| 1 | |
| 2 | !AcadmicWorks: scholarship management http://www.academicworks.com/ [[br]] |
| 3 | entityId https://alaska.academicworks.com/shibboleth-sp |
| 4 | SP metadata in InCommon |
| 5 | |
| 6 | Correspondence with !AcademicWorks's Matthew Thomas <info@academicworks.com>: |
| 7 | (UA questions, followed by AW replies) |
| 8 | {{{ |
| 9 | (1) I presume AcademicWorks consumes InCommon metadata automatically; but if not, be aware that we will be |
| 10 | renewing (changing) our signing certificate that expires in a few weeks, so our metadata will change to reflect |
| 11 | that new signing certificate. |
| 12 | |
| 13 | Yes, we actually update our metadata every 5 minutes as we have many Shibboleth integrations, some of which are through InCommon and some of which are standalone implementations. I would not anticipate any issues as we've had many customers update their certificates as a result of the Heartbleed bug a couple months ago. |
| 14 | |
| 15 | (2) Your documentation asks for release of email address. We can release the standard mail attribute, but this |
| 16 | is in principle multi-valuee. I’ve found that several services cannot handle a multi-valued attribute, so I can |
| 17 | release a single-valued attribute, encoded as mail if that would aid. |
| 18 | |
| 19 | Yes, please configure your IdP to release a single-value attribute for email. |
| 20 | |
| 21 | (3) Some new students will not have any email address in their directory record, in which case that attribute would |
| 22 | not be included in the SAML assertion. Is that acceptable, or do we need to gin up some value for every single |
| 23 | authenticated user? |
| 24 | |
| 25 | If a user doesn't have an email address, that is fine. You do not need to insert some other value into the attribute statement. The integration will work fine if there is no email attribute in the assertion. Email is not required for the integration to work, but we encourage it. It allows us to have a means to communicate with a user who has logged into your AcademicWorks system prior to her data being imported into AcademicWorks, which includes her email address. |
| 26 | |
| 27 | (4) We have multiple choices of unique identifiers for our users. My usual recommendation is the ID# assigned by |
| 28 | our Banner ERP as this is pretty stable (unlike name-based identifiers, which frequently change). This attribute |
| 29 | is released as |
| 30 | name="https://iam.alaska.edu/trac/wiki/IamUaArp#bannerID” |
| 31 | The exact same value can also be released with scope (@alaska.edu) as |
| 32 | name="https://iam.alaska.edu/trac/wiki/IamUaArp#uakPersonID" id="uakPersonID" |
| 33 | or as the draft eduPersonUniqueId (also scoped) as |
| 34 | name="urn:oid:1.3.6.1.4.1.5923.1.1.1.13" |
| 35 | |
| 36 | I do not have or know how to create an attribute with BOTH an OID and (different) SAML2 name. |
| 37 | |
| 38 | Please advise whether you prefer scoped or unscoped attribute, and whether any of those just mentioned |
| 39 | will be acceptable. |
| 40 | |
| 41 | BannerID is a common choice amongst our Ellucian/Banner customers. That will work great. With respect to the SAML Name and OID, all we need is one or the other. I apologize if the wording was confusing in the document. The information you provided is what we needed and we'll be looking for name="https://iam.alaska.edu/trac/wiki/IamUaArp#bannerID” as the unique identifier. This same ID will need to appear in the import file you send us, and we use the unique identifier as a key to the import file to find the associated user. |
| 42 | |
| 43 | (5) Finally, your documentation requests test accounts to mimic logging in as a student or staff member. |
| 44 | I can easily create such test accounts in our directory and provide the appropriate SAML assertions upon |
| 45 | successful authentication. But do you need these test accounts to also be in the data feed from our ERP? |
| 46 | That will take additional coordination if required. |
| 47 | |
| 48 | No, we don't need the test account to appear in the import file. We only need these credentials to fully test that we can authenticate and that we're pulling back the necessary attributes from the SAML assertion. |
| 49 | }}} |
| 50 | |