'authproc.idp' => array(
10 => array(
'class' => 'core:AttributeAdd',
'https://aws.amazon.com/SAML/Attributes/Role' => array('arn:aws:iam::<account>:role/<role>,arn:aws:iam::<account>:saml-provider/<default-user>’)
),
20 => array(
'class' => 'core:AttributeMap',
'uid' => 'https://aws.amazon.com/SAML/Attributes/RoleSessionName',
45 => array(
'class' => 'core:StatisticsWithAttribute',
'attributename' => 'realm',
'type' => 'saml20-idp-SSO',
),
50 => array(
'class' => 'ldap:AttributeAddUsersGroups',
'authsource' => ‘example-ldap',
),
51 => array(
'class' => 'authorize:Authorize',
'regex' => FALSE,
'groups' => array('cn=default-group,dc=example,dc=com',
'cn=admins,dc=example,dc=com',
'cn=operators,dc=ecample,dc=com'),
),
/* Map group membership to predefined IAM roles/users
*/
60 => array(
'class' => 'core:AttributeAlter',
'subject' => 'groups',
'pattern' => '/cn=admins,/‘,
'replacement' => 'arn:aws:iam::<account>:role/<role>,arn:aws:iam::<account>:saml-provider/<admin-user>’,
'target' => 'https://aws.amazon.com/SAML/Attributes/Role',
'%replace',
),
61 => array(
'class' => 'core:AttributeAlter',
'subject' => 'groups',
'pattern' => '/cn=operators,/‘,
'replacement' => 'arn:aws:iam::<account>:role/<role>,arn:aws:iam::<account>:saml-provider/<operator-user>’,
'target' => 'https://aws.amazon.com/SAML/Attributes/Role',
'%replace',
),
),
// this filter should be the last one!
99 => 'core:AttributeLimit',
),
$groups = array(); byBeware that AttributeAddUsersGroups filter works only with RFC2307bis ldap schema (objectClass=groupOfNames) and does not support `posixGroup` or `groupOfUniqueNames`, also `memberOf` overlay should be enabled.$groups = $memberof;