Previous Topic: (Optional) Configuring Custom Certificates in Sample ApplicationNext Topic: Verifying Adapter Integration


Configuring the Service Provider’s Application

This chapter provides an overview of how to integrate your SAML enabled applications with AFM. The JSPs explained in this chapter are available in the application_server_home\webapps\arcotafm\ directory.

Parameter

Description

SigAlg

The algorithm used by your application for signing the request.

Signature

The signature of the parameters as explained in the SAML Protocol.

SAMLRequest

Base64 encoded SAML request.

RelayState

This is an opaque reference to the state on the Service Provider’s side. This is an optional parameter.

Profile

This is the AFM profile created from Wizard. This defines the primary and secondary authentication mechanisms and other related configurations.

Processreq

This is used by AFM.

  1. Identity Provider Initiated Workflow: In this workflow the user can either directly hit the AFM URL or the Service Provider can redirect the user’s authentication request to AFM with the parameters described in the following table.

Parameter

Description

Profile

This is the AFM profile created from Wizard. This defines the primary and secondary authentication mechanism and other related configurations.

Processreq

This used by AFM.

If you are using the second approach (Step ), then you need to configure the AssertionConsumerServiceURL property in the saml_config.properties file. This property specifies the URL where the SAML response (generated after authentication) has to be posted back.

After user’s authentication request is processed, AFM generates a SAML response and sends it back to the Service Provider’s application. The Service Provider’s application needs to verify this response. You may need to configure the following properties based on your SAML Service Provider implementation: