Beth Miller <
beth.mill...@gmail.com> [2024-06-21 00:01 CEST]:
> I tried adding the following authproc but to no avail.
>
> 'authproc' => array(
> 1 => array(
> 'class' => 'saml:PersistentNameID',
> 'attribute' => 'employeeid',
> ),
> 2 => array(
> 'class' => 'saml:AttributeNameID',
> 'attribute' => 'employeeid',
> 'Format' =>
> 'urn:oasis:names:tc:SAML:2.0:nameid-format:persistent',
> ),
> ),
The above does not look like the examples from the documentation:
https://simplesamlphp.org/docs/stable/saml/nameid.html
There both saml:AttributeNameID and saml:PersistentNameID are
documented to use a parameter called 'identifyingAttribute' which you
don't have above. So try that instead of the 'attribute' parameter.
Also, saml:PersistentNameID is documented to "hash [the value] with
the secretsalt from config.php" so that will never give you the result
needed for your use-case (even if your use-case is probably in
violation of the SAML specification in this regard[1]).
I.e., don't use saml:PersistentNameID for this, only use
saml:AttributeNameID.
-peter
[1] Persistent name identifiers generated by identity providers MUST
be constructed using values that have no discernible correspondence
with the subject's actual identity (for example, username).
[...]
The intent is to create a non- public, pair-wise pseudonym to prevent
the discovery of the subject's identity or activities