1 /* $Id$ 2 * 3 * Lasso - A free implementation of the Liberty Alliance specifications. 4 * 5 * Copyright (C) 2004-2007 Entr'ouvert 6 * http://lasso.entrouvert.org 7 * 8 * Authors: See AUTHORS file in top-level directory. 9 * 10 * This program is free software; you can redistribute it and/or modify 11 * it under the terms of the GNU General Public License as published by 12 * the Free Software Foundation; either version 2 of the License, or 13 * (at your option) any later version. 14 * 15 * This program is distributed in the hope that it will be useful, 16 * but WITHOUT ANY WARRANTY; without even the implied warranty of 17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 18 * GNU General Public License for more details. 19 * 20 * You should have received a copy of the GNU General Public License 21 * along with this program; if not, see <http://www.gnu.org/licenses/>. 22 * 23 */ 24 25 /** 26 * SECTION:saml2_strings 27 * @short_description: String constants from SAML 2.0 specifications 28 * @long_desscription: A lots of elements contains URL or enum based content, 29 * @include: lasso/xml/saml-2.0/saml2_strings.h 30 * @stability: Stable 31 * @see_also: #LassoSamlp2AuthnRequest, #LassoSaml2Assertion, #LassoLogin 32 */ 33 34 #ifndef __LASSO_SAML2_STRINGS_H__ 35 #define __LASSO_SAML2_STRINGS_H__ 36 37 /** 38 * LASSO_SAML2_METADATA_HREF: 39 * 40 * Namespace for SAML 2.0 metadata 41 * 42 */ 43 #define LASSO_SAML2_METADATA_HREF "urn:oasis:names:tc:SAML:2.0:metadata" 44 45 /** 46 * LASSO_SAML2_METADATA_PREFIX: 47 * 48 * Preferred prefix for namespace of SAML 2.0 metadata 49 */ 50 #define LASSO_SAML2_METADATA_PREFIX "md" 51 52 /** 53 * LASSO_SAML2_PROTOCOL_HREF: 54 * 55 * Namespace for SAML 2.0 protocol. 56 * 57 */ 58 #define LASSO_SAML2_PROTOCOL_HREF "urn:oasis:names:tc:SAML:2.0:protocol" 59 /** 60 * LASSO_SAML2_PROTOCOL_PREFIX: 61 * 62 * Preferred prefix for namespace of SAML 2.0 protocol 63 * 64 */ 65 #define LASSO_SAML2_PROTOCOL_PREFIX "samlp" 66 67 /** 68 * LASSO_SAML2_ASSERTION_HREF: 69 * 70 * Namespace for SAML 2.0 assertion 71 * 72 */ 73 #define LASSO_SAML2_ASSERTION_HREF "urn:oasis:names:tc:SAML:2.0:assertion" 74 /** 75 * LASSO_SAML2_ASSERTION_PREFIX: 76 * 77 * Preferred prefix for namespace of SAML 2.0 assertion 78 * 79 */ 80 #define LASSO_SAML2_ASSERTION_PREFIX "saml" 81 82 /* Bindings URIs */ 83 84 /** 85 * LASSO_SAML2_METADATA_BINDING_SOAP: 86 * 87 * URI for the SOAP binding. 88 */ 89 #define LASSO_SAML2_METADATA_BINDING_SOAP "urn:oasis:names:tc:SAML:2.0:bindings:SOAP" 90 91 /** 92 * LASSO_SAML2_METADATA_BINDING_REDIRECT: 93 * 94 * URI for the HTTP-Redirect binding. 95 */ 96 #define LASSO_SAML2_METADATA_BINDING_REDIRECT "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" 97 /** 98 * LASSO_SAML2_METADATA_BINDING_POST: 99 * 100 * URI for the HTTP-Post binding. 101 */ 102 #define LASSO_SAML2_METADATA_BINDING_POST "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" 103 104 /** 105 * LASSO_SAML2_METADATA_BINDING_ARTIFACT: 106 * 107 * URI for the HTTP-Artifact binding. 