The Signature and Encryption step in the partnership wizard lets you define how the Policy Server uses private keys and certificates to do the following tasks:
Note: For SAML 2.0 POST binding, the IdP is required to sign assertions.
There can be multiple private keys and certificates in the certificate data store. If you have multiple federated partners, you can use a different key pair for each partner.
Note: If the system is operating in FIPS_COMPAT or FIPS_MIGRATE mode, all certificate and key entries are available from the pull-down list. If the system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
To configure signing options
By completing this field, you are indicating which private key the relying party uses to sign authentication requests and single logout requests and responses.
Note: Click Help for a description of fields, controls, and their respective requirements.
Select the algorithm that best suits your application.
RSAwithSHA256 is more secure than RSAwithSHA1 due to the greater number of bits used in the resulting cryptographic hash value.
CA SiteMinder® uses the algorithm that you select for all signing functions.
By completing this field, you are indicating which certificate the relying party uses to verify signed assertions or single logout requests and responses. If there is no certificate in the database, click Import to import one.
Activate a partnership for all configuration changes to take effect and for the partnership to become available for use. Restarting the services is not sufficient.
If you are using CA SiteMinder® in a test environment, you can disable signature processing to simplify testing. Click the Disable Signature Processing check box to disable the feature.
Important! Enable signature processing in a SAML 2.0 production environment.
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|