To obtain authentication information from digital signatures associated with incoming XML documents, you configure the XML DSIG authentication scheme.
Note: The following procedure assumes you are creating a new object. You can also copy the properties of an existing object to create an object. More information exists in Duplicate Policy Server Objects.
To configure the authentication scheme
The Create Authentication Scheme pane opens.
Authentication scheme settings open.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
Note: If the XML document uses raw XML, select the Must cover entire document option, because the entire document is the payload. With raw XML, no envelope headers or body tags exist to distinguish the payload from other content.
The authentication scheme is saved and may be assigned to application components (realms).
A certificate mapping defines how data in the certificate is mapped to form a user Distinguished Name (DN), which the Policy Server uses to authenticate the client.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |