7 NOTE: The shibboleth2.xml configuration format in this release
8 is fully compatible with the 2.0 release.
10 List of issues addressed by this release:
11 https://bugs.internet2.edu/jira/secure/IssueNavigator.jspa?reset=true&&pid=10011&fixfor=10129&status=5&status=6&sorter/field=issuekey&sorter/order=ASC
15 - SAML 1.0, 1.1, 2.0 Single Sign-On
16 - Shibboleth 1.x request profile
17 - 1.x POST/Artifact profiles
18 - 2.0 HTTP-Redirect/POST/POST-SimpleSign/Artifact/PAOS bindings
20 - SAML 1.0, 1.1, 2.0 Attribute Query via Attribute Resolver plugin
23 - SAML 2.0 Single Logout
24 - HTTP-Redirect/POST/POST-SimpleSign/Artifact bindings
25 - Front and back-channel application notification of logout
26 - Race detection of late arriving assertions
28 - SAML 2.0 NameID Management (IdP-initiated only)
29 - HTTP-Redirect/POST/POST-SimpleSign/Artifact bindings
30 - Front and back-channel application notification of changes
32 - ADFS WS-Federation Support
34 - experimental support for SAML 2.0 assertions
36 - Shibboleth WAYF and SAML DS protocols for IdP Discovery
39 - Bulk resolution via local file, or URL with local file backup
40 - Dynamic resolution and caching based on entityID
41 - Filtering based on whitelist, blacklist, or signature verification
43 - Metadata Generation Handler
44 - Generates and optionally signs SAML metadata based on SP configuration
47 - Reports on status and configuration of SP
50 - Dumps information about an active session
53 - Explicit key and PKIX engines via metadata, superset compatible with 1.3
54 - PKIX trust engine with static root list
56 - Configurable per-endpoint Security Policy rules
57 - Replay and freshness detection
59 - Simple "blob" signing
60 - TLS X.509 certificate authentication
62 - Client transport authentication to SOAP endpoints via libcurl
63 - TLS X.509 client certificates
65 - Digest-Auth (untested)
69 - All incoming SAML 2 encrypted element types (Assertion, NameID, Attribute)
70 - Optional outgoing encryption of NameID in requests and responses
73 - Decoding and exporting SAML 1 and 2 attributes
75 - Value/scope pairs (legacy and value@scope syntaxes supported)
79 - Policy language compatible with IdP filtering, except that references
80 only work within policy files, not across them
81 - Rules based on, attribute issuer, requester, scope, and value, authentication
82 method, based on exact string and regular expressions.
83 - Boolean functions supporting AND, OR, and NOT for use in composing rules
84 - Wildcard rules allowing all unspecified attributes through with no filtering
87 - Oversized header replaced with Shib-Assertion-Count and Shib-Assertion-NN headers
88 containing local URL to fetch SAML assertion using HTTP GET
90 - Enhanced Spoofing Detection
91 - Detects and blocks client headers that would match known attribute headers
92 - Does not support Apache mod_rewrite, but can be disabled when necessary
94 - ODBC Clustering Support
95 - Tested against a few different servers with various drivers
97 - RequestMap enhancements
98 - Regular expression matching for hosts and paths
99 - Query string parameter matching
101 - Error handling enhancements
102 - Reporting of SAML status errors
103 - Optional redirection to custom error handler
105 - Apache module enhancements
106 - "OR" coexistence with other authorization modules
107 - htaccess-based override of any valid RequestMap property
110 - samlsign for manual XML signing and verification
111 - mdquery for interrogating via metadata configuration
112 - resolvertest for exercising attribute extraction, filtering, and resolution
114 - Migrating 1.3 core configuration file
115 - Stylesheet can handle some common options