You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to comply with a defined attribute set, the following attribute
162
162
requirements apply:
@@ -228,7 +228,7 @@ The “Organizational Identity for Natural Persons” attribute set provides bas
228
228
229
229
**Typical use**: In an attribute release policy that provides basic organizational identity information about a natural person.
230
230
231
-
The "Organizational Identity for Natural Persons" attribute set defines a minimum set of attributes needed to provide organizational identity information about a person. Should an attribute consumer require additional attributes, such as surname and given name, the personal identity number or an organizational unit name, this can be achieved by either requesting other attribute sets or by explicitly requesting individual attributes. See further section 6.2.1, “Attribute Release and Consuming Rules”, of “Deployment Profile for the Swedish eID Framework” (\[[EidDeployProf](#eiddeployprof)\]).
231
+
The "Organizational Identity for Natural Persons" attribute set defines a minimum set of attributes needed to provide organizational identity information about a person. Should an attribute consumer require additional attributes, such as surname and given name, the personal identity number or an organizational unit name, this can be achieved by either requesting other attribute sets or by explicitly requesting individual attributes. See further section 6.2.1, “Attribute Release and Consuming Rules”, of “Deployment Profile for the Swedish eID Framework” (\[[SC.SAML.Profile](#sc-saml-profile)\]).
232
232
233
233
> \[*\]: The `displayName` attribute MAY contain personal information such as the given name or surname, but it MAY also be used as an anonymized display name, for example, "Administrator 123". This is decided by the issuing organization.
234
234
@@ -374,9 +374,9 @@ Attributes with a “No” value in the column "Multi-valued" MUST NOT have more
374
374
375
375
Attributes with a "Yes" value in the column "Scoped" are scoped attributes. A scoped attribute expresses values in a string-valued attribute of the form `value@scope`, where `scope` takes the form of a domain name or something similar such as an organizational identifier.
376
376
377
-
An Identity Provider wishing to release scoped attributes must register the scopes with the federation operator. After the federation operator has authorized the Identity Provider for the given scopes, they are declared in the Identity Provider's metadata entry. See section 2.1.3.1 of \[[EidDeployProf](#eiddeployprof)\] for details.
377
+
An Identity Provider wishing to release scoped attributes must register the scopes with the federation operator. After the federation operator has authorized the Identity Provider for the given scopes, they are declared in the Identity Provider's metadata entry. See section 2.1.3.1 of \[[SC.SAML.Profile](#sc-saml-profile)\] for details.
378
378
379
-
A Service Provider consuming a scoped attribute SHOULD assert that the issuing Identity Provider is authorized to issue attributes with the given scope by checking the Identity Provider's metadata entry as described in section 6.2.1 of \[[EidDeployProf](#eiddeployprof)\].
379
+
A Service Provider consuming a scoped attribute SHOULD assert that the issuing Identity Provider is authorized to issue attributes with the given scope by checking the Identity Provider's metadata entry as described in section 6.2.1 of \[[SC.SAML.Profile](#sc-saml-profile)\].
380
380
381
381
**Note:** The `value` part of a scoped attribute MAY contain a `@`-character, for example when the value part is an email address, or a User Principal Name (UPN). Therefore, consumers of scoped attributes MUST use the last `@`-character as a delimiting character when splitting a scoped attribute into its `value` and `scope` parts.
382
382
@@ -435,7 +435,7 @@ process.
435
435
436
436
The `authServerSignature` may be included in assertions in cases where there are requirements to include a digitally signed proof from the authentication server at which the end user authenticated. This is mainly useful in cases where the SAML Identity Provider delegates end user authentication to a subordinate authentication server.
437
437
438
-
> \[*\]: Note that an authentication process, may be “authentication for signature” as specified in section 7 of \[[EidDeployProf](#eiddeployprof)\].
438
+
> \[*\]: Note that an authentication process, may be “authentication for signature” as specified in section 7 of \[[SC.SAML.Profile](#sc-saml-profile)\].
439
439
440
440
<aname="the-sad-attribute"></a>
441
441
#### 3.2.3. The sad Attribute
@@ -444,23 +444,23 @@ The `sad` attribute holds Signature Activation Data that is required by a
444
444
signature service in order to service a signature request in accordance
445
445
with CEN EN 419 241-2. The `sad` attribute holds a single string
446
446
attribute value. The format of the string value is defined in the "Signature Activation Protocol
447
-
for Federated Signing" specification \[[SigSAP](#sigsap)\].
447
+
for Federated Signing" specification \[[SC.SAP](#sc-sap)\].
448
448
449
449
<aname="the-signmessagedigest-attribute"></a>
450
450
#### 3.2.4. The signMessageDigest Attribute
451
451
452
452
The `signMessageDigest` attribute is included in an assertion as a proof that an Identity Provider displayed
453
453
a sign message for the user and that the user actively confirmed acceptance of this sign message. This sign
454
454
message is the `SignMessage` extension that may be included in an authentication request by Signature Service
455
-
Service Providers. See section 7 of \[[EidDeployProf](#eiddeployprof)\] for details.
