7 Fully Supported (no major changes planned prior to stable release)
9 - SAML 1.0, 1.1, 2.0 Single Sign-On
10 - Shibboleth 1.x request profile
11 - 1.x POST/Artifact profiles
12 - 2.0 HTTP-Redirect/POST/POST-SimpleSign/Artifact/PAOS bindings
14 - SAML 1.0, 1.1, 2.0 Attribute Query via Attribute Resolver plugin
17 - SAML 2.0 Single Logout
18 - HTTP-Redirect/POST/POST-SimpleSign/Artifact bindings
19 - Front and back-channel application notification of logout
20 - Race detection of late arriving assertions
22 - SAML 2.0 NameID Management (IdP-initiated only)
23 - HTTP-Redirect/POST/POST-SimpleSign/Artifact bindings
24 - Front and back-channel application notification of changes
26 - ADFS WS-Federation Support
29 - Shibboleth WAYF and SAML DS protocols for IdP Discovery
32 - Bulk resolution via local file, or URL with local file backup
33 - Dynamic resolution and caching based on entityID
34 - Filtering based on whitelist, blacklist, or signature verification
36 - Metadata Generation Handler
37 - Generates and optionally signs SAML metadata based on SP configuration
40 - Reports on status and configuration of SP
43 - Dumps information about an active session
46 - Explicit key and PKIX engines via metadata, superset compatible with 1.3
47 - PKIX trust engine with static root list
49 - Configurable per-endpoint Security Policy rules
50 - Replay and freshness detection
52 - Simple "blob" signing
53 - TLS X.509 certificate authentication
55 - Client transport authentication to SOAP endpoints
56 - TLS X.509 client certificates
62 - All incoming SAML 2 encrypted element types (Assertion, NameID, Attribute)
63 - Optional outgoing encryption of NameID in requests and responses
66 - Decoding and exporting SAML 1 and 2 attributes
68 - Value/scope pairs (legacy and value@scope syntaxes supported)
72 - Policy language compatible with IdP filtering, except that references
73 only work within policy files, not across them
74 - Rules based on, attribute issuer, requester, scope, and value, authentication
75 method, based on exact string and regular expressions.
76 - Boolean functions supporting AND, OR, and NOT for use in composing rules
77 - Wildcard rules allowing all unspecified attributes through with no filtering
80 - Oversized header replaced with Shib-Assertion-Count and Shib-Assertion-NN headers
81 containing local URL to fetch SAML assertion using HTTP GET
83 - Enhanced Spoofing Detection
84 - Detects and blocks client headers that would match known attribute headers
86 - ODBC Clustering Support
87 - Only tested against Microsoft SQL Server using MS and FreeDTS ODBC drivers
89 - RequestMap enhancements
90 - Regular expression matching for hosts and paths
91 - Query string parameter matching
93 - Error handling enhancements
94 - Reporting of SAML status errors
95 - Optional redirection to custom error handler
97 - Apache module enhancements
98 - "OR" coexistence with other authorization modules
99 - htaccess-based override of any valid RequestMap property
102 - samlsign for manual XML signing and verification
103 - mdquery for interrogating via metadata configuration
104 - resolvertest for exercising attribute extraction, filtering, and resolution
110 - Migrating 1.3 configuration files