Previous Topic: Multipart MIME StepNext Topic: Java-J2EE Steps


SAML Assertion Query

The SAML Assertion Query step lets you obtain a SAML assertion from an identity provider for use in a Web Service Execution step that uses a WS-Security SAML 1.x Assertion Token.

Prerequisites: A cursory understanding of what type of SAML Assertion Query that you must perform. Obtain this information from either the developer of the system that uses SAML Assertions as the form of identity security or from the identity provider administrator.

Parameter Requirements: At a minimum, know:

The SAML Assertion Query Editor has four tabs. The Editor tab lets you configure the query information. After you configure the query, you can test the query using the Test button in the Query section of the editor. After you test the query, you can view the raw request that was sent in the Last Request tab. You can view the raw SOAP response in the Raw Query Result tab. For example, if the query returned multiple assertions, you can see the assertions in the Raw Query Result tab. You can view the step response in the Last Response tab. The Last Response tab shows, for example, what is used in the Web Service WS-Security token.

The Advanced button lets you enter more information.

SAML Assertion Query step Advanced Settings

Select the Add Signature check box.

Keystore File

The location of the keystore file.

Keystore Password

Enter the password for the keystore.

Keystore Alias

Enter an alias for a private key.

Alias Password

Leave empty or make the same as Keystore Password for PKCS #12 files.

Signature Algorithm

Select DSA with SHA-1.

Digest Algorithm

Values: SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160, or MD5 (not recommended).

Connection

This information describes where the SAML Query API server is and how to connect to it.

Endpoint

The URL to the SAML Query API of the identity provider.

SSL Keystore

To use client-side identification certificates to connect to the endpoint, select the keystore file using the Select button. Or, select a previously entered item from the pull-down list or enter one manually.

SSL Keystore Password

The password for the SSL Keystore if used.

SAML Version

The SAML version to use to query the identity provider.

Subject

This information describes the recipient of a SAML assertion. The subject could be a user, user group, or other entity for which you want to provide an assertion about the current authorization/privileges.

Name

The name of the entity (for example, username).

Name Qualifier

A group or categorization that is used to qualify the Name (for example, domain).

Format

This field describes what format the name is being sent (for example, Full Name as opposed to Username).

Confirmation Methods

Select which confirmation method types you want to include in the query. The query only returns assertions that contain at least one of the specified types. If you leave all types cleared, the query returns any assertion regardless of the confirmation method.

Response (deprecated)

This information describes which assertion statements you want to be returned as part of the SAML Assertion. Response is deprecated as of SAML 1.1.

Local Part

The element name (for example, AuthenticationStatement, AuthorizationDecisionStatement, and AttributeStatement).

Namespace

The element namespace (for example, urn:oasis:names:tc:SAML:1.0:assertion).

Click Add LISA-- icon_image_whiteplussign to add more XML elements to the set to be returned.

Click Delete con_image_whitetrashcanbluebackground to remove any elements you have already added.

Query

A description of which type of query to perform. The query types are:

Attribute

An attribute query responds with a set of attribute statements. For example, it could tell you which groups a subject is a member of.

Resource

To limit your query to a specific resource (for example, a specific web service, domain, file) specify the resource name.

Attribute Designators

A name and namespace (like XML elements) identifies each attribute. You can filter the set of attribute statements that are returned by specifying each attribute type to be returned.

Example:

Name = urn:mace:dir:attribute-def:eduPersonScopedAffiliation, Namespace = urn:mace:shibboleth:1.0:attributeNamespace:uri)

 

Authorization

Used to request authentication statements that are related to a specific Subject SAML Assertions.

Authorization Method

This parameter limits your query to returning Authorization Statements that are for a specific authorization method.

Example:

urn:oasis:names:tc:SAML:1.0:am:X509-PKI, urn:oasis:names:tc:SAML:1.0:am:PGP, urn:oasis:names:tc:SAML:1.0:am:password

A set of predefined authorization methods is available from the pull-down list.

 

Authorization Decision

Used to request SAML Assertions for specific actions that a subject wants to perform, given the evidence.

Resource

To limit your query to a specific resource (for example, a specific web service, domain, or file), specify the resource name.

Actions

Specify at least one action for which to request authorization to perform (for example: login, view, edit) specified with a name (Data) and Namespace (like an XML element).

Evidence (Assertions)

(Optionally) Specify one or more SAML Assertions to include with the Authorization Decision Query as advice to the Identity Provider. Specify the property that holds the SAML Assertion XML. To use the response from a previous step (for example, another SAML Assertion Query or Parse Text step) use lisa.<stepname>.rsp.

Evidence (Reference IDs)

Optionally specify assertion reference IDs.