...
- Silently remove all imported entities with XML attribute
mdrpi:RegistrationInfo[@registrationAuthority='https://incommon.org']
- Entities so marked must come from primary sources only.
- Remove (and log the removal of) the following XML elements (not entities):
<mdui:Logo>
elements (not entities) with a URL that is not HTTPS-protected<mdui:Logo>
elements with a value longer than 40,000 characters
- Silently remove the following XML elements (not entities):
- all MDUI metadata (e.g.,
mdui:UIInfo
elements) withinAttributeAuthority
roles. - all entity attributes on the Entity Attribute Deny List (see subsection below).
- all extended XML elements and attributes defined in namespaces not on the XML Namespace Permit List (see subsection below).
- all MDUI metadata (e.g.,
- Remove (and log the removal of) all imported entities matching one or more of the following conditions:
- Entities with an entityID that does not begin with one of the following prefixes: “
http://
”, “https://
”, “urn:mace
” - Entities with weak keys (which includes all keys less than 2048-bits in length)
- The use of weak keys in metadata has security and privacy implications.
- There are no weak keys in InCommon metadata and so we'd like to keep it that way.
- IdP entities with a faulty
<shibmd:Scope>
element- Require regexp attribute on
<shibmd:Scope>
- Values which do not represent a permissible scope:
regexp="false"
scope values must:- be syntactically valid domain names (for example, they may not be empty or contain white space), and
- must represent domains under a "public suffix" such as
.com
or.edu
listed in the public suffix list
regexp="true"
scope values must:- not be empty or include white space, and
- must end with:
- an escaped dot ('
\.
'), - followed by a "literal tail", which must:
- consist of at least two domain labels (e.g., "
example
", "edu
") separated by encoded dots ('\.
'), - which when the encoded dots are decoded represents a domain name under a "public suffix" such as
.com
or.edu
listed in the public suffix list
- consist of at least two domain labels (e.g., "
- followed by a '
$
' anchor
- an escaped dot ('
- Require regexp attribute on
- IdP entities that do not have a SAML2 SingleSignOnService endpoint that supports the HTTP-Redirect binding.
- In effect, all imported IdPs must support SAML2.
- SP entities that do not have at least one SAML2 AssertionConsumerService endpoint that supports the HTTP-POST binding.
- In effect, all imported SPs must support SAML2.
- Entities containing literal CR characters.
- Entities containing misplaced or duplicated
EntityAttributes
elements. - Entities containing XML failing schema validation.
- Entities that do not conform to the SAML v2.0 Metadata Profile for Algorithm Support Version 1.0
- Entities that do not follow standard rules regarding Binding values on protocol endpoints in metadata
- Entities that do not conform to the SAML V2.0 Holder-of-Key Web Browser SSO Profile Version 1.0
- Entities that do not conform to the Identity Provider Discovery Service Protocol and Profile
- Entities that do not conform to the Service Provider Request Initiation Protocol and Profile Version 1.0
- Entities that do not conform to the SAML V2.0 Metadata Interoperability Profile
- Entities that do not conform to the SAML V2.0 Metadata Extensions for Registration and Publication Information Version 1.0
- Entities that do not conform to the SAML V2.0 Metadata Extensions for Login and Discovery User Interface Version 1.0
- Entities that do not conform to the REFEDS Research and Scholarship Entity Category
- Entities that do not conform to the REFEDS SIRTFI specification
- Entities that do not conform to the SAML V2.0 Metadata specification
- SP entities with an endpoint location that is not HTTPS-protected
- Entities that do not conform to the ADFS Metadata Profile
- Entities that have inconsistent metadata for SAML 1.x support
- Entities that have errors in their
RequestedAttributes
elements
- Entities with an entityID that does not begin with one of the following prefixes: “
- Log a warning for each of the following conditions, without transforming the containing entity:
<mdui:Logo>
elements with a value longer than 50,000 characters
- Silently remove all imported entities that have the same entityID as an existing entity in the InCommon aggregate.
- This happens because some SPs choose to join multiple federations.
...