...
SAML Attribute Representation
SAML Attribute Format
When attributes defined in this specification are used, the following requirements apply:
- The
<saml:Attribute>element represents an attribute in SAML 2.0. - The
NameFormatattribute MUST have the valueurn:oasis:names:tc:SAML:2.0:attrnameformat:uri. - The
Nameattribute MUST contain a URI as defined in this specification. Attribute names are expressed as URIs in the form of URLs. - The
FriendlyNameattribute is OPTIONAL. - The data type of the
<AttributeValue>element isxs:stringusing UTF-8 encoding, unless otherwise specified in the attribute definition table. The type MAY be explicitly declared usingxsi:type="xs:string". - Attributes marked as non-multi-valued MUST NOT contain more than one
<AttributeValue>element. - Attributes marked as multi-valued MAY contain multiple
<AttributeValue>elements. - String matching SHOULD be performed using the
caseIgnoreMatchrule as defined in X.520.
Scoped Attributes
A scoped attribute expresses its value as a string of the form value@scope, where the scope represents the Identity Provider's security domain.
The scope typically corresponds to the organization’s domain name, but is not limited to it, and MUST be declared in the Identity Provider's metadata (the <shibmd:Scope> element).
An Identity Provider that releases scoped attributes MUST be authorized to use the corresponding scope values. Such scopes MUST be registered with the federation and, upon approval by the federation operator, included in the Identity Provider's metadata.
A Relying Party consuming a scoped attribute SHOULD verify that the issuing IdP is authorized to assert the given scope. This verification is performed by checking the Identity Provider's metadata entry, as described in Section 2.1.4 Scope of the SAML WebSSO Technology Profile.
Example
The following example illustrates how attributes defined in this specification may be represented in a SAML 2.0 assertion issued by an Identity Provider.
...
The identifier MUST be constructed as a locally unique value followed by “@” and a scope (security domain). The scope typically corresponds to the organization’s domain name, but is not limited to it, and MUST be declared in the Identity Provider’s metadata (the <shibmd:Scope> element). The combination of identifier the locally unique value and scope uniquely identifies the subject within the federation.
...
The identifier MUST be constructed as a locally unique identifier followed by “@” and a scope (security domain). The scope typically corresponds to the organization’s domain name, but is not limited to it, and MUST be declared in the Identity Provider’s metadata (the <shibmd:Scope> element)..
| Name | https://openfed.se/attributes/pairwise-id |
|---|---|
| Friendly Name | pairwise-id |
| Data Type | xs:string |
| Multi-valued | NO |
| Scoped | YES |
| Reference | urn:oasis:names:tc:SAML:attribute:pairwise-id |
| Example | 9d666d80-c634-4f12-838b-c667de76762b@example.org |
...