From a65d662537e0c87cb735efb1202d5a8b233f2cd0 Mon Sep 17 00:00:00 2001 From: Olav Morken <olav.morken@uninett.no> Date: Thu, 16 Feb 2012 07:08:11 +0000 Subject: [PATCH] saml:ExpectedAuthnContextClassRef: Update documentation. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Thanks to Gyula SzabĂł for providing this patch. git-svn-id: https://simplesamlphp.googlecode.com/svn/trunk@3032 44740490-163a-0410-bde0-09ae8108e29a --- .../authproc_expectedauthncontextclassref.txt | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/modules/saml/docs/authproc_expectedauthncontextclassref.txt b/modules/saml/docs/authproc_expectedauthncontextclassref.txt index 609f29640..82c6e70d8 100644 --- a/modules/saml/docs/authproc_expectedauthncontextclassref.txt +++ b/modules/saml/docs/authproc_expectedauthncontextclassref.txt @@ -1,22 +1,22 @@ `saml:ExpectedAuthnContextClassRef` =================== -SP side attribute filter for validate AuthnContextClassRef. +SP side attribute filter to validate AuthnContextClassRef. -This filter check the AuthnContextClassRef in the authnentication response, and accept or deny the access depend on the strength of authentication. +This filter checks the AuthnContextClassRef in the authentication response, and accepts or denies the access depending on the provided strength measure of authentication from IdP. -You can list the accepted authentitcation context values in the Service Provider configuration. -If the given AuthnContextClassRef not match of any accepted value, the user redirected to the error page. It's useful to harmonize the SP's requested AuthnContextClassRef (another authproc filter)i, but you can accept more authentication strength level than what you requested. +You can list the accepted authentitcation context values in the Service Provider configuration file. +If the given AuthnContextClassRef does not match any accepted value, the user will be redirected to an error page. It's useful to harmonize the SP's requested AuthnContextClassRef (another authproc filter), but you can accept more authentication strength measures than you requested for. Examples -------- - 'authproc.sp' => array( - 91 => array( - 'class' => 'saml:ExpectedAuthnContextClassRef', - 'accepted' => array( - 'urn:oasis:names:tc:SAML:2.0:post:ac:classes:nist-800-63:3', - 'urn:oasis:names:tc:SAML:2.0:ac:classes:Password', + 'authproc.sp' => array( + 91 => array( + 'class' => 'saml:ExpectedAuthnContextClassRef', + 'accepted' => array( + 'urn:oasis:names:tc:SAML:2.0:post:ac:classes:nist-800-63:3', + 'urn:oasis:names:tc:SAML:2.0:ac:classes:Password', + ), ), ), - ), -- GitLab