The authentication context indicates how a user authenticated at an Identity Provider. The Identity Provider includes the authentication context in a single sign-on assertion at the request of a Service Provider or based on configuration at the Identity Provider. A Service Provider can require information about the authentication process to establish a level of confidence in the assertion before granting access to resources.
To request the authentication context, the CA SiteMinder® Service Provider must include the <RequestedAuthnContext> element in the authentication request to the Identity Provider. The Service Provider, puts this element is in the request based on a configuration setting in the SP->IdP partnership.
A CA SiteMinder® Identity Provider obtains the authentication context in one of two ways:
If the federated partner is a CA SiteMinder® Service Provider that does not support AuthnContext requests, manually enter a URI in the Administrative UI.
The Policy Server maps the authentication context URIs to Policy Server-defined authentication levels. The authentication levels indicate the strength of an authentication context for an established user session. The levels enable the authentication context to be derived from the user session at the Identity Provider.
When the Identity Provider receives a request, it compares the value of the <RequestedAuthnContext> element to the authentication context. The comparison is based on a comparison value in the request from the Service Provider. If the comparison is successful, the Identity Provider includes the authentication contexts in the assertion that it returns to the Service Provider. If validation is configured at the Service Provider, the Service Provider validates the incoming authentication context with the value it requested.
When single sign-on is initiated at the IdP, authentication context processing follows these steps:
Based on a configured authentication context template, the AuthnContext class is mapped to the protection level for the session.
The hard-coded URI you specify is added to the assertion.
When single sign-on is initiated at the SP, authentication context processing follows these steps:
Based on a configured authentication context template, the AuthnContext class is mapped to the protection level for the session.
The hard-coded URI you specify is added to the assertion.
If the SP includes multiple authentication context URIs in the request, the classes are compared one-by-one in sequential order against the context for the session. At the first successful comparison, the IdP adds the session authentication context to the assertion.
If the comparison is not successful, the transaction is terminated with a "noauthncontext" status response.
The following table shows examples of how an authentication context is processed depending on the comparison attribute sent in the authentication context request.
SP-requested Authentication Context |
Comparison Attribute Value |
IdP-configured Authentication Context |
Status Response |
---|---|---|---|
Password |
exact |
InternetProtocol |
NoAuthnContext |
Password |
minimum |
InternetProtocol |
NoAuthnContext |
Password |
better |
InternetProtocol |
NoAuthnContext |
InternetProtocol |
exact |
InternetProtocol |
Success |
InternetProtocol |
minimum |
InternetProtocol |
Success |
InternetProtocol |
maximum |
InternetProtocol |
Success |
InternetProtocol |
maximum |
Password |
NoAuthnContext |
InternetProtocol |
better |
Password |
Success |
Copyright © 2014 CA.
All rights reserved.
|
|