The CA Performance Center administrator must set parameters for SAML authentication using the Single Sign-On Configuration Tool. Take these steps on all servers where a data source is installed whose users will authenticate using SAML 2.0.
Note: Multiple authentication schemes can be in use simultaneously. For example, users of a CA Network Flow Analysis data source can use LDAP to log in, while users of CA Infrastructure Management are using SAML 2.0.
Follow these steps:
Log in as root or with the 'sudo' command.
[InstallationDirectory]/CA/PerformanceCenter
You are prompted to select an option. The available options correspond to CA applications running on the local server.
You are prompted to select an option.
You are prompted to specify the priority.
The Priority parameter only applies to CA Performance Center.
Refers to settings that only administrators can change. Such settings are propagated to all other CA products registered to this instance of CA Performance Center. Remote Value settings are only used if a corresponding Local Override value is not present.
Refers to settings that can be changed for all products. If a Local Override value is present, it takes precedence over both the Remote Value and default settings.
You are prompted to select a property to configure.
To supply values for the SAML2 properties, enter u to update the value and then enter a new value.
You are prompted to select an option.
Defines the user account to which authorized SAML users are mapped. The role and product privileges that are associated with the user account you specify are applied to all users who successfully authenticate.
Default: Blank.
Example: Enter 'user' if you want all users to log in with user-level privileges.
Note: An existing user account is required.
The user accounts configured on the IdP are sent to CA Performance Center when the agreement is established. They appear in the User List on the Manage Users Admin page, where they can be edited.
Enables security and encryption for communications between CA Performance Center and the IdP.
Default: Disabled
You are prompted to choose an option.
Note: This setting must match the setting on the IdP.
Specifies whether users are required to reauthenticate after a timeout period expires. Enable this parameter to allow the IdP to perform a passive reauthentication ('auto-reauthentication'), with no user interaction.
The next parameter lets you set the duration of the timeout period.
Default: Disabled.
Sets the length of time that passes before a passive reauthentication is performed. If the 'SAML2 Auto-Reauthentication' parameter is disabled, this parameter is ignored.
Value: Must be less than the value for the 'IdP Session Timeout' parameter.
Default: None.
Sets the length of time that passes before the session established between CA Performance Center and the Identity Provider is closed automatically. For example, enter '10' to set a 10-minute timeout.
The value must be greater than the value specified for the 'Auto-Reauthentication Duration' parameter. Otherwise, no session exists to perform the reauthentication. And the value must match the value set in the security properties file for the 'saml.idp.sessionTimeout' parameter. For more information, see Preparing the Security Properties File.
Default: None.
The metadata file supplies the identity provider with the parameters to use when authenticating users.
You are asked to supply a directory path and filename.
/tmp/CAPCMetadata.xml
The file is generated automatically, based on the settings you selected in the Configuration Tool.
You see a printout of the XML if the export operation succeeds. If the operation fails, you see an error message.
The Configuration Tool closes.
|
Copyright © 2013 CA.
All rights reserved.
|
|