diff --git a/attributealter/alterfunctions.php b/attributealter/alterfunctions.php
index 9f765c2fddef6b7f3ffa94084ff2525b99be5781..3e3ec46b299d3f98e53b06e5e801b1166a98b089 100644
--- a/attributealter/alterfunctions.php
+++ b/attributealter/alterfunctions.php
@@ -97,3 +97,11 @@ function attributealter_realm(&$attributes, $spentityid = null, $idpentityid = n
 
 }
 
+function attributealter_edupersontargetedid(&$attributes, $spEntityId = null, $idpEntityId = null) {
+	assert('$spEntityId !== NULL');
+	assert('$idpEntityId !== NULL');
+
+	$userid = SimpleSAML_Utilities::generateUserIdentifier($idpEntityId, $spEntityId, $attributes);
+
+	$attributes['eduPersonTargetedID'] = array($userid);
+}
diff --git a/config-templates/config.php b/config-templates/config.php
index a6bfd6a937c60ba7c61da9457e2432b34941acd6..2b80c424db377f1efa7bab315097d9670965eba7 100644
--- a/config-templates/config.php
+++ b/config-templates/config.php
@@ -55,6 +55,16 @@ $config = array (
 	'auth.adminpassword'		=> '123',
 	'admin.protectindexpage'	=> false,
 	'admin.protectmetadata'		=> false,
+
+	/**
+	 * This is a secret salt used by simpleSAMLphp when it needs to generate a secure hash
+	 * of a value. It must be changed from its default value to a secret value. The value of
+	 * 'secretsalt' can be any valid string of any length.
+	 *
+	 * A possible way to generate a random salt is by running the following command from a unix shell:
+	 * tr -c -d '0123456789abcdefghijklmnopqrstuvwxyz' </dev/urandom | dd bs=32 count=1 2>/dev/null;echo
+	 */
+	'secretsalt' => 'defaultsecretsalt',
 	
 	/*
 	 * Some information about the technical persons running this installation.
diff --git a/docs/source/simplesamlphp-idp.xml b/docs/source/simplesamlphp-idp.xml
index 288d561244644180dcd586513c1be688db9f0339..f62bb7d7e289a569a28bfe893174b59a12cf052e 100644
--- a/docs/source/simplesamlphp-idp.xml
+++ b/docs/source/simplesamlphp-idp.xml
@@ -371,6 +371,20 @@ openssl x509 -req -days 60 -in server2.csr -signkey server2.key -out server2.crt
               Features</emphasis> document.</para>
             </glossdef>
           </glossentry>
+
+          <glossentry>
+            <glossterm>userid.attribute</glossterm>
+
+            <glossdef>
+              <para>The attribute name of an attribute which uniquely
+              identifies the user. This attribute is used if simpleSAMLphp
+              needs to generate a persistent unique identifier for the
+              user. This option can be set in both the IdP-hosted and the
+              SP-remote metadata. The value in the sp-remote metadata has the
+              highest priority. The default value is
+              <literal>eduPersonPrincipalName</literal>.</para>
+            </glossdef>
+          </glossentry>
         </glosslist>
       </section>
 
@@ -605,6 +619,20 @@ openssl x509 -req -days 60 -in server2.csr -signkey server2.key -out server2.crt
               not specify a sharedkey.</para>
             </glossdef>
           </glossentry>
+
+          <glossentry>
+            <glossterm>userid.attribute</glossterm>
+
+            <glossdef>
+              <para>The attribute name of an attribute which uniquely
+              identifies the user. This attribute is used if simpleSAMLphp
+              needs to generate a persistent unique identifier for the
+              user. This option can be set in both the IdP-hosted and the
+              SP-remote metadata. The value in the sp-remote metadata has the
+              highest priority. The default value is
+              <literal>eduPersonPrincipalName</literal>.</para>
+            </glossdef>
+          </glossentry>
         </glosslist>
       </section>
     </section>
diff --git a/lib/SimpleSAML/Utilities.php b/lib/SimpleSAML/Utilities.php
index 7b9ec58168d1392d1d24f1682c8aafb0a4287639..3bacd2b58c70e37d2d27bf90caa9e2954eba6c52 100644
--- a/lib/SimpleSAML/Utilities.php
+++ b/lib/SimpleSAML/Utilities.php
@@ -3,6 +3,7 @@
 require_once((isset($SIMPLESAML_INCPREFIX)?$SIMPLESAML_INCPREFIX:'') . 'SimpleSAML/Configuration.php');
 require_once((isset($SIMPLESAML_INCPREFIX)?$SIMPLESAML_INCPREFIX:'') . 'SimpleSAML/XHTML/Template.php');
 require_once((isset($SIMPLESAML_INCPREFIX)?$SIMPLESAML_INCPREFIX:'') . 'SimpleSAML/Logger.php');
+require_once((isset($SIMPLESAML_INCPREFIX)?$SIMPLESAML_INCPREFIX:'') . 'SimpleSAML/Metadata/MetaDataStorageHandler.php');
 
 /**
  * Misc static functions that is used several places.in example parsing and id generation.
@@ -806,6 +807,70 @@ class SimpleSAML_Utilities {
 		}
 	}
 
