Hi everybody,
I am making some progress in building an Apereo CAS demo server with
delegated authentication with SAML2 (for integrating with italian SPID
system).
I am testing against a test IDP instance. I have been able to
generate a compliant SP metadata file (although with some manual
editing).
Now the test IDP instance is complaining about the
SAML AuthnRequest that is receiving from my delegated CAS.
In particular, the AuthnRequest lacks these two keys:
AuthnRequest/NameIDPolicy required key not provided
AuthnRequest/RequestedAuthnContext required key not provided
For reference, the keys should look like this:
<saml2p:NameIDPolicy AllowCreate="false" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient"/>
<saml2p:RequestedAuthnContext Comparison="exact">
<saml2:AuthnContextClassRef xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef>
<saml2:AuthnContextClassRef xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">urn:oasis:names:tc:SAML:2.0:ac:classes:SecureRemotePassword</saml2:AuthnContextClassRef>
<saml2:AuthnContextClassRef xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">urn:oasis:names:tc:SAML:2.0:ac:classes:Smartcard</saml2:AuthnContextClassRef>
</saml2p:RequestedAuthnContext>
How can I configure the server to include "NameIDPolicy" and
"RequestedAuthnContext" keys in the request?
Thanks and regards,
Giacomo