

Federation Guides › Partnership Federation Guide › Partnership Creation and Activation › Single Sign-on Configuration (Asserting Party)
Single Sign-on Configuration (Asserting Party)
Configure single sign-on at the asserting party to specify how the asserting party delivers an assertion to a relying party.
Follow these steps:
- Begin at the appropriate step in the partnership wizard.
- SAML 1.1
-
Single Sign-On
- SAML 2.0
-
SSO and SLO
Any values that are defined during the creation or import of the remote relying party are filled in.
Note: Click Help for a description of fields, controls, and their respective requirements.
- Complete the Authentication Class field. You can supply a static URI for SAML 1.1 and SAML 2.0. Additionally, for SAML 2.0 only, SiteMinder can automatically detect an authentication class. The URI is placed in the AuthnContextClassRef element in the assertion to describe how a user is authenticated.
- Complete the fields in the SSO section to determine how single sign-on operates. These settings let you control the following features:
For SAML 2.0, you can configure these features:
- Initiation of single sign-on from which partner
- SP session validity
- SP session duration
- User consent to share identity information with the SP
Note: Click Help for a description of fields, controls, and their respective requirements.
- Specify the URL for the Remote Assertion Consumer Service. This service is the service at the relying party that processes received assertions.
- If you selected HTTP-Artifact, configure the back channel settings.
- (Optional). For SAML 2.0, you can do the following tasks:
More information:
Enhanced Client or Proxy Profile (ECP)
SAML 2.0 Entities Allowed to Initiate Single Sign-on
Status Redirects for HTTP Errors (SAML 2.0 IdP)
Legacy Artifact Protection Type for the HTTP-Artifact Back Channel
Legacy Artifact Protection Type for the HTTP-Artifact Back Channel
For HTTP-Artifact single sign-on, you can select the legacy option for the Artifact Protection Type field. The legacy option indicates that you are using the legacy method of protecting the back channel to the artifact service at the asserting party.
To implement the legacy method of protection:
- Add the Web Agent that protects the FWS application to the Agent group FederationWebServicesAgentGroup.
- For ServletExec, this Agent is on the web server where the Web Agent Option Pack is installed.
- For an application server, such as WebLogic or JBOSS, this Web Agent is installed where the application server proxy is installed. The Web Agent Option Pack can be on a different system.
- Enforce the policy that protects the artifact service. To enforce the policy, you indicate which asserting party-to-relying party partnerships are permitted access to the artifact service.
Follow these steps: to add a web agent to an agent group
- Log in to the Administrative UI.
- Select Infrastructure, Agents, Create Agent.
- Specify the name of the Web Agent in your deployment. Click Submit.
- Select Infrastructure, Agent Groups.
- Select the FederationWebServicesAgentGroup entry.
The Agent Groups dialog opens.
- Click Add/Remove and the Agent Group Members dialog opens.
- Move the web agent from the Available Members list to the Selected Members list.
- Click OK to return to the Agent Groups dialog.
- Click Submit then click Close to return to the main page.
Follow these steps: to enforce the policy that protects the retrieval service
- In the Administrative UI, configure the partnership using the legacy method for the artifact protection type.
- Activate this partnership.
- Select Policies, Domain, Domain Policies.
A list of available domain policies displays.
- Edit the appropriate artifact service policy by selecting the pencil icon.
- SAML 1.1
-
FederationWSAssertionRetrievalServicePolicy
- SAML 2.0
-
SAML2FWSArtifactResolutionServicePolicy
Note: The supplied policies are default policies. You can use any policy that you created to protect the artifact service.
- Go to the Users tab.
The federation custom user stores display in the User Directories section.
- Click Add Members for the user store you want to modify:
- SAML 1.1
-
FederationWSCustomUserStore
- SAML 2.0
-
SAML2FederationCustomUserStore
- Select the partnerships for which you configured legacy artifact protection.
Examples:
- If the SAML 1.1 partnership is named Acme, select affiliate:affiliate:Acme
- If the SAML 2.0 partnership is named Demo, select affiliate:samlsp:Demo
- Click OK.
The partnership for HTTP-Artifact single sign-on now allows the access to the artifact service so the relying party can retrieve the assertion.
Copyright © 2012 CA Technologies.
All rights reserved.
 
|
|