Previous Topic: Signature and Encryption Tasks at a SAML 2.0 IdP

Next Topic: Application Integration

Signature and Encryption Tasks at a SAML 2.0 SP

The Signature and Encryption step in the Partnership wizard lets you define how Federation Manager uses private keys and certificates to do the following:

There can be multiple private keys and certificates in the key database. If you have multiple federated partners, you can use a different key pair for each partner.

Note: For a Federation Manager system operating in FIPS_COMPAT or FIPS_MIGRATE mode, all FIPS and non-FIPS certificate and key entries in the key database are available in the respective pull-down lists. If your Federation Manager system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.

To configure signing options

  1. Begin by selecting the Signature and Encryption step in the Partnership wizard.
  2. In the Signature group box, select an alias from the key database for the Signing Private Key Alias field. If there is no private key in the database, click Import to import one or click Generate to create a key pair and generate a certificate request.

    By completing this field, you are indicating which private key the relying party uses to sign authentication requests and single logout requests and responses.

    Note: Click Help for a description of fields, controls, and their respective requirements.

  3. Select the hash algorithm for digital signing in the Signing Algorithm field. The SP signs authentication requests and SLO-SOAP messages with the specified algorithm.

    Select the algorithm that best suits your application.

    RSAwithSHA256 is more secure than RSAwithSHA1 due to the greater number of bits used in the resulting cryptographic hash value.

    SiteMinder uses the algorithm you select for all signing functions.

  4. Select an alias from the key database for the Verification Certificate Alias field.

    By completing this field, you are indicating which certificate the relying party uses to verify signed assertions or single logout requests and responses. If there is no certificate in the database, click Import to import one.

  5. (Optional) Select the Sign Authentication Requests if you want authentication requests to be signed. If the remote asserting party requires the authentication requests to be signed, you must check this option.
  6. (Optional) If you import a new key in step 3, restart the Federation Manager services for the changes to take place immediately. If you do not restart the services, you may have to wait up to 60 minutes for Federation Manager to become aware of the changes.

    Restart the services according to your platform:

    Note:

    Do not stop and start the services as the root user.

    You have to activate a partnership for all configuration changes to take affect and for the partnership to become available for use. Restarting the services is not sufficient

If you are using Federation Manager in a test environment, you may want to disable signature processing to simplify testing. Click the Disable Signature Processing checkbox to accomplish this.

Important! Signature processing must be enabled in a SAML 2.0 production environment.

To configure encryption options

  1. In the Encryption group box, select one or both of the following check boxes to ensure the right data is encrypted in the received assertion:

    Note: To use the AES-256 bit encryption block algorithm, install Sun's Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files. You can download these files from http://java.sun.com/javase/downloads/index.jsp.

  2. Select the alias from the key database for the Decryption Private Key Alias.

    This private key decrypts any encrypted assertion data. If there is no certificate in the database, click Import to import one or click Generate to create a key pair and generate a certificate request.

  3. (Optional) If you import a new key in step 2, restart the Federation Manager services for the changes to take place immediately. If you do not restart the services, you may have to wait up to 60 minutes for Federation Manager to become aware of the changes.

    Restarting the services, requires the following:

    Note: If you do not run the environment script, you have to navigate to the directory federation_mgr_home/config where the start and stop scripts are located.

The signing and encryption configuration is complete.