For POST single sign-on, Idp1 is required to sign assertions. It has to sign the assertion using a private key stored in its Federation Manager key database.
Note: The example assumes you have a file from which you can import keys and certificates or that you already have private keys and certificates in the Federation Manager key database that you can use for signing and verification tasks.
To configure signing
The View Federation Partnerships window displays.
You must deactivate a partnership prior to editing it.
The dialog for the first step of the Partnership wizard opens.
The Import Certificate/Private Key window opens.
You return to the View Federation Partnerships window.
You return to the View Federation Partnerships window.
Use the Federation Manager stop and start shortcuts as follows:
a. Open a command window.
b. Run the following scripts:
federation_mgr_home/fedmanager.sh stop
federation_mgr_home/fedmanager.sh start
When you run the fedmanager.sh script, it sources the Federation Manager environment script, ca_federation_env.ksh.
Note: Do not stop and start the services as the root user. You must be a non-root user.
Restarting the services makes Federation Manager aware of the changes to signing.
Signature processing is now configured at the IdP.
| Copyright © 2010 CA. All rights reserved. | Email CA about this topic |