Ok I did finally get this to successfully get through AWS Cognito User Pool and map the Assertion Attributes to the cognito user.
Since I noticed that in the SAMLRequest generated by AWS Cognito User Pool login had `<saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">` defined I did this setup.
In the `SPSSODescriptor` I added the following:
`<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:entity</NameIDFormat>` and updated my Trusted Relationship with this data.
I then also altered the shibboleth metadata that I downloaded via `https://<myserver>/idp/shibboleth` to also include the same NameIDFormat line and updated my SAML Provider definition in the AWS Cognito User Pool with the new metadata. I did this with the assumption that this would be describing the format that is supported by the SAML IDP.
Then in one of the documents I saw that the field used was also to be added to the Released Attributes in the Trusted Relationship so I added the `inum` attribute to the released attributes.
Then in the `saml-nameid.xml.vm` file I added this bean spec:
`
<bean parent="shibboleth.SAML2AttributeSourcedGenerator"
p:format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity"
p:attributeSourceIds="#{ {'inum'} }" />
`
Restarted the `identity` and `idp` services when I then I got no errors during the login process.
Out of these steps that I did to expose the nameid-format:entity was there some of the steps I did that are not necessary?