How SAML Token Multistep Authentication, Sender-Vouches Works
This model does not require the assertion subject’s public and private keys bound to the SOAP document. The web service consumer’s public key is not supplied (by the web service consumer or the Policy Server) with a request. Upon validation of the request, the authentication service vouches for the web service consumer by generating a SAML token and binding it to the message body by signing them both with its private key using the sender-vouches subject confirmation method.
After the web service consumer is authenticated, the web service consumer goes through the authorization process. If the web service consumer is successfully authorized, the SOA Agent responds generating a WS‑Security SAML token signed using the token issuer’s private key.
Note: The sender-vouches SAML token is valid bound only to the original request message—it cannot be reused with other requests.
In this model, the web service consumer does not sign each XML document request, assuming the destination URL does not require a signed document.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |