- Tuakiri Core Attributes
- Number of values
- One or more
- Specifies the person's relationship(s) to the institution in broad categories.
- Only these values are allowed:
Value Meaning faculty Academic or research staff student Undergraduate or postgraduate student staff All staff employee Employee other than staff, e.g. contractor member Comprises all the categories named above, plus other members with normal institutional privileges, such as honorary staff or visiting scholar affiliate Relationship with the institution short of full member alum Alumnus/alumna (graduate) library-walk-in A person physically present in the library
- Notes on usage
- This attribute, like eduPersonScopedAffiliation, enables an
organisation to assert its relationship with the user. This addresses the
case where a resource is provided on a site licence basis, and the only access
requirement is that the user is a bona fide member of the organisation, or a
specific school or faculty within it. If there is a value in
eduPersonPrimaryAffiliation, that value should be stored here as well. This
attribute may appear suitable for controlling access to, for example, an
academic licensed commercial software package. However, this is usually not the
case; such licenses have greater constraints than just
eduPersonAffiliation=faculty. In most cases an academic user must also agree
to use the application for only academic purposes and perhaps accept
obligations such as acknowledging the owners or reporting results in a
Please see the Tuakiri IdP install manual section on scripted attributes that explains how to write a Shibboleth IdP script to present attribute:
- Notes on privacy
- eduPersonAffiliation should be used when the service
provider does not need confirmation of the security domain of the user.
Service providers who do need the security domain information should ask for
Several values of eduPersonAffiliation are regarded as being "contained" within other values: for example, the student value is contained within member. It is recommended that identity providers have the ability either to maintain these multiple values for a given individual, or otherwise provide the ability to release either value as appropriate for a particular relying party. For example, although some relying parties might require the release of the more specific student value, a different relying party that only requires the less specific member value should only be sent the less specific value. Releasing student in this case gives the relying party more information about the user than is required, raising privacy and data protection concerns.
Despite the recommendation above that identity providers should be conservative in what they send, relying parties are recommended to be liberal in what they accept. For example, a relying party requiring member affiliation should also accept student, staff, etc. as alternatives.