108 */ 109 #define LASSO_SAML2_METADATA_BINDING_ARTIFACT "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact" 110 111 /** 112 * LASSO_SAML2_METADATA_BINDING_PAOS: 113 * 114 * URI for the PAOS (or reverse SOAP) binding. 115 */ 116 #define LASSO_SAML2_METADATA_BINDING_PAOS "urn:oasis:names:tc:SAML:2.0:bindings:PAOS" 117 118 /** 119 * LASSO_SAML2_METADATA_BINDING_URI: 120 * 121 * URI for the URI special binding. 122 */ 123 #define LASSO_SAML2_METADATA_BINDING_URI "urn:oasis:names:tc:SAML:2.0:bindings:URI" 124 125 /** 126 * LASSO_SAML2_DEFLATE_ENCODING: 127 * 128 * URI for URL-Encoding of kind DEFLATE (compress message content before encoding in the URI). 129 */ 130 #define LASSO_SAML2_DEFLATE_ENCODING "urn:oasis:names:tc:SAML:2.0:bindings:URL-Encoding:DEFLATE" 131 132 133 /* Name Identifier Format */ 134 135 /* note that SAML 2.0 can also use SAML 1.1 name identifier formats */ 136 137 /** 138 * LASSO_SAML2_NAME_IDENTIFIER_FORMAT_UNSPECIFIED: 139 * 140 * <para>Name identifier format for local names, or free format name.</para> 141 * 142 * From saml-core-2.0-os.pdf: 143 * <blockquote>The interpretation of the content of the element is left to individual implementations.</blockquote> 144 */ 145 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_UNSPECIFIED \ 146 "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" 147 /** 148 * LASSO_SAML2_NAME_IDENTIFIER_FORMAT_EMAIL: 149 * 150 * <para>Name identifier format for email addresses.</para> 151 * 152 * From saml-core-2.0-os.pdf: 153 * <blockquote>Indicates that the content of the element is in the form of an email address, 154 * specifically "addr-spec" as defined in IETF RFC 2822 [RFC 2822] Section 3.4.1. An addr-spec has 155 * the form local-part@domain. Note that an addr-spec has no phrase (such as a common name) before 156 * it, has no comment (text surrounded in parentheses) after it, and is not surrounded by "<" and 157 * ">". </blockquote> 158 */ 159 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_EMAIL \ 160 "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" 161 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_X509 \ 162 "urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName" 163 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_WINDOWS \ 164 "urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName" 165 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_KERBEROS \ 166 "urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos" 167 /** 168 * LASSO_SAML2_NAME_IDENTIFIER_FORMAT_ENTITY: 169 * 170 * <para>Name identifier format for SAML 2.0 entities, i.e. identity and service providers.</para> 171 * 172 * From saml-core-2.0-os.pdf: 173 * <blockquote><para>Indicates that the content of the element is the 174 * identifier of an entity that provides SAML-based services 175 (such as a SAML authority, requester, or responder) or is a participant in SAML profiles (such as a 176 * service provider supporting the browser SSO profile). Such an identifier can be used in the 177 * <Issuer> element to identify the issuer of a SAML request, response, or assertion, or within the 178 * <NameID> element to make assertions about system entities that can issue SAML requests, 179 * responses, and assertions. It can also be used in other elements and attributes whose purpose is 180 * to identify a system entity in various protocol exchanges.