This section contains the following topics:
Claims Transformation of Assertion Attributes
Session Store Attributes Available for Assertions
WS-Federation Metadata Exchange
SAML 2.0 Attribute Query Support
SAML 2.0 User Attribute Retrieval from a Third-Party Identity Provider
SAML 2.0 Attribute Authority Metadata
Claims transformation manipulates claims during a federated single sign-on transaction. Claims, also known as attributes, help customize the attributes and improve the user experience at a partner.
The software can perform three different modifications to assertion attributes:
Session attributes can be persisted in the session store after a user is authenticated. From the session store, the system can add the attributes to an assertion to customize the requested application.
CA SiteMinder® now supports the WS-Federation 1.2 profile for partnership federation. You can configure single sign-on and sign-out using the WS-Federation profile.
The Policy Server supports the Web Services Metadata Exchange profile for WS-Federation partnerships. This web service enables the CA SiteMinder® local partner to respond to requests from a remote partner for metadata. The exchange occurs as an HTTP request and response.
A CA SiteMinder® IdP supports the SAML 2.0 Assertion Query/Request profile and can respond to attribute queries. The IdP also extends the profile functionality by accepting queries for attributes not in the assertion or in the metadata. When the IdP receives an attribute query, the IdP first checks its user directory to find the attributes. If the attributes are not found, the Policy Server checks the session store.
Note: Only the CA SiteMinder® IdP supports the query profile. A CA SiteMinder® SP as the requesting partner only supports the proxied attribute query feature.
In a SAML 2.0 federated environment, CA SiteMinder® supports a feature referred to as a proxied attribute query. The proxied attribute query is based on the SAML 2.0 Assertion Query/Request profile.
A proxied query enables the Policy Server to contact a third-party Identity Provider and request values for attributes that are not in its session store. The Policy Server can then pass the attributes back to the application at the Service Provider.
When you export metadata from a local SAML 2.0 IdP entity or an IdP-to-SP partnership, the attribute service URL is in the exported metadata. This information is relevant for local IdPs acting as an Attribute Authority, one of the roles necessary for the Attribute Query/Response profile.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|