Open
Description
A normal SAML2 Response would have a clear AuthnStatement like the following example
<saml:AuthnStatement AuthnInstant="2021-01-24T13:41:04Z" SessionIndex="_dc2ad814-cb14-40d3-8e7f-d823193fd6a2">
<saml:AuthnContext>
<saml:AuthnContextClassRef>
urn:oasis:names:tc:SAML:2.0:ac:classes:Password
</saml:AuthnContextClassRef>
</saml:AuthnContext>
</saml:AuthnStatement>
a pySAML2 SP with a Responses with unvalued AuthStatement:
<saml:AuthnStatement AuthnInstant="2021-01-24T13:43:22Z" SessionIndex="_af1a9ca2-8279-4c6b-8442-1bd6dfd66617">
</saml:AuthnStatement>
Make the Authentication flow work SP side, this would be prevented.
With this, otherwise, we have an exception (quite good)
<!-- no AuthnStamentent at all ! -->
exception
ValueError: Invalid number of AuthnStatement found in Response: 0