Previous Topic: Name ID and Attributes for the Assertion (Asserting Party)

Next Topic: Single Sign-on Configuration (Relying Party)

Single Sign-on Configuration (Asserting Party)

When you configure single sign-on at the asserting party, you specify how the asserting party delivers an assertion to a relying party.

Note: Only one single sign-on session is persisted in a browser. The session information is stored in the FEDSESSION cookie. If you access another partnership in the same browser, the FEDSESSION cookie is not valid, unless the underlying user directory is the same as the previously accessed partnership during the same browser session.

To configure single sign-on at the asserting party

  1. Begin at the appropriate step in the Partnership wizard.

    Note: You can click Help for a description of fields, controls, and their respective requirements.

  2. Select an option for the Authentication Mode in the Authentication group box.
  3. Select the Authentication Type for the authentication mode you chose. The options change depending on whether you are using local or delegated authentication.
  4. For Delegated Authentication only, configure the required parameters for the type of delegated authentication you chose.

    Open-format Cookie

    If user identity information is being passed from the third-party WAM in a FIPS-encrypted cookie, configure the Delegated Authentication URL. The open format cookie is the only FIPS-compatible option for delegated authentication. This URL redirects the request to the WAM system if the user comes to Federation Manager first. The URL does not apply when user goes to the WAM first.

    Note: If you select Legacy Cookie or Open-format Cookie as the Delegated Authentication Type, configure the required global cookie settings. Locate the deployment settings by navigating to Infrastructure, Deployment Settings.

  5. Complete the Authentication Class field by entering a URI for the user authentication method you want to use. This URI is placed in the AuthnContextClassRef element in the assertion to describe how a user is authenticated.

    Guidelines:

  6. Complete the required fields in the SSO group box to configure how single sign-on operates:

    Be aware of the following guidelines:

  7. Specify the URL for the Assertion Consumer Service. This service is the service at the relying party that processes received assertions.

Any values defined during the creation or import of the remote relying party are already filled in.

This procedure completes SSO configuration for the asserting party.

More information:

Back Channel Authentication for Artifact SSO

Assertion Validity for Single Sign-on

Enhanced Client or Proxy Profile (ECP)

Delegated Authentication for Federation Users


Copyright © 2010 CA. All rights reserved. Email CA about this topic