7 NOTE: The shibboleth2.xml configuration format in this release
8 is not compatible with earlier releases. Please start from scratch
9 or manually copy settings over. This version will remain compatible
10 with the final release.
12 Fully Supported (no major changes planned prior to stable release)
14 - SAML 1.0, 1.1, 2.0 Single Sign-On
15 - Shibboleth 1.x request profile
16 - 1.x POST/Artifact profiles
17 - 2.0 HTTP-Redirect/POST/POST-SimpleSign/Artifact/PAOS bindings
19 - SAML 1.0, 1.1, 2.0 Attribute Query via Attribute Resolver plugin
22 - SAML 2.0 Single Logout
23 - HTTP-Redirect/POST/POST-SimpleSign/Artifact bindings
24 - Front and back-channel application notification of logout
25 - Race detection of late arriving assertions
27 - SAML 2.0 NameID Management (IdP-initiated only)
28 - HTTP-Redirect/POST/POST-SimpleSign/Artifact bindings
29 - Front and back-channel application notification of changes
31 - ADFS WS-Federation Support
34 - Shibboleth WAYF and SAML DS protocols for IdP Discovery
37 - Bulk resolution via local file, or URL with local file backup
38 - Dynamic resolution and caching based on entityID
39 - Filtering based on whitelist, blacklist, or signature verification
41 - Metadata Generation Handler
42 - Generates and optionally signs SAML metadata based on SP configuration
45 - Reports on status and configuration of SP
48 - Dumps information about an active session
51 - Explicit key and PKIX engines via metadata, superset compatible with 1.3
52 - PKIX trust engine with static root list
54 - Configurable per-endpoint Security Policy rules
55 - Replay and freshness detection
57 - Simple "blob" signing
58 - TLS X.509 certificate authentication
60 - Client transport authentication to SOAP endpoints
61 - TLS X.509 client certificates
67 - All incoming SAML 2 encrypted element types (Assertion, NameID, Attribute)
68 - Optional outgoing encryption of NameID in requests and responses
71 - Decoding and exporting SAML 1 and 2 attributes
73 - Value/scope pairs (legacy and value@scope syntaxes supported)
77 - Policy language compatible with IdP filtering, except that references
78 only work within policy files, not across them
79 - Rules based on, attribute issuer, requester, scope, and value, authentication
80 method, based on exact string and regular expressions.
81 - Boolean functions supporting AND, OR, and NOT for use in composing rules
82 - Wildcard rules allowing all unspecified attributes through with no filtering
85 - Oversized header replaced with Shib-Assertion-Count and Shib-Assertion-NN headers
86 containing local URL to fetch SAML assertion using HTTP GET
88 - Enhanced Spoofing Detection
89 - Detects and blocks client headers that would match known attribute headers
91 - ODBC Clustering Support
92 - Only tested against Microsoft SQL Server using MS and FreeDTS ODBC drivers
94 - RequestMap enhancements
95 - Regular expression matching for hosts and paths
96 - Query string parameter matching
98 - Error handling enhancements
99 - Reporting of SAML status errors
100 - Optional redirection to custom error handler
102 - Apache module enhancements
103 - "OR" coexistence with other authorization modules
104 - htaccess-based override of any valid RequestMap property
107 - samlsign for manual XML signing and verification
108 - mdquery for interrogating via metadata configuration
109 - resolvertest for exercising attribute extraction, filtering, and resolution
115 - Migrating 1.3 configuration files