The Signature step lets you define how SiteMinder uses private keys and certificates to verify SAML assertions and assertion responses.
Note: SAML 1.1 does not support encryption.
There can be multiple private keys and certificates in the certificate data store. If you have multiple federated partners, you can use a different key pair for each partner.
Note: If the system is operating in FIPS_COMPAT or FIPS_MIGRATE mode, all certificate and key entries are available from the pull-down list. If the system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
Follow these steps:
By completing this field, you are indicating which certificate verifies signed assertions or responses or both. If there is no certificate in the certificate data store, click Import to import one. Alternatively, click Generate to create a certificate request.
Note: If you are using the product in a test environment, you can disable signature processing to simplify testing. Click the Disable Signature Processing checkbox.
Signature configuration at the SAML 1.1 consumer is complete.
The Signature and Encryption step in the partnership wizard lets you define how the product uses private keys and certificates for the following signing functions:
For SAML 2.0 POST binding, you are required to sign assertions.
There can be multiple private keys and certificates in the certificate data store. If you have multiple federated partners, you can use a different key pair for each partner.
Note: If the system is operating in FIPS_COMPAT or FIPS_MIGRATE mode, all certificate and key entries are available from the pull-down list. If the system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
To configure signing options
By completing this field, you are indicating which private key the asserting party uses to sign assertions, single logout requests and responses.
Note: click on Help for a description of the fields.
Select the algorithm that best suits your application.
RSAwithSHA256 is more secure than RSAwithSHA1 due to the greater number of bits used in the resulting cryptographic hash value.
The system uses the algorithm that you select for all signing functions.
By completing this field, you are indicating which certificate verifies signed authentication requests or single logout requests or responses. If there is no certificate in the database, click Import to import one.
Activate a partnership for all configuration changes to take effect and for the partnership to become available for use. Restarting the services is not sufficient.
If you are using the product in a test environment, you can disable signature processing to simplify testing. Click the Disable Signature Processing check box.
Important! Enable signature processing in a SAML 2.0 production environment.
The Signature and Encryption step in the Partnership wizard lets you define how the Policy Server uses private keys and certificates to do the following tasks:
For SAML 2.0 POST binding, you are required to sign assertions.
There can be multiple private keys and certificates in the certificate data store. If you have multiple federated partners, you can use a different key pair for each partner.
To configure encryption options
This certificate encrypts assertion data. If no certificate is available, click Import to import one.
For the following block/key algorithm combinations, the minimum key size that is required for the certificate is 1024 bits.
Encryption Key Algorithm: RSA-OEAP
Encryption Key Algorithm: RSA-OEAP
Note: To use the AES-256 bit encryption block algorithm, install Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files. You can download these files from http://java.sun.com/javase/downloads/index.jsp.
The encryption configuration is complete.
The Signature and Encryption step in the partnership wizard lets you define how the Policy Server uses private keys and certificates to do the following tasks:
Note: For SAML 2.0 POST binding, the IdP is required to sign assertions.
There can be multiple private keys and certificates in the certificate data store. If you have multiple federated partners, you can use a different key pair for each partner.
Note: If the system is operating in FIPS_COMPAT or FIPS_MIGRATE mode, all certificate and key entries are available from the pull-down list. If the system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
To configure signing options
By completing this field, you are indicating which private key the relying party uses to sign authentication requests and single logout requests and responses.
Note: Click Help for a description of fields, controls, and their respective requirements.
Select the algorithm that best suits your application.
RSAwithSHA256 is more secure than RSAwithSHA1 due to the greater number of bits used in the resulting cryptographic hash value.
SiteMinder uses the algorithm that you select for all signing functions.
By completing this field, you are indicating which certificate the relying party uses to verify signed assertions or single logout requests and responses. If there is no certificate in the database, click Import to import one.
Activate a partnership for all configuration changes to take effect and for the partnership to become available for use. Restarting the services is not sufficient.
If you are using SiteMinder in a test environment, you can disable signature processing to simplify testing. Click the Disable Signature Processing check box to disable the feature.
