Skip to content

AttributeFilterConfiguration

Scott Cantor edited this page Feb 16, 2021 · 29 revisions

For basic attribute filtering you should refer to Shibboleth IdP 3 AttributeFilterConfiguration. Here we document the additional policy rules and matchers provided by shibboleth oidc extension. Please note that you do not need to use oidc specific policy rules or matchers to release claims to relying party, they really are only a addition to existing toolset.

You should note that there are few special claims/attributes that are always returned regardless off attribute filtering, Special Claims.

The topic of Splitting Claims is documented for more advanced use cases.

OIDC extension RuleTypes for AttributeFilterPolicyConfiguration

Example

The first example releases a attribute to all openid connect relying parties (and only for those).

The second example releases attributes to a specific openid connect relying party if scope value info is set to request.

<AttributeFilterPolicy id="ALL_OPENID_CLIENTS">
    <PolicyRequirementRule xsi:type="oidcext:OIDCScope" value="openid" />
    <AttributeRule attributeID="eduPersonPrincipalName">
        <PermitValueRule xsi:type="ANY" />
    </AttributeRule>
</AttributeFilterPolicy>

<AttributeFilterPolicy id="DEMO_RP_SCOPE_INFO">
    <PolicyRequirementRule xsi:type="AND">
        <Rule xsi:type="Requester" value="demo_rp" />
        <Rule xsi:type="oidcext:OIDCScope" value="info" />
    </PolicyRequirementRule>
    <AttributeRule attributeID="eduPersonAffiliation">
        <PermitValueRule xsi:type="ANY" />
    </AttributeRule>
    <AttributeRule attributeID="mail">
        <PermitValueRule xsi:type="ANY" />
    </AttributeRule>
</AttributeFilterPolicy>

(Migrated)