-
Notifications
You must be signed in to change notification settings - Fork 10
Add Service Provider entity ID based filtering #30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Allow restricting authorization rules to specific SPs by adding spEntityIDs arrays to attribute configurations. Rules with spEntityIDs only apply when the current SP matches the allowed list, enabling fine-grained access control per service provider.
tvdijen
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me now! @monkeyiq would you mind going over this too?
Codecov Report❌ Patch coverage is Additional details and impacted files@@ Coverage Diff @@
## master #30 +/- ##
============================================
+ Coverage 63.56% 69.03% +5.46%
- Complexity 50 56 +6
============================================
Files 2 2
Lines 129 155 +26
============================================
+ Hits 82 107 +25
- Misses 47 48 +1 🚀 New features to boost your workflow:
|
|
I played around with |
|
I will give this another comb over in the morning. On first eyeballs it looks good. |
|
Just a thought, not for this PR, but for later discussion.. I think it would make sense to be able to make authproc-filters apply to specific entities, in addition to the already existing 'precondition'-feature.. |
|
@sitya I took the liberty to 1) throw Once @monkeyiq had his time to go over this once more I will merge and tag v1.7 |
|
Using |
|
@tvdijen feel free to merge and tag :) sorry about the delay. |
|
Tagged v1.7.0 - it will be included in the full build of SimpleSAMLphp 2.5.0 |
Allow restricting authorization rules to specific SPs by adding spEntityIDs arrays to attribute configurations. Rules with spEntityIDs only apply when the current SP matches the allowed list, enabling fine-grained access control per service provider.
Valid use-case: when our institution authenticates users who are allowed to access only a very few SPs, but they must be handled by the main IdP (e.g. users with library-walk-in affiliation). These improvements are relevant, if only you use Authorize module for your
authproc.idp. In this case the the users can access only for the listed SPs, not else (e.g. they cannot access any resource from the national federation).