To obtain security information from WS‑Security headers in incoming XML messages, you must configure the WS‑Security authentication scheme.
Note: The following procedure assumes you are creating a new object. You can also copy the properties of an existing object to create an object. More information exists in Duplicate Policy Server Objects.
To configure the authentication scheme
The Create Authentication Scheme pane opens.
Authentication scheme settings open.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
If you select Username and Password Digest or X509v3 Certificate, the XML Signature Restrictions group box is activated. If you select SAML Assertion, the SAML Token Restrictions group box is activated.
(Optional for SAML 1.1; required for SAML 2.0) Specifies a required value for a SAML assertion token’s <saml:Audience> element. If left undefined, no restriction is placed on the Audience element’s content.
(Optional) Specifies an XPATH expression that can be used to obtain a user identity value if the user identity in the assertion token’s saml:NameIdentifier element (which is used by default) is not suitable for authentication. The default behavior tends to be sufficient for associated non-LDAP user directories and SOA Security Manager-generated SAML tokens.
For LDAP user directories, specify an XPATH expression that returns a user identity value that will resolve correctly. For example:
//SMlogin/Username/text()
For SAML tokens not generated by SOA Security Manager (which may place other information, such as E-mail addresses in the saml:NameIdentifier element), you should also specify an XPATH expression that extract only the required information.
If you need to strip standard prefixes to return the required attribute value itself, see Stripping Standard Prefixes from XPath Queries.
If you specified an Attribute Name/XPATH expression in the field above, specifies a search string to apply to the result of the XPATH expression to obtain a user’s DN in the Attribute Search String field.
For LDAP user directories, this search string should be in the form:
attribute=LDAP:uid=%s
(You may need to modify the “uid=%s” component depending on how lookups are performed in a specific directory.)
(Optional) Require digitally signed SAML assertions created with the sender-vouches subject confirmation method.
(Optional) Require digitally signed SAML assertions created with the holder-of-key subject confirmation method.
Note: Select Allow sender-vouches and Allow holder-of-key options to allow signed assertions created with either confirmation method. Select neither option to allow unsigned SAML assertions.
(Optional) Configures SOA Security Manager to use the web server’s SSL keystore to validate the assertion certificate instead of its own keystore.
(Optional) Require that the assertion issuer and the certificate DN (found within the WS‑Security document) have the same identity.
(Optional) Require validation of any <wsu:Timestamp> and <wsu:TimestampTrace> elements in the message
(Optional) Require all messages to be received over a secure (SSL or TLS) connection.
http://www.example.com/soap/MySOAPRole
The authentication scheme is saved and may be assigned to application components (realms).
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |