Previous Topic: Remote Provisioning

Next Topic: Local Account Linking Configuration (SAML 2.0)

Delivery of Assertion Data to the Provisioning Application

To accomplish remote provisioning, Federation Manager redirects the browser with the assertion data to the provisioning application.

Federation Manager can pass the assertion data using one of three methods:

Legacy cookie

Delivers SAML assertion information in a legacy cookie generated by Federation Manager. The cookie contains a login ID based on the assertion data. If a legacy cookie is used, then the Federation Manager Java SDK must be installed on the system with the provisioning application so that the provisioning application can read the legacy cookie.

Note: If you use the legacy cookie, the Federation Manager system and the remote provisioning system must be in the same domain.

Open format cookie

Delivers SAML assertion information in an open format cookie. The cookie contains a login ID based on the assertion data.

Note: If you use the open format cookie, the Federation Manager system and the remote provisioning system must be in the same domain.

The cookie can be created in one of two ways:

HTTP headers

If proxy mode is used, this information can also be passed as HTTP headers. If you use HTTP headers, the Federation Manager system and the remote provisioning system can be in different domains.

The delivery option is configurable in the Application Integration step of the Partnership wizard.

After the user is redirected to the provisioning application, Federation Manager no longer has control over the process. If provisioning a user account is a time-consuming process, the provisioning application is responsible for handling this situation, for example, by sending a message to the user that provisioning is in process. This information lets the user know not to keep trying to log in before an user account is available.