When single sign-on is initiated at the SP, authentication context processing follows these steps:
Based on a configured authentication context template, the AuthnContext class is mapped to the protection level for the session.
The hard-coded URI you specify is added to the assertion.
If the SP includes multiple authentication context URIs in the request, the classes are compared one-by-one in sequential order against the context for the session. At the first successful comparison, the IdP adds the session authentication context to the assertion.
If the comparison is not successful, the transaction is terminated with a "noauthncontext" status response.
The following table shows examples of how an authentication context is processed depending on the comparison attribute sent in the authentication context request.
|
SP-requested Authentication Context |
Comparison Attribute Value |
IdP-configured Authentication Context |
Status Response |
|---|---|---|---|
|
Password |
exact |
InternetProtocol |
NoAuthnContext |
|
Password |
minimum |
InternetProtocol |
NoAuthnContext |
|
Password |
better |
InternetProtocol |
NoAuthnContext |
|
InternetProtocol |
exact |
InternetProtocol |
Success |
|
InternetProtocol |
minimum |
InternetProtocol |
Success |
|
InternetProtocol |
maximum |
InternetProtocol |
Success |
|
InternetProtocol |
maximum |
Password |
NoAuthnContext |
|
InternetProtocol |
better |
Password |
Success |
| Copyright © 2012 CA. All rights reserved. |
|