

CA Strong Authentication Administration Guide › Managing Global CA AuthMinder Configurations › Configure ASSP
Configure ASSP
Adobe Signature Service Protocol (ASSP) is used to sign PDF documents by using CA SignFort. Before signing, users are authenticated using CA AuthMinder authentication methods. A SAML token is returned to the user after successful authentication. This token is then verified by the SignFort Server.
Follow these steps:
- Click the Services and Server Configurations tab on the main menu.
- Verify that the CA Strong Authentication tab in the submenu is active.
- Under ASSP, click the ASSP Configuration link to display the ASSP Configuration page.
- Select one of the following options:
- If you want to create a configuration, then enter the configuration name in the Configuration Name field.
- If you want to update an existing configuration, then select the configuration that you want to update from the Select Configuration list.
- Specify the CA Auth ID Roaming URL that will be used to download CA Auth ID PKIs in case of CA Auth ID PKI Roaming Download.
In the case of CA Auth ID PKI authentication, if the user does not have their CA Auth ID PKI present on their current system, then the CA Auth ID Roaming URL is used to authenticate to the CA AuthMinder Server and download the user’s CA Auth ID PKI.
- From Authentication Mechanism(s) to Enable, select the authentication method that will be used to authenticate the user before signing.
If you enable CA Auth ID authentication method, then select QnA because the QnA authentication method is used for roaming download of CA Auth ID PKI.
- If you enable Kerberos authentication method in the preceding step, then set the parameters required for Kerberos authentication in Kerberos Configurations section. Perform one of the following steps:
- Select the Use Windows Logon Credential option, if you want to use the Kerberos token of the CA AuthMinder Server process.
- Specify new credentials in the User Name, Password, and Domain Name fields for Kerberos authentication.
- In the SAML section:
- Select the SAML Signing Key in HSM option if you want to store the keys that are used for signing SAML assertions in Hardware Security Module (HSM). Else, the keys will be stored in the database.
- (HSM Only) Click Browse to upload the certificate that is used by the CA AuthMinder Server to issue the SAML token.
- Click Browse to upload the PKCS#12 file containing the key and the certificate that is used by the CA AuthMinder Server to issue the SAML token.
- Enter the password for the PKCS#12 file in the P12 File Password field.
- Enter the URL of the CA AuthMinder Server in the Issuer field.
- Enable the Single-Use Token option, if you want the SAML token to be used only once for authentication.
- In the Token Validity (in Seconds) field, enter the duration after which the SAML token cannot be used.
- In the Audience table, enter the details of the audience who can use the SAML token.
Click Add More to add more audiences.
- Click Save to save the ASSP configuration.
- Refresh all deployed CA AuthMinder Server instances.
See Refresh a Server Instance for instructions about the procedure.
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|