Configure single sign-on at the asserting party to specify how the asserting party delivers an assertion to a relying party.
Follow these steps:
Single Sign-On
SSO and SLO
Any values that are defined during the creation or import of the remote relying party are filled in.
Note: Click Help for a description of fields, controls, and their respective requirements.
Delegated
Cloud
Enter the URL of the system authenticating the user requesting a resource. Use the following syntax for the delegated URL:
http://cloud_system:port/chs/login/tenant_name/application_name
The cloud_system is the system where the user console is installed.
Example URL:
http://cmserver.fowardinc.com:832/chs/login/tenant1/confidential_app
Use Predefined Authentication Class
Supply a static URI for SAML 1.1, SAML 2.0, and WS-FED.
Additionally, for SAML 2.0 only, the system can automatically detect an authentication class. The URI is placed in the AuthnContextClassRef element in the assertion to describe how a user is authenticated.
The SSO Validity Duration and the Skew Time determine when the assertion is valid. Read the information about assertion validity to understand how these settings work together.
For SAML 2.0, you can configure these features:
Note: Click Help for a description of fields, controls, and their respective requirements.
Your partner needs to supply this URL to you.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|