In specific scenarios, sending a single-value authentication context rather than a multi-value context may be necessary to meet application requirements. This article will explore whether the session.amr variable's default multi-value behavior can be altered.
- Single Sign-On
- Dynamic Authentication Context
- session.amr
As per RFC8176, it is expected behavior to include specific authentication methods when mfa is present. The session.amr variable's default multi-value behavior can not be altered.
For example, when using a password with Okta Verify as a second factor, the following multi-value context will be seen in the attribute statement:
<saml:Attribute Name="amr" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
<saml:AttributeValue xsi:type="xs:string">pwd</saml:AttributeValue>
<saml:AttributeValue xsi:type="xs:string">mfa</saml:AttributeValue>
<saml:AttributeValue xsi:type="xs:string">swk</saml:AttributeValue>
</saml:Attribute>