To deploy legacy federation at the Identity Provider, the following sections detail the tasks. The entries in each section reflect the sample data that is provided for a basic configuration.
Note: These procedures assume that you have already installed the required components.
At the Identity Provider, a user store with users defined is required. The Identity Provider can create assertions for these users. In this deployment, the user store is a Sun ONE LDAP user directory. The Sun ONE Server Console is used to add users to this user store.
To configure the user store
userpassword: test
mail: user1@idp.demo
userpassword: test
mail: user2@idp.demo
Important! The email address must be the same in the Service Provider user store for the same users.
In this deployment, an LDAP policy store is used. Verify that the Policy Server is pointing to the LDAP policy store.
Note: The procedure assumes that you know how to add users to the user store in your deployment.
Follow these steps:
Policy Store
LDAP
www.idp.demo:389
o=idp.demo
cn=Directory Manager
password
password
At the Identity Provider, enable logging for the Policy Server. You can view the log file smtracedefault.log to examine trace messages about single sign-on and single log out. This log file is in the directory policy_server_home/siteminder/log.
Follow these steps:
Note: Include the Fed_Server component in the log to see the federation trace messages.
You configure trace logging at the Policy Server using the Policy Server Management Console.
Configure the Federation Web Services (FWS) application for the sample deployment.
To set up FWS:
The Web Agent Option Pack requires a JDK to run the Federation Web Services application.
For the correct JDK version, go to the Technical Support site and search for the CA SiteMinder® Platform Support Matrix for the release.
For FWS to operate, you can install ServletExec or any supported application server. This sample network uses ServletExec on an IIS 6.0 Web Server.
Note: CA SiteMinder® 12.52 SP1 is shipped with a ServletExec license key file named ServletExec_AS_6_license_key.txt. If you do not have this license key, contact CA Technical Support. From this license file, copy the license key and enter it in the ServletExec License dialog of the ServletExec Administration Console. For instructions on licensing ServletExec, see ServletExec documentation, available at the New Atlanta Communication website.
Be sure to apply the most current hot fixes for the supported version of ServletExec you are using. The hot fixes are necessary for Federation Web Services to work with ServletExec. To obtain hot fixes, go to the website for New Atlanta Communication.
To set up ServletExec
The Manage Web Applications dialog opens.
affwebservices
/affwebservices/
C:\program files\ca\webagent\affwebservices
Note: The location of affwebservices in your setup can be different. Enter the correct location.
Important! The IIS user account must have proper rights for IIS to allow any plug-in to write to a file system. Therefore, for Federation Web Services to work with ServletExec, modify the directory security settings for the IIS default user account.
The IIS server user account must have proper rights for IIS to allow a plug-in to write to its file system. For ServletExec to write to the federation log files, the anonymous user account that is associated with ServletExec must have permissions to write to the file system.
Follow these steps:
The set of applications is displayed in the right pane.
The Authentication Methods dialog opens.
For anonymous access, enter a name and password of a user account that has the permissions to right to the Windows file system. To grant this right to a user account, see Windows documentation. For example, you can use the IUSR Internet Guest account for anonymous access.
The user account that is associated with ServletExec can now write to the IIS file system.
Follow these steps:
The Local Security Settings dialog displays.
The Act as part of the operating system Properties dialog opens.
The affwebservices.properties file contains all the initialization parameters for Federation Web Services. Modify at least one of the settings in this file.
To modify the affwebservices.properties file
For this deployment, an IIS web server hosts the FWS application. So, the path to the WebAgent.conf file is:
C:\\Program Files\\ca\\webagent\\bin\\IIS\\WebAgent.conf
Note: Federation Web Services is a Java component, so the Windows paths must contain double backslashes. This format applies only to Windows.
Verify that this path is entered on one line.
After you set up Federation Web Services, verify that the application is operating correctly.
Follow these steps:
http://<fqhn>:<port_number>/affwebservices/assertionretriever
Defines the fully qualified host name.
Defines the port number of the server where the Web Agent and Web Agent Option Pack are installed.
For this deployment, enter:
http://www.idp.demo:80/affwebservices/assertionretriever
If Federation Web Services is operating correctly, the following message appears:
Assertion Retrieval Service has been successfully initialized.
The requested servlet accepts only HTTP POST requests.