Important! Enable signature processing in a SAML 2.0 production environment.
The Signature and Encryption step lets you configure how the SP uses private keys and certificates, including encrypting and decrypting assertions, Name IDs, and attributes.
There can be multiple private keys and certificates in the certificate data store. If you have multiple federated partners, you can use a different key pair for each partner.
Note: If the system is operating in FIPS_COMPAT or FIPS_MIGRATE mode, all certificate and key entries are available from the pull-down list. If the system is operating in FIPS-Only mode, only FIPS-approved certificate and key entries are available.
To configure encryption options
Note: To use the AES-256 bit encryption block algorithm, install the Sun Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files. You can download these files from http://java.sun.com/javase/downloads/index.jsp.
This private key decrypts any encrypted assertion data. If no certificate available, click Import to import one or click Generate to create a key pair and generate a certificate request.
The encryption configuration is complete.
The Application Integration step of the partnership wizard is applicable only at the relying party. This step lets you define various aspects of federated operation for resolving user identities and directing users to the target application.
The features that you can configure in the Application Integration step are:
The Target Application section in the Application Integration step lets you define how a user gets redirected to the target application. The redirection method that you select depends on the type of data you want to pass with the user to the target application.
Follow these steps:
If the relying party receives an assertion with multiple attribute values, the Policy Server passes all values to the target application in the cookie.
The target application must use the same language as the SDK that creates the cookie. If you are using the Federation Manager Java SDK, the application must be in Java. If you are using the .NET SDK, the application must support .NET.
Learn more about using HTTP Headers as the redirect mode and how to protect the headers.
Click Help for a description of the fields.
If a proxy sits in front of the server with the target resource, enter the URL for the proxy host. The proxy handles all federation requests locally. The proxy host can be any system that sits in front of the target server. The proxy host can also be SiteMinder itself, provided it is being accessed directly from the Internet. Ultimately, when operating with a proxy, the URL you specify as the target must go through SiteMinder. For example, if the base URL is fed.demo.com and the back-end server resource is mytarget/target.jsp, the value for this field is http://fed.demo.com:5555/mytarget/target.jsp.
For SAML 2.0, you can leave this field blank if you override it with the RelayState query parameter. The RelayState query parameter can part of the URL that triggers single sign-on. To enable this override, select the Relay state overrides target check box.
Setting up redirection to the target is complete.
For a SAML entity, the Policy Server can use HTTP headers to pass identity attributes from an assertion to a back-end application. A backend application can be a target application for single sign-on or a user provisioning application. The system passes these headers in an encrypted cookie.
The headers have the same name as the assertion attributes. For example, if the assertion attribute is "address", the application looks for the HTTP header "ADDRESS".
Assertion attributes are case-sensitive, but HTTP headers are not. The Policy Server cannot pass the same attributes that differ only by case sensitivity and then map them to HTTP headers. For example, the system cannot pass "address" and "Address" as headers at the same time. In general, do not use the attributes with the same names that are only different because of case sensitivity or format.
The following additional values are passed as headers:
Protecting HTTP Headers
If an unauthorized user knows the name of an assertion attribute, that user can set this name as a header in a browser. With the header set, the malicious user can gain access to the target application. The target application sees an expected header value and grants access to the resource without SiteMinder consuming an assertion.
Setting a value for the FedHeaderPrefix protects against the following scenario:
SiteMinder can pass assertion data using HTTP headers.
Follow these steps:
LoadPlugin="path\SAMLDataPlugin.dll"
LoadPlugin="path/SAMLDataPlugin.so"
The fedheaderprefix setting specifies a global prefix that SiteMinder adds to HTTP headers. Setting a prefix protects HTTP headers against manipulation by an unauthorized user before the SiteMinder consumes an assertion. As a result, only legitimate headers get passed to the target application. Read more about protecting HTTP headers.
HTTP headers are now configured to pass attribute data.
Copyright © 2012 CA Technologies.
All rights reserved.
|
|