+
+	/**
+	 * This function is used to generate a non-revesible unique identifier for a user.
+	 * The identifier should be persistent (unchanging) for a given SP-IdP federation.
+	 * The identifier can be shared between several different SPs connected to the same IdP, or it
+	 * can be unique for each SP.
+	 *
+	 * @param $idpEntityId  The entity id of the IdP.
+	 * @param $spEntityId   The entity id of the SP.
+	 * @param $attributes   The attributes of the user.
+	 * @return A non-reversible unique identifier for the user.
+	 */
+	public static function generateUserIdentifier($idpEntityId, $spEntityId, $attributes) {
+		$metadataHandler = SimpleSAML_Metadata_MetaDataStorageHandler::getMetadataHandler();
+		$idpMetadata = $metadataHandler->getMetaData($idpEntityId, 'saml20-idp-hosted');
+		$spMetadata = $metadataHandler->getMetaData($spEntityId, 'saml20-sp-remote');
+
+		if(array_key_exists('userid.attribute', $spMetadata)) {
+			$attributeName = $spMetadata['userid.attribute'];
+		} elseif(array_key_exists('userid.attribute', $idpMetadata)) {
+			$attributeName = $idpMetadata['userid.attribute'];
+		} else {
+			$attributeName = 'eduPersonPrincipalName';
+		}
+
+		if(!array_key_exists($attributeName, $attributes)) {
+			throw new Exception('Missing attribute "' . $attributeName . '" for user. Cannot' .
+			                    ' generate user id.');
+		}
+
+		$attributeValue = $attributes[$attributeName];
+		if(count($attributeValue) !== 1) {
+			throw new Exception('Attribute "' . $attributeName . '" for user did not contain exactly' .
+			                    ' one value. Cannot generate user id.');
+		}
+
+		$attributeValue = $attributeValue[0];
+		if(empty($attributeValue)) {
+			throw new Exception('Attribute "' . $attributeName . '" for user was empty. Cannot' .
+			                    ' generate user id.');
+		}
+
+
+		$secretSalt = SimpleSAML_Configuration::getInstance()->getValue('secretsalt');
+		if(empty($secretSalt)) {
+			throw new Exception('The "secretsalt" configuration option must be set before user' .
+			                    ' ids can be generated.');
+		}
+		if($secretSalt === 'defaultsecretsalt') {
+			throw new Exception('The "secretsalt" configuration option must be set to a secret' .
+			                    ' value.');
+		}
+
+		$uidData = 'uidhashbase' . $secretSalt;
+		$uidData .= strlen($idpEntityId) . ':' . $idpEntityId;
+		$uidData .= strlen($spEntityId) . ':' . $spEntityId;
+		$uidData .= strlen($attributeValue) . ':' . $attributeValue;
+		$uidData .= $secretSalt;
+
+		$userid = hash('sha1', $uidData);
+
+		return $userid;
+	}
+
 }
 
 ?>
\ No newline at end of file
diff --git a/metadata-templates/saml20-idp-hosted.php b/metadata-templates/saml20-idp-hosted.php
index d87cef831aa9b9c5cd4065a0bec06d6b41a67ad7..73ec7b00fae1afff873d85b8d176abada1d61e36 100644
--- a/metadata-templates/saml20-idp-hosted.php
+++ b/metadata-templates/saml20-idp-hosted.php
@@ -12,6 +12,7 @@
  *   - authority
  *
  * Optional Parameters:
+ *   - 'userid.attribute'
  *
  *
  * Request signing (optional paramters)
diff --git a/metadata-templates/saml20-sp-remote.php b/metadata-templates/saml20-sp-remote.php
index a3e47e257d0c5652217d02c3f2f110844a9a93c7..c9f6b88aedd23ad1978a162cf16b49d8bf2c5347 100644
--- a/metadata-templates/saml20-sp-remote.php
+++ b/metadata-templates/saml20-sp-remote.php
@@ -19,6 +19,7 @@
  *   - 'simplesaml.attributes'	=>	true,
  *   - 'attributemap'		=>	'test',
  *   - 'attributes'			=>	array('mail'),
+ *   - 'userid.attribute'
  *
  * Request signing
  *    When request.signing is true the certificate of the sp 
diff --git a/www/admin/metadata.php b/www/admin/metadata.php
index c690214458f5f251a20e286cca54ef2e8ec8b67a..0c7f982f965e49abf33382ae18326ae4c4b6437b 100644
--- a/www/admin/metadata.php
+++ b/www/admin/metadata.php
@@ -57,7 +57,7 @@ try {
 		foreach ($metalist AS $entityid => $mentry) {
 			$results[$entityid] = SimpleSAML_Utilities::checkAssocArrayRules($mentry,
 				array('entityid', 'host', 'privatekey', 'certificate', 'auth'),
-				array('requireconsent','request.signing', 'authority', 'attributemap', 'attributealter')
+				array('requireconsent','request.signing', 'authority', 'attributemap', 'attributealter', 'userid.attribute')
 			);
 		}
 		$et->data['metadata.saml20-idp-hosted'] = $results;
@@ -67,7 +67,7 @@ try {
 		foreach ($metalist AS $entityid => $mentry) {
 			$results[$entityid] = SimpleSAML_Utilities::checkAssocArrayRules($mentry,
 				array('entityid', 'AssertionConsumerService'),
-				array('SingleLogoutService', 'NameIDFormat', 'SPNameQualifier', 'base64attributes', 'simplesaml.nameidattribute', 'attributemap', 'attributealter', 'simplesaml.attributes', 'attributes', 'name', 'description','request.signing','certificate', 'ForceAuthn', 'sharedkey', 'assertion.encryption')
+				array('SingleLogoutService', 'NameIDFormat', 'SPNameQualifier', 'base64attributes', 'simplesaml.nameidattribute', 'attributemap', 'attributealter', 'simplesaml.attributes', 'attributes', 'name', 'description','request.signing','certificate', 'ForceAuthn', 'sharedkey', 'assertion.encryption', 'userid.attribute')
 			);
 		}
 		$et->data['metadata.saml20-sp-remote'] = $results;