Authentication context class reference
The Pointsharp authentication context mapper determines and sets the SAML AuthnContextClassRef using authentication context information, including multi-factor authentication. The mapper supports flexible configuration for different authentication scenarios and integration needs.
Configure authentication context
-
Open the Pointsharp IdP Admin GUI.
-
Select the realm you want to configure.
-
Go to Clients and select your client.
-
Click the Client scopes tab.
-
Click the dedicated scope.
-
Click Configure a new mapper (select add "by configuration" if mappers already exist).
-
Configure the mapper.
-
Click Save.
AuthnContextClassRef
Select the default AuthnContextClassRef to set when multi-factor authentication is detected.
Available options
-
urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified (Default)
-
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
-
urn:oasis:names:tc:SAML:2.0:ac:classes:SmartcardPKI
-
urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient
-
urn:oasis:names:tc:SAML:2.0:ac:classes:TimeSyncToken
-
urn:federation:authentication:windows
-
http://schemas.microsoft.com/claims/multipleauthn (Microsoft Entra ID Multi-factor)
-
custom (Use custom URI)
Custom AuthnContextClassRef
Select Custom to specify a custom AuthnContextClassRef URI.
All custom URIs are validated for security before use.
Force authentication context
Forces the use of the selected AuthnContextClassRef value, regardless of the authentication context.
Default: false
| This option bypasses all authentication validation. Use with extreme caution in production environments. |
Session note mappings
The mapper can be configured to read multiple incoming session notes with specific values, and map to their corresponding AuthnContextClassRef.
The first matching mapping is applied based on priority order from top to bottom.
Session note mapping options
-
Dynamic Addition: Allows session notes to be added automatically during authentication. Use the "+" button to create additional mappings.
-
Dynamic Removal: Allows session notes to be removed during authentication. Use the "-" button to remove unwanted session note mappings.
-
Reordering: Drag and drop to change priority order.
-
No Limits: Add as many mappings as needed.
Examples
[+ Add / allow] [- Remove / deny]
SESSIONNOTE=VALUE->AuthnContextClassRef
Basic Authentication Level Mapping
AUTH_LEVEL=high\->urn:oasis:names:tc:SAML:2.0:ac:classes:SmartcardPKI
AUTH_LEVEL=medium->urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
Configuration scenarios
Custom mapper
Set Authentication Context Class Reference (ACR) based on session notes set by custom mapper.
Configuration
AuthnContextClassRef: urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified Force Authentication Context: ☐ Disabled Session Note Mappings: [+] CUSTOM_NOTE1=mobile->urn:oasis:names:tc:SAML:2.0:ac:classes:TwoFactorMobileAuth [+] CUSTOM_NOTE2=desktop->urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport Custom Session Note: (empty)
Processing logic
-
Force Authentication Context: If enabled, uses configured default (highest priority).
-
Session Note Mappings: Checks configured mappings for exact matches.
-
Custom Session Note: Checks single custom session note for MFA indication.
-
Standard MFA Detection: Uses Pointsharp IdP’s standard MFA detection methods.
-
Default Fallback: Uses default
AuthnContextClassRefif nothing matches.