This message indicates that Federation Web Services is listening for data activity. If Federation Web Services is not operating correctly, you get a message that the Assertion Retrieval Service has failed. If Assertion Retrieval Service fails, examine the Federation Web Services log.
At the IdP, enable logging for the system with the Web Agent Option Pack. You want to be able to view the following logs:
Follow these steps:
The IdP user directory consists of user records for which the Identity Provider generates assertions.
The following steps specify how to configure a user directory in the Administrative UI. The directory IdP LDAP, is the Sun ONE LDAP directory that contains user1 and user2.
Follow these steps:
IdP LDAP
LDAP
www.idp.demo:42088
dc=idp,dc=demo
Accept the defaults for the other values.
Complete the following field in the LDAP User DN Lookup:
uid=
,ou=People,dc=idp,dc=demo
To identify the Service Provider to the Identity Provider, create an affiliate domain and add a service provider object for sp.demo.
Follow these steps:
Federation Sample Partners
Domain for sp.demo
Associate a user directory with the affiliate domain.
Follow these steps:
For your network, select the user store you set up at the IdP.
Add the Service Provider named sp.demo to the affiliate domain.
Follow these steps:
sp.demo
Service Provider
sp.demo
idp.demo
Accept the default
http://www.idp.demo/siteminderagent/redirectjsp/redirect.jsp
This redirect.jsp is included with the Web Agent Option Pack that is installed at the Identity Provider site. In this deployment, that server is www.idp.demo. If the user does not have a CA SiteMinder® session, the SSO service at the IdP redirects the user to the authentication URL to log in.
After successful authentication, the redirect.jsp application redirects the user back to the SSO service for assertion generation. A CA SiteMinder® policy must protect this URL.
Verify that this option is selected. By default, this option is selected.
You must protect the Authentication URL with a SiteMinder policy. Protecting the Authentication URL ensures that a user requesting a protected federated resource is presented with an authentication challenge if they do not have a SiteMinder session at the IdP.
Follow these steps:
Authentication URL Protection Realm
Using the lookup button, select FSS web agent
This is the Web Agent protecting the server with the Web Agent Option Pack.
/siteminderagent/redirectjsp/redirect.jsp
Accept the defaults for the other settings.
Select Persistent Session
Authentication URL Protection Rule
Authentication URL Protection Realm
*
Get
Accept the defaults for the other settings.
Authentication URL Protection Policy
Add user1 from the IdP LDAP user directory
add Authentication URL Protection Rule
You now have a policy that protects the Authentication URL at the Identity Provider.
When you specify a Service Provider in an affiliate domain, include a list of users and groups for which the Assertion Generator generates SAML assertions. Add only users and groups from directories that are in an affiliate domain.
To select users for assertion generation
The Users/Groups dialog opens.
Attribute-value
uid
*
These employees are listed in the IdP LDAP.
The Name ID is a unique way of identifying a user in an assertion. The NameID that you enter in the Administrative UI is included in the assertion.
To configure name IDs
The Name IDs dialog displays.
Email Address
The email address format value means that the Name ID must use an email address in the user directory to identify the user.
User Attribute
Specify the HTTP-POST as the SAML 2.0 binding for single sign-on.
Follow these steps:
sp.demo
urn:oasis:names:tc:SAML:2.0:ac:classes:Password (default)
http://www.sp.demo:81/affwebservices/public/ saml2assertionconsumer
Specifies the URL of the Assertion Consumer Service. For your network, the server you specify is the SP web server where the Web Agent Option Pack is installed.
5 (default)
60 (default)
In a test environment, if the following message appears in the Policy Server trace log, increase the Validity Duration value above 60.
Assertion rejected(_b6717b8c00a5c32838208078738c05ce6237) -current time (Fri Sep 09 17:28:33 EDT 2005) is after SessionNotOnOrAfter time (Fri Sep 09 17:28:20 EDT 2005)
Select this check box
In a production environment, signature processing to sign assertions is required. However, for the basic sample deployment, disable signature processing.
Important! Never disable signature processing in a SAML 2.0 production environment.
Follow these steps:
Attributes is the final step in Service Provider configuration. For a basic configuration, do not configure attributes. Instead, click Finish to complete the Service Provider configuration. The configuration is submitted. You have identified a Service Provider object for the Identity Provider.
After completing the configuration at the Identity Provider, you must Set Up the Service Provider.
Copyright © 2014 CA.
All rights reserved.
|
|