-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove the current implementation of eHerkenning/eIDAS level selection per form #3969
Remove the current implementation of eHerkenning/eIDAS level selection per form #3969
Comments
Refinement: We should check with Signicat how it should work: Multiple service IDs in the service catalog or can we specify a higher LoA in the request than that in the service catalog? |
Question In the service catalogue, inside the From this documentation (https://afsprakenstelsel.etoegang.nl/display/as/Interface+specifications+HM-AD) I see:
Is this functionality supported by Signicat? Signicat answer However, we advise to let the ServiceCatalog to determine which LOA is going to be used, and not set it in the Authn request. This will prevent any confusion on which LOA should be mandatory. i.e.: When the service has LOA 3 in the ServiceCatalog, it is not possible to set a lower LOA in the Authn. Conclusion |
Refinement: We checked and Signicat (preprod) allows us to login with a lower LoA than specificied in the service catalog (we logged in with LoA2 while the service catalog states LoA2+... and LoA2 is not even allowed anymore..) |
Refinement: ServiceCatalog: LoA2+ What happens? Will the broker stop the user or do we get the user with artificat LoA2 and stop the user ourselves? |
More LoA info: https://afsprakenstelsel.etoegang.nl/display/as/Interface+specifications+and+the+interpretation+of+LOAs |
Conclusion: |
…AuthnRequest We can't set the LoA higher in the AuthnRequest because it is not conform to the standard. We can't set the LoA lower, because it is discouraged by Signicat. Therefore, we should remove this feature.
…AuthnRequest We can't set the LoA higher in the AuthnRequest because it is not conform to the standard. We can't set the LoA lower, because it is discouraged by Signicat. Therefore, we should remove this feature.
To specify if that auth plugin supports overriding the LoA in the authentication request
To specify if that auth plugin supports overriding the LoA in the authentication request
To specify if that auth plugin supports overriding the LoA in the authentication request
To specify if that auth plugin supports overriding the LoA in the authentication request
…nning-loa-overwrite [#3969] Remove ability to override LoA for eHekrenning/eIDAS
Since this works completely different compared to DigiD. See ticket #3968 for adding it properly, but let's remove it for now since its not working at all.
The text was updated successfully, but these errors were encountered: