Scott Koranda
Scott Koranda
Not all attribute names are globally unique, especially when integrating with cloud/vendor SPs. When the format is basic or unspecified SATOSA still needs to be able to take internal attributes...
It is not always an option to just send additional attributes in the SAML assertion to an SP. This breaks some vendor/cloud SP SAML stacks. SATOSA needs to be capable...
_"whether we should scope the mapping under an entity or, if we can consider the proxy and all its connections a "deployment" that treats the same Attribute NameFormat&Name the same...
First, regarding signaling, it is important to note that many vendor/cloud SPs do not provide any SAML metadata for integration, nor do they indicate attribute requirements in the AuthnRequest. The...
I tested this PR against v8.0.1 and found no issues. Thank you for this nice commit. I have two simple requests for changes: 1. There is a typo, can you...
@shaardie I talked with the group about this PR and also the other PRs you submitted around the LDAP attribute microservice and after new tests have been added to the...
I think it would be good to fix it in both places. I have the ldap_attribute_store.py code open now and can easily fix this.
Here is a use case where allowing discovery initiated SAMLBackend flows remains important. Users do bookmark the discovery service (at the time they do it, it includes the return URL...
It still persists. Please leave this issue open. Thanks.
I tested this PR rebased onto v8.0.1 and found no issues. Thank you for this nice commit.