Skip to content

Instantly share code, notes, and snippets.

@michaelkc
Created April 13, 2015 10:33
Show Gist options
  • Save michaelkc/a8fd5a2ef3de125afcf4 to your computer and use it in GitHub Desktop.
Save michaelkc/a8fd5a2ef3de125afcf4 to your computer and use it in GitHub Desktop.
<?xml version="1.0" encoding="utf-8"?>
<PortableRelyingParty xmlns="http://schemas.datacontract.org/2004/07/Dlbr.CommonLogin.AdfsSnapIn" xmlns:i="http://www.w3.org/2001/XMLSchema-instance">
<AutoUpdateEnabled>false</AutoUpdateEnabled>
<ClaimsAccepted />
<ConflictWithPublishedPolicy>false</ConflictWithPublishedPolicy>
<DelegationAuthorizationRules />
<Enabled>true</Enabled>
<EncryptClaims>true</EncryptClaims>
<EncryptedNameIdRequired>false</EncryptedNameIdRequired>
<EncryptionCertificateRevocationCheck>CheckChainExcludeRoot</EncryptionCertificateRevocationCheck>
<Identifier xmlns:a="http://schemas.microsoft.com/2003/10/Serialization/Arrays">
<a:string>https://localhost.vfltest.dk/SomeWebApp/</a:string>
</Identifier>
<ImpersonationAuthorizationRules>c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid", Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$" ] =&gt; issue(store="_ProxyCredentialStore",types=("http://schemas.microsoft.com/authorization/claims/permit"),query="isProxySid({0})", param=c.Value );
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$" ] =&gt; issue(store="_ProxyCredentialStore",types=("http://schemas.microsoft.com/authorization/claims/permit"),query="isProxySid({0})", param=c.Value );
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/proxytrustid", Issuer =~ "^SELF AUTHORITY$" ] =&gt; issue(store="_ProxyCredentialStore",types=("http://schemas.microsoft.com/authorization/claims/permit"),query="isProxyTrustProvisioned({0})", param=c.Value );</ImpersonationAuthorizationRules>
<IssuanceAuthorizationRules>@RuleTemplate = "AllowAllAuthzRule"
=&gt; issue(Type = "http://schemas.microsoft.com/authorization/claims/permit", Value = "true");
</IssuanceAuthorizationRules>
<IssuanceTransformRules>@RuleTemplate = "LdapClaims"
@RuleName = "NameId"
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname", Issuer == "AD AUTHORITY"]
=&gt; issue(store = "Active Directory", types = ("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier"), query = ";userPrincipalName;{0}", param = c.Value);
</IssuanceTransformRules>
<LastMonitoredTime>1900-01-01T01:00:00+01:00</LastMonitoredTime>
<LastPublishedPolicyCheckSuccessful i:nil="true" />
<LastUpdateTime>1900-01-01T01:00:00+01:00</LastUpdateTime>
<MetadataUrl i:nil="true" />
<MonitoringEnabled>false</MonitoringEnabled>
<Name>DEBUG SomeWebApp</Name>
<NotBeforeSkew>0</NotBeforeSkew>
<Notes i:nil="true" />
<OrganizationInfo />
<ProtocolProfile>WsFed-SAML</ProtocolProfile>
<SamlEndpoints />
<SamlResponseSignature>AssertionOnly</SamlResponseSignature>
<SignatureAlgorithm>http://www.w3.org/2001/04/xmldsig-more#rsa-sha256</SignatureAlgorithm>
<SignedSamlRequestsRequired>false</SignedSamlRequestsRequired>
<SigningCertificateRevocationCheck>CheckChainExcludeRoot</SigningCertificateRevocationCheck>
<TokenLifetime>0</TokenLifetime>
<WSFedEndpoint>https://localhost.vfltest.dk/SomeWebApp/</WSFedEndpoint>
<m_EncryptionCertificate i:nil="true" />
<m_RequestSigningCertificate xmlns:a="http://schemas.microsoft.com/2003/10/Serialization/Arrays" />
</PortableRelyingParty>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment