Early Preview

This is currently very much a preview. Please feel free to try things out, but don't be upset if anything is not yet working. Feedback is welcome over on our GitHub Dicussions page.

class Sustainsys.​Saml2.​Configuration.​SPOptions

Assembly: Sustainsys.Saml2

Inheritance: object → SPOptions

Options for the service provider's behaviour; i.e. everything except the idp and federation list.

Properties

public System.​Uri
ReturnUrl
Return Uri to redirect the client to, if no return uri was specified when initiating the signin sequence.
public XsdDuration
MetadataCacheDuration
Recommendation of cache refresh interval to those who reads our metadata.
MetadataValidDuration
Maximum validity duration after fetch for those who reads our metadata. Exposed as an absolute validUntil time in the metadata. If set to null, no validUntil is exposed in metadata.
Saml2PSecurityTokenHandler
The security token handler used to process incoming assertions for this SP. The default value is to lazy create one using the current EntityId.
public System.​Uri
DiscoveryServiceUrl
Url to discovery service to use if no idp is specified in the sign in call.
EntityId
EntityId - The identity of the ServiceProvider to use when sending requests to Idp and presenting the SP in metadata.
public string
ModulePath
Application root relative path for Saml2 endpoints. The default is "/Saml2".
public System.​Uri
PublicOrigin
By default, the service provider uses the host, protocol, port and application root path from the HTTP request when creating links. This might not be accurate in reverse proxy or load-balancing situations. You can override the origin used for link generation for the entire application using this property. To override per request, implement a <code>GetPublicOrigin</code> Notification function.
Organization
Metadata describing the organization responsible for the entity.
NameIdPolicy
NameId Policy.
RequestedAuthnContext
RequestedAuthnContext
Collection of contacts for the SAML2 entity.
AttributeConsumingServices
Collection of attribute consuming services for the service provider.
ServiceCertificates
Certificates used by the service provider for signing or decryption.
Certificates valid for use in decryption
Certificate for use in signing outbound requests
Certificates to be published in metadata
AuthenticateRequestSigningBehavior
Signing behaviour for AuthnRequests.
public string
OutboundSigningAlgorithm
Signing algorithm for metadata and outbound messages. Can be overriden for each <see cref="T:Sustainsys.Saml2.IdentityProvider" /> .
public bool
WantAssertionsSigned
Metadata flag that we want assertions to be signed.
public bool
ValidateCertificates
Validate certificates when validating signatures? Normally not a good idea as SAML2 deployments typically exchange certificates directly and instead of relying on the public certificate infrastructure.
public Compatibility
Compatibility
Compatibility settings. Can be used to make Saml2 accept certain non-standard behaviour.
public string
MinIncomingSigningAlgorithm
Minimum accepted signature algorithm for any incoming messages.
Logger
Adapter to logging framework of hosting application.
Template for token validation parameters. Some security critical validation parameters are set for each use. The Unsafe.TokenValidationParametersCreated notification is called after those are set if those need to be overriden.

Methods

public bool
Equals​(object obj)
Inherited from object
protected void
Finalize​()
Inherited from object
public int
GetHashCode​()
Inherited from object
GetType​()
Inherited from object
protected object
MemberwiseClone​()
Inherited from object
public string
ToString​()
Inherited from object