edugain-discuss AT lists.geant.org
Subject: An open discussion list for topics related to the eduGAIN interfederation service.
List archive
- From: "Chan, Toby [ITS]" <toby.chan AT polyu.edu.hk>
- To: "edugain-discuss AT lists.geant.org" <edugain-discuss AT lists.geant.org>
- Subject: Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain
- Date: Wed, 7 Apr 2021 02:32:23 +0000
- Accept-language: en-GB, en-US
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=polyu.edu.hk; dmarc=pass action=none header.from=polyu.edu.hk; dkim=pass header.d=polyu.edu.hk; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=P4iw40XXV7MRdnLTrzJ1rwwcXoIz8NEJzjAtsBB7ENY=; b=nAMlPWUld+ADxZCUM1basTlQnsWVG+0zzyEW1wiNCLjDNU0b10y0jZF8vZA+Ayrb8E35T2zM9Jgq0Oj4A7Q4YQzo6neJxTSiOfyD+l9/RrXThRg9LImmxxj0Qv1OzQsyPJt/FUn4dJsg6V3GxiVd3PZoKc55CgmdEWE0Yrzs+QjVoIgWmkV/DOyrC4ad1iatO2tKwRZUyIuGqCWKopKnbj+oLh+j/cIsXJuhyc8NG28nz9/AJI7vASH/P7hYSPHnG+cU2eCe0/U87t4Vh6GAHOcl5azdDWgVwUP8oxjeM50LNBuwu3WQFgPmb/5gzqJdKKsmz0x5qwhwRb92uIVTMA==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hfL3OHsA8VSWr300XhAyKNoStI3tCM/Ld3dV4dxa3FS6/6J1YFENba/uq7NvZlNXyXgi0htrcK8dpfD9WlV1wrNI8zPZEmLMZd1g7XXqDosasoQk80FBrcApYLsna2UWSWv7skgWTfunpjcTfzyRsIx27C9/OY/D5gf9sjZPP7wjcMDJgeJLtqHkiy1BcSMzLWCI1lljGcl9GHCfvRPqSEDv7/tKWI8P62caEq+mlNwzG5qrptl2e0o0cP3AYbrrIuoIkPriPVeveuf4h7ZLP3FNSyVYNQtfrIBqi+QEjb/CzlOO8cRa4Io2akri5NMu9DqsrwSq8H/xi1POJK+lBA==
- Authentication-results: lists.geant.org; dkim=none (message not signed) header.d=none;lists.geant.org; dmarc=none action=none header.from=polyu.edu.hk;
From: edugain-discuss-request AT lists.geant.org on behalf of Chris Phillips
Sent: Wednesday, April 07, 2021 12:08 AM
To: Daniel Muscat; edugain-sg AT lists.geant.org; edugain-discuss AT lists.geant.org
Subject: Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain
We have a number of sites using Azure AD as their backend authenticator only proxied using the Shibboleth IdP v4 as their IdP. Other sites in other federations have reached out on the topic as well as we documented it on the Shibboleth Knowledge Base here [1] for all to use.
Proxying offers us a clear demarcation point and place to exert control for the features we want in an R&E federation IdP at the pace we want which is much faster in most cases.
Other proxy stories can be done with R&E tech like SATOSA and SimpleSAMLPHP. We ourselves use Shib, SATOSA, and SSPHP in our own solutions for different reasons with the Shibboleth Proxy story being the one recommend first followed by SATOSA and SSPHP. The biggest challenge of anything is knowledge in the field at the institutions and understanding the real problem they are trying to solve.
We also support ADFS with ADFSToolkit on prem connected to Azure AD which is a common pathway for sites to co-habitate with Azure AD. The biggest draw for that: existing knowledge, infrastructure already deployed, and access to Azure MFA. This is why we've invested in the ADFSToolkit (now at version 2)[2] so we can get sites to REFEDS MFA capable levels on this technology as well.
Included below is the laundry list of Azure AD challenges to help describe why a proxy is needed.
Questions and comments welcome as always and happy to share our experiences so far..
Chris.
Azure AD challenges to being an R&E IdP on its own:
- cannot validate an aggregate with a federation's Signing Key
- cannot handle an aggregate -- it can only do bi-lateral SAML and not Multi-lateral SAML
- has a limit of 1000 RPs per tenant
- cannot support MDQ
- cannot do entity categories management
- cannot properly support and respond to REFEDS MFA and SFA profiles as triggered by SAML RPs
- cannot properly contain eduPerson or ShacPerson schema elements in Azure AD without significant schema manipulation to extendedAttributes##[1-13]
- cannot handle custom multi-valued attributes in azure AD consistently (or sometimes at all!)[3][4]
- cannot generate eduPersonTargetedID
- cannot generate scripted attributes with same level of fidelity as other solutions
[1] https://wiki.shibboleth.net/confluence/display/KB/Using+SAML+Proxying+in+the+Shibboleth+IdP+to+connect+with+Azure+AD
[2] https://github.com/fedtools/adfstoolkit
[3] https://docs.microsoft.com/en-us/azure/active-directory/app-provisioning/customize-application-attributes
(Custom attributes can't be referential attributes, multi-value or complex-typed attributes. Custom multi-value and complex-typed extension attributes are currently supported only for applications in the gallery. )
[4] https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-sync-feature-directory-extensions
On 2021-04-06, 9:32 AM, "edugain-discuss-request AT lists.geant.org on behalf of Daniel Muscat" <edugain-discuss-request AT lists.geant.org on behalf of daniel.muscat AT um.edu.mt> wrote:
Dear all,
We have a prospective member that will probably need to integrate a
SAML IDP based on the Azure Active Directory. I am wondering if
anybody can share any experience on the Azure Active Directory as an
IDP used to authenticate for SPs on eduGain, in particular inAcademia.
--
Regards
Daniel
Disclaimer:
This message (including any attachments) contains confidential information intended for a specific individual and purpose. If you are not the intended recipient, you should delete this message and notify the sender and The Hong Kong Polytechnic University (the University) immediately. Any disclosure, copying, or distribution of this message, or the taking of any action based on it, is strictly prohibited and may be unlawful.
The University specifically denies any responsibility for the accuracy or quality of information obtained through University E-mail Facilities. Any views and opinions expressed are only those of the author(s) and do not necessarily represent those of the University and the University accepts no liability whatsoever for any losses or damages incurred or caused to any party as a result of the use of such information.
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, (continued)
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Thijs Kinkhorst, 06-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Peter Schober, 06-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Thijs Kinkhorst, 06-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Guy Halse, 07-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Peter Schober, 14-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Thijs Kinkhorst, 14-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Thijs Kinkhorst, 14-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Peter Schober, 14-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Guy Halse, 14-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Peter Schober, 14-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Chris Phillips, 06-Apr-2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Chan, Toby [ITS], 04/07/2021
- Re: [eduGAIN-discuss] Use of Azure Active Directory in eduGain, Terry Smith, 07-Apr-2021
Archive powered by MHonArc 2.6.19.