Product SiteDocumentation Site

14.5.7.7.4. Configuration Parameters
#
Name
Type
Objective
SP/IDP
Since Version
1
CLOCK_ SKEW_ MILIS
string
a long value in miliseconds to add a clock skew to assertion expiration validation at the Service provider
SP
2.0
2
DISABLE_ AUTHN_ STATEMENT
boolean
Setting a value will disable the generation of an AuthnStatement
IDP
2.0
3
DISABLE_ SENDING_ ROLES
boolean
Setting any value will disable the generation and return of roles to SP
IDP
2.0
4
DISABLE_ ROLE_ PICKING
boolean
Setting to true will disable picking IDP attribute statements
SP
2.0
5
ROLE_ KEY
String
a csv list of strings that represent the roles coming from IDP
SP
2.0
6
ASSERTION_ CONSUMER_ URL
String
the url to be used for assertionConsumerURL
SP
2.0
7
NAMEID_ FORMAT
String
Setting to a value will provide the nameid format to be sent to IDP
SP
2.0
8
ASSERTION_ SESSION_ ATTRIBUTE_ NAME
String
Specifies the name of the session attribute where the assertion will be stored. The assertion is stored as a DOM Document. This option is useful when you need to obtain the user's assertion to propagate or validate it against the STS.
SP
2.1.7
9
AUTHN_CONTEXT_CLASSES
String
Specifies a single or a comma separated list of SAML Authentication Classes to be used when creating an AuthnRequest. The value can be a full qualified name (FQN) or an alias. For each standard class name there is an alias, as defined by the org.picketlink.common.constants.SAMLAuthenticationContextClass.
SP
2.5.0
9
REQUESTED_AUTHN_CONTEXT_COMPARISON
String
Specifies the Comparison attribute of the RequestedAuthnContext. This option should be used in conjunction with the AUTHN_CONTEXT_CLASSES option. Only the values defined by the specification are supported.
SP
2.5.0
14.5.7.7.4.1. Example:

Example 14.11. WEB-INF/picketlink-handlers.xml

<Handler class="org.picketlink.identity.
                    federation.web.
                    handlers.saml2.SAML2AuthenticationHandler">
<Option Key="DISABLE_ROLE_PICKING" Value="true"/>
</Handler>
14.5.7.7.4.2. NAMEID_FORMAT:
The transient and persistent nameid-formats are used to obfuscate the actual identity in order to make linking activities extremely difficult between different SPs being served by the same IDP. A transient policy only lasts for the duration of the login session, where a persistent policy will reuse the obfuscated identity across multiple login sessions.
The Value can either be one of the following "official" values or a vendor-specific value supported by the IDP. Any string value is passed through to the NameIDPolicy's Format attribute as-is in an AuthnRequest.
urn:oasis:names:tc:SAML:2.0:nameid-format: transient urn:oasis:names:tc:SAML:2.0:nameid-format: persistent urn:oasis:names:tc:SAML:1.1:nameid-format: unspecified urn:oasis:names:tc:SAML:1.1:nameid-format: emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format: X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format: WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format: kerberos urn:oasis:names:tc:SAML:2.0:nameid-format: entity