In the Signature and Encryption step, define how Federation Manager uses private keys and certificates to do the following tasks:
Note: For SAML 2.0 POST binding, the IdP is required to sign assertions.
The certificate data store holds multiple private keys and certificates. If you have multiple federated partners, you can use a different key pair for each partner.
Note: For a Federation Manager system operating in FIPS_COMPAT or FIPS_MIGRATE mode, all certificate and key entries are available from pull-down lists. If your system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
Follow these steps:
By completing this field, you are indicating which private key the relying party uses to sign authentication requests and single logout requests and responses.
Note: Click Help for a description of fields, controls, and their respective requirements.
Select the algorithm that best suits your application.
RSAwithSHA256 is more secure than RSAwithSHA1 due to the greater number of bits used in the resulting cryptographic hash value.
SiteMinder uses the algorithm that you select for all signing functions.
By completing this field, you are indicating which certificate the relying party uses to verify signed assertions or single logout requests and responses. If there is no certificate in the certificate data store, click Import to import one.
Important! Signature processing must be enabled in a SAML 2.0 production environment. However, in a test environment, check the Disable Signature Processing check box to simplify testing.
Follow these steps:
Note: To use the AES-256 bit encryption block algorithm, install the Sun Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files. Download these files from http://java.sun.com/javase/downloads/index.jsp.
This private key decrypts any encrypted assertion data. If there is no certificate in the data store, import one or generate a certificate request.
The signing and encryption configuration is complete.
| Copyright © 2012 CA. All rights reserved. |
|