The Signature and Encryption step in the Partnership wizard lets you define how Federation Manager uses private keys and certificates to do the following:
Note: For SAML 2.0 POST binding, you are required to sign assertions.
There can be multiple private keys and certificates in the key database. If you have multiple federated partners, you can use a different key pair for each partner.
Note: For a Federation Manager system operating in FIPS_COMPAT or FIPS_MIGRATE mode, all FIPS and non-FIPS certificate and key entries in the key database are available in the respective pull-down lists. If your Federation Manager system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
To configure signing options
By completing this field, you are indicating which private key the asserting party uses to sign assertions, single logout requests and responses.
Note: You can click Help for a description of fields, controls, and their respective requirements.
By completing this field, you are indicating which certificate verifies signed authentication requests or single logout requests or responses. If there is no certificate in the database, click Import to import one.
Restart the Federation Manager services according to your platform.
Use the Federation Manager stop and start shortcuts as follows:
a. Open a command window.
b. Run the following scripts:
federation_mgr_home/fedmanager.sh stop
federation_mgr_home/fedmanager.sh start
When you run the fedmanager.sh script, it sources the Federation Manager environment script, ca_federation_env.ksh.
Note: Do not stop and start the services as the root user. You must be a non-root user.
You have to activate a partnership for all configuration changes to take affect and for the partnership to become available for use. Restarting the services is not sufficient.
If you are using Federation Manager in a test environment, you may want to disable signature processing to simplify testing. Click the Disable Signature Processing checkbox to accomplish this.
Important! Signature processing must be enabled in a SAML 2.0 production environment.
To configure encryption options
This certificate encrypts assertion data. If there is no certificate in the database, click Import to import one.
These algorithms are defined by the W3C XML Syntax and Processing standards.
Important! For the following block/key algorithm combinations, the minimum key size required for the certificate is 1024 bits.
Encryption Key Algorithm: RSA-OEAP
Encryption Key Algorithm: RSA-OEAP
Note: To use the AES-256 bit encryption block algorithm, install Sun's Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files. You can download these files from http://java.sun.com/javase/downloads/index.jsp.
Restart the Federation Manager services according to your platform.
Use the Federation Manager stop and start shortcuts as follows:
a. Open a command window.
b. Run the following scripts:
federation_mgr_home/fedmanager.sh stop
federation_mgr_home/fedmanager.sh start
When you run the fedmanager.sh script, it sources the Federation Manager environment script, ca_federation_env.ksh.
Note: Do not stop and start the services as the root user. You must be a non-root user.
The signing and encryption configuration is complete.
Remember, you always have to activate a partnership for it to be available. Restarting the services does not accomplish this task.
| Copyright © 2010 CA. All rights reserved. | Email CA about this topic |