</para> <para>The syntax of such an 181 * identifier is a URI of not more than 1024 characters in length. It is RECOMMENDED that a system 182 * entity use a URL containing its own domain name to identify itself.</para> <para>The 183 * NameQualifier, SPNameQualifier, and SPProvidedID attributes MUST be omitted.</para></blockquote> 184 */ 185 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_ENTITY \ 186 "urn:oasis:names:tc:SAML:2.0:nameid-format:entity" 187 /** 188 * LASSO_SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT: 189 * 190 * <para>Name identifier format for SAML 2.0 federation.</para> 191 * 192 */ 193 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT \ 194 "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" 195 /** 196 * LASSO_SAML2_NAME_IDENTIFIER_FORMAT_TRANSIENT: 197 * 198 * <para>Name identifier format for temporary SAML 2.0 federation.</para> 199 */ 200 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_TRANSIENT \ 201 "urn:oasis:names:tc:SAML:2.0:nameid-format:transient" 202 #define LASSO_SAML2_NAME_IDENTIFIER_FORMAT_ENCRYPTED \ 203 "urn:oasis:names:tc:SAML:2.0:nameid-format:encrypted" 204 205 /* Attribute Names */ 206 207 /** 208 * LASSO_SAML2_ATTRIBUTE_NAME_EPR: 209 * 210 * Attribute name for tranmitting Discovery bootstrap EPR when using ID-WSF 2.0 framework. It must 211 * be used conjointly with #LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_URI as format for the attribute 212 * element. 213 */ 214 #define LASSO_SAML2_ATTRIBUTE_NAME_EPR "urn:liberty:disco:2006-08:DiscoveryEPR" 215 216 /* Attribute Name Format */ 217 218 /** 219 * LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_UNSPECIFIED: 220 * 221 * Attribute format whose interpretation is left to individual implementations. 222 */ 223 #define LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_UNSPECIFIED "urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified" 224 225 /** 226 * LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_URI: 227 * 228 * From saml-core-2.0-os.pdf: 229 * <blockquote>The attribute name follows the convention for URI references [RFC 2396], for example 230 * as used in XACML attribute identifiers. The interpretation of the URI content or naming 231 * scheme is 232 application- specific. See [SAMLProf] for attribute profiles that make use of this identifier.</blockquote> 233 */ 234 #define LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_URI "urn:oasis:names:tc:SAML:2.0:attrname-format:uri" 235 236 /** 237 * LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_BASIC: 238 * 239 * Attribute format whose names are in the xs:Name domain. 240 */ 241 #define LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_BASIC "urn:oasis:names:tc:SAML:2.0:attrname-format:basic" 242 243 /* Actions */ 244 245 /* Actions are used by the Authorization profile */ 246 247 /** 248 * LASSO_SAML2_ACTION_NAMESPACE_RWEDC: 249 * 250 * Namespace for actions among: Read, Write, Execute, Delete and Control. 