A sample OpenID FCC is included with the product. The FCC is required to let users authenticate by:
By default, the FCC presents numerous OpenID providers. Contact the administrator and instruct them to display only those providers that the protected application supports by modifying the FCC.
Follow these steps:
<sps home>/proxy-engine/examples/siteminderagent/forms
Where <sps_home> specifies the SPS installation path. SPS is part of the CA CloudMinder product.
openid.fcc
var providers_large var providers_small
Example:
/*google : {
name : 'Google', url : 'https://www.google.com/accounts/o8/id'
},*/
Example:
}/*,
myprovider : {
name : 'MyProvider',
label : 'Enter your provider username',
url : 'http://ca.com/{username}/',
image : 'images/image.png'
}*/
Note: The separate provider sections correspond to the sizes of provider icons that the FCC displays:
/* */
Example:
myprovider : {
name : 'Foward Inc',
label : 'Enter your Forward Inc user name',
url : 'http://ca.com/{username}/',
image : 'images/image.png'
}
Note: Forward, Inc. is a fictitious company name that is used strictly for instructional purposes only and is not meant to reference an existing company.
Example:
myprovider : {
name : 'Foward Inc',
label : 'Enter your Forward Inc user name',
url : 'http://{username}.forwardinc.com/'
image : 'images/image.png'
}
Example:
myprovider : {
name : 'Foward Inc',
label : 'Enter your Forward Inc user name',
url : 'http://{username}.forwardinc.com/'
image : 'images/forwardinc.png'
}
Important! The default provider IDs include the following image index property:
imageidx
Do not remove or change the property. The property verifies that the FCC displays the correct provider icon.
The product provides an OpenID provider configuration file. The file must reference the configuration details of each provider that the protected application supports. If the file does not include the correct settings, authentication fails.
Important! The values are samples only. We recommend that you verify all configuration settings with your OpenID provider before deploying the authentication scheme.
Follow these steps:
siteminder_home\config\properties
Specifies the Policy Server installation path.
Openidproviders.xml
Example: You can enable Federal Identity, Credential, and Access Management (ICAM) compliance for one instance of the authentication scheme and can disable ICAM compliance for another.
<OpenIDProvider> </OpenIDProvider>
<TrustedOpenIDProviders> </TrustedOpenIDProviders>
Indicates the beginning of the configuration settings for a provider.
(Optional) Specifies the schema type that the provider supports.
Valid values: ax or sreg.
Default: ax.
Specifies the URL of the OpenID provider hosting the service. The value can include a comma–separated list of provider URLs.
Specifies the claims that the OpenID provider returns as part of the authentication request. If the provider cannot provide all of the required claims, authentication fails. This node requires at least one claim node.
Defines an individual required claim.
Specifies the URI form of the OpenID provider claim. The Policy Server constructs the authentication request using this value.
Important! Verify that the value of the first required claim maps to a user attribute in your user directories. The Policy Server determines the value of the first required claim that is based on the provider authentication response. The Policy Server then searches all user directories in the policy domain for a user that matches the claim value. If the Policy Server cannot map the claim value to a user attribute, authentication fails.
Value: The value must adhere to the type of schema that the provider supports.
(Optional) Defines the user-friendly name of the URI node value and prevents the URI from being stored or referenced. The system uses the alias to identify the claim.
Value: Any string.
Example: Instead of storing a URI that returns the first name of users in the session store, the system can reference the claim name as fullname.
Note: The system appends the following prefix to an alias that is stored in the session store:
smopenidclaim
(Optional) Specifies the optional claims that the OpenID provider is to return as part of the authentication request. If the provider cannot provide an optional claim, authentication does not fail. This node requires at least one claim node.
(Optional) Defines the properties that ICAM compliance requires. If you are configuring the authentication scheme for ICAM compliance, this node and all child nodes are required.
(Optional) Specifies the time for which the OpenID provider user session is valid. If the user session is valid, the OpenID provider authenticates the user for a protected resource using a provider–specific cookie. If the session expires, the user is prompted to reauthenticate.
Unit of measurement: seconds.
Default: 0.
If you leave the default value, the user must authenticate against the OpenID provider, regardless of a valid session.
Value: The value must be a positive integer.
(Optional) Specifies a comma–separated list of the ICAM policies to which the OpenID provider must adhere. If the provider does not adhere to the compliance level, authentication fails.
|
Copyright © 2014 CA.
All rights reserved.
|
|