Previous Topic: User Consent at a SAML 2.0 IdPNext Topic: Single Sign-on Configuration (Relying Party)


Single Sign-on Configuration (Asserting Party)

Configure single sign-on at the asserting party to specify how the asserting party delivers an assertion to a relying party.

Follow these steps:

  1. Begin at the appropriate step in the partnership wizard.
    SAML 1.1

    Single Sign-On

    SAML 2.0

    SSO and SLO

    Any values that are defined during the creation or import of the remote relying party are filled in.

    Note: Click Help for a description of fields, controls, and their respective requirements.

  2. Complete the Authentication Class field. You can supply a static URI for SAML 1.1 and SAML 2.0. Additionally, for SAML 2.0 only, SiteMinder can automatically detect an authentication class. The URI is placed in the AuthnContextClassRef element in the assertion to describe how a user is authenticated.
  3. Complete the fields in the SSO section to determine how single sign-on operates. These settings let you control the following features:

    For SAML 2.0, you can configure these features:

    Note: Click Help for a description of fields, controls, and their respective requirements.

  4. Specify the URL for the Remote Assertion Consumer Service. This service is the service at the relying party that processes received assertions.
  5. If you selected HTTP-Artifact, configure the back channel settings.
  6. (Optional). For SAML 2.0, you can do the following tasks:

More information:

Enhanced Client or Proxy Profile (ECP)

SAML 2.0 Entities Allowed to Initiate Single Sign-on

Status Redirects for HTTP Errors (SAML 2.0 IdP)

Legacy Artifact Protection Type for the HTTP-Artifact Back Channel

Legacy Artifact Protection Type for the HTTP-Artifact Back Channel

For HTTP-Artifact single sign-on, you can select the legacy option for the Artifact Protection Type field. The legacy option indicates that you are using the legacy method of protecting the back channel to the artifact service at the asserting party.

To implement the legacy method of protection:

Follow these steps: to add a web agent to an agent group

  1. Log in to the Administrative UI.
  2. Select Infrastructure, Agents, Create Agent.
  3. Specify the name of the Web Agent in your deployment. Click Submit.
  4. Select Infrastructure, Agent Groups.
  5. Select the FederationWebServicesAgentGroup entry.

    The Agent Groups dialog opens.

  6. Click Add/Remove and the Agent Group Members dialog opens.
  7. Move the web agent from the Available Members list to the Selected Members list.
  8. Click OK to return to the Agent Groups dialog.
  9. Click Submit then click Close to return to the main page.

Follow these steps: to enforce the policy that protects the retrieval service

  1. In the Administrative UI, configure the partnership using the legacy method for the artifact protection type.
  2. Activate this partnership.
  3. Select Policies, Domain, Domain Policies.

    A list of available domain policies displays.

  4. Edit the appropriate artifact service policy by selecting the pencil icon.
    SAML 1.1

    FederationWSAssertionRetrievalServicePolicy

    SAML 2.0

    SAML2FWSArtifactResolutionServicePolicy

    Note: The supplied policies are default policies. You can use any policy that you created to protect the artifact service.

  5. Go to the Users tab.

    The federation custom user stores display in the User Directories section.

  6. Click Add Members for the user store you want to modify:
    SAML 1.1

    FederationWSCustomUserStore

    SAML 2.0

    SAML2FederationCustomUserStore

  7. Select the partnerships for which you configured legacy artifact protection.

    Examples:

  8. Click OK.

The partnership for HTTP-Artifact single sign-on now allows the access to the artifact service so the relying party can retrieve the assertion.