251 */ 252 #define LASSO_SAML2_ACTION_NAMESPACE_RWEDC "urn:oasis:names:tc:SAML:1.0:action:rwedc" 253 254 /** 255 * LASSO_SAML2_ACTION_NAMESPACE_RWEDC_NEGATION: 256 * 257 * Namespace for actions among: Read, Write, Execute, Delete and Control and their negations, ~Read, 258 * ~Write, ~Execute, ~Delete, ~Control. 259 */ 260 #define LASSO_SAML2_ACTION_NAMESPACE_RWEDC_NEGATION "urn:oasis:names:tc:SAML:1.0:action:rwedc-negation" 261 262 /** 263 * LASSO_SAML2_ACTION_NAMESPACE_GHPP: 264 * 265 * Namespace for actions among: GET, HEAD, PUT, POST. 266 */ 267 #define LASSO_SAML2_ACTION_NAMESPACE_GHPP "urn:oasis:names:tc:SAML:1.0:action:ghpp" 268 269 /** 270 * LASSO_SAML2_ACTION_NAMESPACE_UNIX: 271 * 272 * Namespace for actions represented by a four digit numeric code in octal value, as Unix file 273 * permissions codes. 274 */ 275 #define LASSO_SAML2_ACTION_NAMESPACE_UNIX "urn:oasis:names:tc:SAML:1.0:action:unix" 276 277 /* Individual actions */ 278 #define LASSO_SAML2_ACTION_RWEDC_READ "Read" 279 #define LASSO_SAML2_ACTION_RWEDC_WRITE "Write" 280 #define LASSO_SAML2_ACTION_RWEDC_EXECUTE "Execute" 281 #define LASSO_SAML2_ACTION_RWEDC_DELETE "Delete" 282 #define LASSO_SAML2_ACTION_RWEDC_CONTROL "Control" 283 #define LASSO_SAML2_ACTION_RWEDC_NEGATION "~" 284 285 #define LASSO_SAML2_ACTION_GHPP_GET "GET" 286 #define LASSO_SAML2_ACTION_GHPP_HEAD "HEAD" 287 #define LASSO_SAML2_ACTION_GHPP_PUT "PUT" 288 #define LASSO_SAML2_ACTION_GHPP_POST "POST" 289 290 /* Consent */ 291 #define LASSO_SAML2_CONSENT_OBTAINED "urn:oasis:names:tc:SAML:2.0:consent:obtained" 292 #define LASSO_SAML2_CONSENT_PRIOR "urn:oasis:names:tc:SAML:2.0:consent:prior" 293 #define LASSO_SAML2_CONSENT_IMPLICIT "urn:oasis:names:tc:SAML:2.0:consent:current-implicit" 294 #define LASSO_SAML2_CONSENT_EXPLICIT "urn:oasis:names:tc:SAML:2.0:consent:current-explicit" 295 #define LASSO_SAML2_CONSENT_UNAVAILABLE "urn:oasis:names:tc:SAML:2.0:consent:unavailable" 296 #define LASSO_SAML2_CONSENT_INAPPLICABLE "urn:oasis:names:tc:SAML:2.0:consent:inapplicable" 297 298 /* Status Code */ 299 #define LASSO_SAML2_STATUS_CODE_SUCCESS "urn:oasis:names:tc:SAML:2.0:status:Success" 300 #define LASSO_SAML2_STATUS_CODE_REQUESTER "urn:oasis:names:tc:SAML:2.0:status:Requester" 301 #define LASSO_SAML2_STATUS_CODE_RESPONDER "urn:oasis:names:tc:SAML:2.0:status:Responder" 302 #define LASSO_SAML2_STATUS_CODE_VERSION_MISMATCH \ 303 "urn:oasis:names:tc:SAML:2.0:status:VersionMismatch" 304 #define LASSO_SAML2_STATUS_CODE_AUTHN_FAILED "urn:oasis:names:tc:SAML:2.0:status:AuthnFailed" 305 #define LASSO_SAML2_STATUS_CODE_INVALID_ATTR_NAME \ 306 "urn:oasis:names:tc:SAML:2.0:status:InvalidAttrNameOrValue" 307 #define LASSO_SAML2_STATUS_CODE_INVALID_NAME_ID_POLICY \ 308 "urn:oasis:names:tc:SAML:2.0:status:InvalidNameIDPolicy" 309 #define LASSO_SAML2_STATUS_CODE_NO_AUTHN_CONTEXT \ 310 "urn:oasis:names:tc:SAML:2.0:status:NoAuthnContext" 311 #define LASSO_SAML2_STATUS_CODE_NO_AVAILABLE_IDP \ 312 "urn:oasis:names:tc:SAML:2.0:status:NoAvailableIDP" 313 #define LASSO_SAML2_STATUS_CODE_NO_PASSIVE \ 314 "urn:oasis:names:tc:SAML:2.0:status:NoPassive" 315 #define LASSO_SAML2_STATUS_CODE_NO_SUPPORTED_IDP \ 316 "urn:oasis:names:tc:SAML:2.0:status:NoSupportedIDP" 317 #define LASSO_SAML2_STATUS_CODE_PARTIAL_LOGOUT \ 318 "urn:oasis:names:tc:SAML:2.0:status:PartialLogout" 319 #define LASSO_SAML2_STATUS_CODE_PROXY_COUNT_EXCEEDED \ 320 "urn:oasis:names:tc:SAML:2.0:status:ProxyCountExceeded" 321 #define LASSO_SAML2_STATUS_CODE_REQUEST_DENIED \ 322 "urn:oasis:names:tc:SAML:2.0:status:RequestDenied" 323 #define LASSO_SAML2_STATUS_CODE_REQUEST_UNSUPPORTED \ 324 "urn:oasis:names:tc:SAML:2.0:status:RequestUnsupported" 325 #define LASSO_SAML2_STATUS_CODE_REQUEST_VERSION_DEPRECATED \ 326 "urn:oasis:names:tc:SAML:2.0:status:RequestVersionDeprecated" 327 #define LASSO_SAML2_STATUS_CODE_REQUEST_VERSION_TOO_HIGH \ 328 "urn:oasis:names:tc:SAML:2.0:status:RequestVersionTooHigh" 329 #define LASSO_SAML2_STATUS_CODE_REQUEST_VERSION_TOO_LOW \ 330 "urn:oasis:names:tc:SAML:2.0:status:RequestVersionTooLow" 331 #define LASSO_SAML2_STATUS_CODE_RESOURCE_NOT_RECOGNIZED \ 332 "urn:oasis:names:tc:SAML:2.0:status:ResourceNotRecognized" 333 #define LASSO_SAML2_STATUS_CODE_TOO_MANY_RESPONSES \ 334 "urn:oasis:names:tc:SAML:2.0:status:TooManyResponses" 335 #define LASSO_SAML2_STATUS_CODE_UNKNOWN_ATTR_PROFILE \ 336 "urn:oasis:names:tc:SAML:2.0:status:UnknownAttrProfile" 337 #define LASSO_SAML2_STATUS_CODE_UNKNOWN_PRINCIPAL \ 338 "urn:oasis:names:tc:SAML:2.0:status:UnknownPrincipal" 339 #define LASSO_SAML2_STATUS_CODE_UNSUPPORTED_BINDING \ 340 "urn:oasis:names:tc:SAML:2.0:status:UnsupportedBinding" 341 342 /* AuthnClassRef */ 343 344 #define LASSO_SAML2_AUTHN_CONTEXT_AUTHENTICATED_TELEPHONY \ 345 "urn:oasis:names:tc:SAML:2.0:ac:classes:AuthenticatedTelephony" 346 #define LASSO_SAML2_AUTHN_CONTEXT_INTERNET_PROTOCOL \ 347 "urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocol" 348 #define LASSO_SAML2_AUTHN_CONTEXT_INTERNET_PROTOCOL_PASSWORD \ 349 "urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocolPassword" 350 #define LASSO_SAML2_AUTHN_CONTEXT_KERBEROS \ 351 "urn:oasis:names:tc:SAML:2.0:ac:classes:Kerberos" 352 #define LASSO_SAML2_AUTHN_CONTEXT_MOBILE_ONE_FACTOR_CONTRACT \ 353 "urn:oasis:names:tc:SAML:2.0:ac:classes:MobileOneFactorContract" 354 #define LASSO_SAML2_AUTHN_CONTEXT_MOBILE_ONE_FACTOR_UNREGISTERED \ 355 "urn:oasis:names:tc:SAML:2.0:ac:classes:MobileOneFactorUnregistered" 356 #define LASSO_SAML2_AUTHN_CONTEXT_MOBILE_TWO_FACTOR_CONTRACT \ 357 "urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorContract" 358 #define LASSO_SAML2_AUTHN_CONTEXT_MOBILE_TWO_FACTOR_UNREGISTERED \ 359 "urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorUnregistered" 360 #define LASSO_SAML2_AUTHN_CONTEXT_NOMAD_TELEPHONY \ 361 "urn:oasis:names:tc:SAML:2.0:ac:classes:NomadTelephony" 362 #define LASSO_SAML2_AUTHN_CONTEXT_PERSONALIZED_TELEPHONY \ 363 "urn:oasis:names:tc:SAML:2.0:ac:classes:PersonalizedTelephony" 364 #define