455
+
Service Providers. See section 7 of \[[SC.SAML.Profile](#sc-saml-profile)\] for details.
456
456
457
457
The attribute value format for the `signMessageDigest` attribute is `digest-algorithm-identifier;sign-message-digest`, where
458
458
`digest-algorithm-identifier` is the XML Security algorithm URI identifier of the selected digest algorithm and
459
-
`sign-message-digest` is `base64(digest(msg))`. The `msg` is the UTF-8 encoded bytes of the sign message that was displayed. It equals the `csig:Message` element value of the `csig:SignMessage` (\[[DSSExt](#dssext)\]). Thus, if the `csig:Message` element is encrypted into a `csig:EncryptedMessage`, the element value after decryption should be used.
459
+
`sign-message-digest` is `base64(digest(msg))`. The `msg` is the UTF-8 encoded bytes of the sign message that was displayed. It equals the `csig:Message` element value of the `csig:SignMessage` (\[[SC.DSS.Ext](#dssext)\]). Thus, if the `csig:Message` element is encrypted into a `csig:EncryptedMessage`, the element value after decryption should be used.
460
460
461
461
Entities compliant with this specification MUST use `http://www.w3.org/2001/04/xmlenc#sha256` as the digest algorithm,
462
462
unless the recipient of the `signMessageDigest` attribute has declared another digest algorithm as preferred in its
463
-
metadata entry (see section 2.1.1.3 of [[EidDeployProf](#eiddeployprof)\]). In those cases this algorithm MAY be used.
463
+
metadata entry (see section 2.1.1.3 of [[SC.SAML.Profile](#sc-saml-profile)\]). In those cases this algorithm MAY be used.
464
464
465
465
**Example:**
466
466
@@ -496,7 +496,7 @@ This specification does not impose any specific requirements concerning the pers
496
496
497
497
**Note**: In the general case, an attribute consumer MUST NOT assume a particular format or meaning of the personal identifier part since different organizations may use different formats. An attribute consumer should also be aware that a personal identifier separated from its organizational identifier code can not be regarded as unique.
498
498
499
-
**Note**: The `orgAffiliation` is a [scoped attribute](#scoped-attributes) meaning that producing and consuming such an attribute MUST follow the rules given in sections 2.1.3.1 and 6.2.1 of \[[EidDeployProf](#eiddeployprof)\].
499
+
**Note**: The `orgAffiliation` is a [scoped attribute](#scoped-attributes) meaning that producing and consuming such an attribute MUST follow the rules given in sections 2.1.3.1 and 6.2.1 of \[[SC.SAML.Profile](#sc-saml-profile)\].
> [Tillitsramverket för Svensk e-legitimation](https://www.digg.se/digitala-tjanster/e-legitimering/tillitsnivaer-for-e-legitimering/tillitsramverk-for-svensk-e-legitimation).
761
-
762
-
<aname="eiddeployprof"></a>
763
-
**\[EidDeployProf\]**
758
+
<aname="sc-saml-profile"></a>
759
+
**\[SC.SAML.Profile\]**
764
760
> [Deployment Profile for the Swedish eID Framework](https://docs.swedenconnect.se/technical-framework/latest/02_-_Deployment_Profile_for_the_Swedish_eID_Framework.html).
765
761
766
-
<aname="constructedattr"></a>
767
-
**\[ConstructedAttr\]**
762
+
<aname="sc-constructed"></a>
763
+
**\[SC.Constructed\]**
768
764
> [eIDAS Constructed Attributes Specification for the Swedish eID Framework](https://docs.swedenconnect.se/technical-framework/latest/11_-_eIDAS_Constructed_Attributes_Specification_for_the_Swedish_eID_Framework.html).
769
765
770
766
<aname="eidas-attr"></a>
771
-
**\[eIDAS\_Attr\]**
772
-
> [eIDAS SAML Attribute Profile, version 1.2, 21 May 2019](https://docs.swedenconnect.se/technical-framework/mirror/eidas/eIDAS_SAML_Attribute_Profile_v1.2-FINAL.pdf).
767
+
**\[eIDAS.Attributes\]**
768
+
> [eIDAS SAML Attribute Profile, version 1.4, 31 October 2023](https://docs.swedenconnect.se/technical-framework/mirror/eidas/eIDAS_SAML_Attribute_Profile_v1.4_final.pdf).
773
769
774
-
<aname="sigsap"></a>
775
-
**\[SigSAP\]**
770
+
<aname="sc-sap"></a>
771
+
**\[SC.SAP\]**
776
772
> [Signature Activation Protocol for Federated Signing](https://docs.swedenconnect.se/technical-framework/latest/13_-_Signature_Activation_Protocol.html).
777
773
778
774
<aname="dssext"></a>
779
-
**\[DSSExt\]**
775
+
**\[SC.DSS.Ext\]**
780
776
> [DSS Extension for Federated Central Signing Services](https://docs.swedenconnect.se/technical-framework/latest/09_-_DSS_Extension_for_Federated_Signing_Services.html).
0 commit comments