Are there plans to support multiple SAML authentication context classes (RequestedAuthnContext) in an upcoming release of Directory Server? From the documentation, it appears that in the current release, only a single authentication class can be specified. In a future release, I would like to be able to allow users to authenticate either via password or X.509 based hardware security tokens.
Question
Question
Directory Server Support for Multiple SAML Authentication Context Classes
Answer
Hi David,
This is not on our roadmap at this time but it is recorded in our backlog and we'll consider it in the future (work item 218025 for your records).
One thing that's worth a shot is using value "urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified" though I am not sure if it will work in your use case.
Unspecified does indeed allow me to select either to authenticate in Azure AD using either password or hardware token, and successfully sign in to the Directory Server. Thanks for such a quick and helpful response.
Perfect, I'm glad to have helped!
I can confirm this solution worked for us as well! Thanks, Karim for finding this post.
Either specifying multiple contexts, having the ability to eliminate that ask in the SAML payload, and/or allowing the ability to force the reauth (forceAuthn="true") would be good.