LASSO_SAML2_AUTHN_CONTEXT_PGP \ 365 "urn:oasis:names:tc:SAML:2.0:ac:classes:PGP" 366 #define LASSO_SAML2_AUTHN_CONTEXT_PASSWORD_PROTECTED_TRANSPORT \ 367 "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport" 368 #define LASSO_SAML2_AUTHN_CONTEXT_PASSWORD \ 369 "urn:oasis:names:tc:SAML:2.0:ac:classes:Password" 370 #define LASSO_SAML2_AUTHN_CONTEXT_PREVIOUS_SESSION \ 371 "urn:oasis:names:tc:SAML:2.0:ac:classes:PreviousSession" 372 #define LASSO_SAML2_AUTHN_CONTEXT_SMARTCARD \ 373 "urn:oasis:names:tc:SAML:2.0:ac:classes:Smartcard" 374 #define LASSO_SAML2_AUTHN_CONTEXT_SMARTCARD_PKI \ 375 "urn:oasis:names:tc:SAML:2.0:ac:classes:SmartcardPKI" 376 #define LASSO_SAML2_AUTHN_CONTEXT_SOFTWARE_PKI \ 377 "urn:oasis:names:tc:SAML:2.0:ac:classes:SoftwarePKI" 378 #define LASSO_SAML2_AUTHN_CONTEXT_SPKI \ 379 "urn:oasis:names:tc:SAML:2.0:ac:classes:SPKI" 380 #define LASSO_SAML2_AUTHN_CONTEXT_SECURE_REMOTE_PASSWORD \ 381 "urn:oasis:names:tc:SAML:2.0:ac:classes:SecureRemotePassword" 382 #define LASSO_SAML2_AUTHN_CONTEXT_TLS_CLIENT \ 383 "urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient" 384 #define LASSO_SAML2_AUTHN_CONTEXT_X509 \ 385 "urn:oasis:names:tc:SAML:2.0:ac:classes:X509" 386 #define LASSO_SAML2_AUTHN_CONTEXT_TELEPHONY \ 387 "urn:oasis:names:tc:SAML:2.0:ac:classes:Telephony" 388 #define LASSO_SAML2_AUTHN_CONTEXT_TIME_SYNC_TOKEN \ 389 "urn:oasis:names:tc:SAML:2.0:ac:classes:TimeSyncToken" 390 #define LASSO_SAML2_AUTHN_CONTEXT_XMLDSIG \ 391 "urn:oasis:names:tc:SAML:2.0:ac:classes:XMLDSig" 392 #define LASSO_SAML2_AUTHN_CONTEXT_UNSPECIFIED \ 393 "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified" 394 395 396 /* Confirmation methods */ 397 398 #define LASSO_SAML2_CONFIRMATION_METHOD_BEARER "urn:oasis:names:tc:SAML:2.0:cm:bearer" 399 #define LASSO_SAML2_CONFIRMATION_METHOD_HOLDER_OF_KEY "urn:oasis:names:tc:SAML:2.0:cm:holder-of-key" 400 401 /* POST and GET request fields */ 402 #define LASSO_SAML2_FIELD_ENCODING "SAMLEncoding" 403 #define LASSO_SAML2_FIELD_RESPONSE "SAMLResponse" 404 #define LASSO_SAML2_FIELD_REQUEST "SAMLRequest" 405 #define LASSO_SAML2_FIELD_ARTIFACT "SAMLart" 406 #define LASSO_SAML2_FIELD_RELAYSTATE "RelayState" 407 #define LASSO_SAML2_FIELD_SIGNATURE "Signature" 408 #define LASSO_SAML2_FIELD_SIGALG "SigAlg" 409 410 /* SAML 2.0 Attribute Profiles */ 411 412 #define LASSO_SAML2_ATTRIBUTE_PROFILE_BASIC "urn:oasis:names:tc:SAML:2.0:profiles:attribute:basic" 413 #define LASSO_SAML2_ATTRIBUTE_PROFILE_X500 "urn:oasis:names:tc:SAML:2.0:profiles:attribute:X500" 414 #define LASSO_SAML2_ATTRIBUTE_PROFILE_UUID "urn:oasis:names:tc:SAML:2.0:profiles:attribute:UUID" 415 #define LASSO_SAML2_ATTRIBUTE_PROFILE_DCE "urn:oasis:names:tc:SAML:2.0:profiles:attribute:DCE" 416 417 /* SAML 2.0 SSO Profile */ 418 419 #define LASSO_SAML2_ECP_PROFILE_WANT_AUTHN_SIGNED "urn:oasis:names:tc:SAML:2.0:profiles:SSO:ecp:2.0:WantAuthnRequestsSigned" 420 421 /* SAML 2.0 Conditions */ 422 423 #define LASSO_SAML2_CONDITIONS_DELEGATION "urn:oasis:names:tc:SAML:2.0:conditions:delegation" 424 425 426 #endif /* __LASSO_SAML2_STRINGS_H__ */ 427