surfconext.nl URL to the meaningful error description.

eduProxy

The eduProxy has a test endpoint that will trigger an SAML Authn request to the configured IdP (e.g. SURFconext). The aggregated email address is shown with all other SAML attributes.

Clone this wiki locally