Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Filter all imported entities with XML attribute mdrpi:RegistrationInfo[@registrationAuthority='https://incommon.org']
    1. Entities so marked must come from primary sources only.
  2. Filter all entities with an entityID that does not begin with one of the following prefixes: “http://”, “https://”, “urn:mace”
  3. Filter all entity attributes not on the Entity Attribute Whitelist (see subsection below)
  4. Filter all <mdui:Logo> elements (not entities) with a URL that is not HTTPS-protected.
  5. Filter all imported entities with weak keys
    1. The use of weak keys in metadata has security and privacy implications.
    2. There are no weak keys in InCommon metadata and so we'd like to keep it that way.
  6. Filter all imported IdP entities with a faulty <shibmd:Scope> element
    1. Disallow <shibmd:Scope regexp="true">
  7. Filter all imported IdP entities with an endpoint location that is not HTTPS-protected
  8. Filter all imported IdP entities that do not have a SAML2 SingleSignOnService endpoint that supports the HTTP-Redirect binding.
    1. In effect, all imported IdPs must support SAML2.
  9. Filter all imported SP entities that do not have at least one SAML2 AssertionConsumerService endpoint that supports the HTTP-POST binding.
    1. In effect, all imported SPs must support SAML2.
  10. Filter all imported entities that have the same entityID as an existing entity in the InCommon aggregate.
    1. This happens because some SPs choose to join multiple federations.
    2. Dozens of global SPs are filtered by this rule.

...