Claims - WS Federation Protocol
Attribute filtering and release policies are defined per relying party. See this guide for more info.
The following standard claims are supported by CAS for release:
Claim | Description |
---|---|
EMAIL_ADDRESS_2005 |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
EMAIL_ADDRESS |
http://schemas.xmlsoap.org/claims/EmailAddress |
GIVEN_NAME |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
NAME |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
USER_PRINCIPAL_NAME_2005 |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn |
USER_PRINCIPAL_NAME |
http://schemas.xmlsoap.org/claims/UPN |
COMMON_NAME |
http://schemas.xmlsoap.org/claims/CommonName |
GROUP |
http://schemas.xmlsoap.org/claims/Group |
MS_ROLE |
http://schemas.microsoft.com/ws/2008/06/identity/claims/role |
ROLE |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role |
SURNAME |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
PRIVATE_ID |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier |
NAME_IDENTIFIER |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier |
AUTHENTICATION_METHOD |
http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod |
DENY_ONLY_GROUP_SID |
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid |
DENY_ONLY_PRIMARY_SID |
http://schemas.microsoft.com/ws/2008/06/identity/claims/denyonlyprimarysid |
DENY_ONLY_PRIMARY_GROUP_SID |
http://schemas.microsoft.com/ws/2008/06/identity/claims/denyonlyprimarygroupsid |
GROUP_SID |
http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid |
PRIMARY_GROUP_SID |
http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid |
PRIMARY_SID |
http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid |
WINDOWS_ACCOUNT_NAME |
http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname |
PUID |
http://schemas.xmlsoap.org/claims/PUID |
The attribute release policy assigned to relying parties and services is able to link a given standard claim and map it to an attribute that should be already available. The configuration looks as such:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
{
"@class" : "org.apereo.cas.ws.idp.services.WSFederationRegisteredService",
"serviceId" : "https://wsfed.example.org/.+",
"realm" : "urn:wsfed:example:org:sampleapplication",
"name" : "WSFED",
"id" : 1,
"attributeReleasePolicy" : {
"@class" : "org.apereo.cas.ws.idp.services.WSFederationClaimsReleasePolicy",
"allowedAttributes" : {
"@class" : "java.util.TreeMap",
"GIVEN_NAME" : "givenName"
}
}
}
The above snippet allows CAS to release the
claim http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
whose value
is identified by the value of the givenName
attribute that is already retrieved for the authenticated principal.
Attributes authorized and allowed for release by this policy may not necessarily be available as resolved principal attributes and can be resolved on the fly dynamically using the attribute definition store.
Inline Groovy Claims
Claims may produce their values from an inline Groovy
script. As an example, the claim EMAIL_ADDRESS_2005
may be constructed
as a dynamic attribute whose value is determined by the inline Groovy script attribute and the cn
attribute:
1
2
3
4
5
6
7
8
9
10
11
12
13
{
"@class" : "org.apereo.cas.services.CasRegisteredService",
"serviceId" : "sample",
"name" : "sample",
"id" : 300,
"attributeReleasePolicy" : {
"@class" : "org.apereo.cas.ws.idp.services.WSFederationClaimsReleasePolicy",
"allowedAttributes" : {
"@class" : "java.util.TreeMap",
"EMAIL_ADDRESS_2005" : "groovy { return attributes['cn'].get(0) + '@example.org' }"
}
}
}
File-based Groovy Claims
Claims may produce their values from an external Groovy
script. As an example, the claim EMAIL_ADDRESS_2005
may be constructed
as a dynamic attribute whose value is determined by the Groovy script attribute and the cn
attribute:
1
2
3
4
5
6
7
8
9
10
11
12
13
{
"@class" : "org.apereo.cas.services.CasRegisteredService",
"serviceId" : "sample",
"name" : "sample",
"id" : 300,
"attributeReleasePolicy" : {
"@class" : "org.apereo.cas.ws.idp.services.WSFederationClaimsReleasePolicy",
"allowedAttributes" : {
"@class" : "java.util.TreeMap",
"EMAIL_ADDRESS_2005" : "file:/path/to/script.groovy"
}
}
}
The configuration of this component qualifies to use the Spring Expression Language syntax. The script itself may have the following outline:
1
2
3
4
5
6
def run(final Object... args) {
def (attributes,logger) = args
logger.info "Attributes currently resolved: ${attributes}"
return [attributes["cn"][0] + "@example.org"]
}
Custom Claims
You may also decide to release non-standard claims as part of a custom
namespace. For example, the below snippet allows CAS to release the
claim https://github.com/apereo/cas/employeeNumber
whose value is
identified by the value of the personSecurityId
attribute that is
already retrieved for the authenticated principal.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
{
"@class" : "org.apereo.cas.ws.idp.services.WSFederationRegisteredService",
"serviceId" : "https://wsfed.example.org/.+",
"realm" : "urn:wsfed:example:org:sampleapplication",
"name" : "WSFED",
"id" : 1,
"attributeReleasePolicy" : {
"@class" : "org.apereo.cas.ws.idp.services.CustomNamespaceWSFederationClaimsReleasePolicy",
"namespace": "https://github.com/apereo/cas",
"allowedAttributes" : {
"@class" : "java.util.TreeMap",
"employeeNumber" : "personSecurityId"
}
}
}
Attributes authorized and allowed for release by this policy may not necessarily be available as resolved principal attributes and can be resolved on the fly dynamically using the attribute definition store.