Previous Topic: Authentication Context Template OverviewNext Topic: Enable Authentication Context Requests at the Local SP Partnership


Authentication Context Template Configuration

‑The following figure shows the configuration process for each partner. CA SiteMinder® Federation does not have to be installed at each site.

Process for configuring authentication context

Complete the following steps to configure authentication context processing:

  1. Determine authentication context and strength levels with your partner.
  2. Set up an authentication context template.
  3. Complete the task for your site:
Determine Authentication Context and Strength Levels with your Partner

The SP can require specific authentication contexts and strength levels before it permits access to a requested resource. Based on the sensitivity of the resources at the SP, the SP has to have confidence in the assertion it receives from the IdP.

The administrators at the IdP and SP have to establish guidelines for supported authentication contexts and the relative strength of each authentication context URI. The order of the URIs at the IdP together with the associated strength levels affects how the IdP responds to the SP.

For example, an SP requests an authentication context for an X.509 certificate and a comparison value of exact. The IdP has to authenticate the requesting user at a suitable strength level and satisfy the comparison value during the evaluation of the authentication context.

Set up an Authentication Context Template

Set up an authentication context template to implement authentication context processing. This procedure is the same for an Identity Provider or Service Provider.

Follow these steps:

  1. Log in to the Administrative UI.
  2. Select Federation, Partnership Federation, Authentication Context Templates.

    The View Authentication Context Templates window opens.

  3. Select Create Template.

    The template wizard opens at the first step.

  4. Enter a name for the template.
  5. Complete one of the following actions:
  6. Arrange the selected URIs by strength level. The strength level is in descending order, with the strongest URI at the top and the least strong at the bottom.
  7. Click Next.
  8. (Optional) Group URIs that require the same level of strength indenting one URI under the previous URI. Use the Change Grouping arrow to move a URI into or out of a group.
  9. Click Enable Protection Levels.

    Map the protection levels from an authentication scheme to the URIs. The protection levels indicate the strength of an authentication scheme, ranging between 1 through 1000, with 1000 being the strongest. Individual URIs can have unique protection levels; however, grouping URIs means that they have the same level of strength.

    Consider the following information when assigning protection levels:

    Read more about protection level assignments.

  10. Select Finish to confirm the configuration.

The template is complete.

Protection Level Assignments for a Context Template

The protection levels indicate the strength of the authentication. Assign protection levels to each selected authentication context URI. Specify the maximum level for each URI in the list. The minimum protection level is automatically determined based on the maximum level for the subsequent URI in the list. This range reflects the protection level.

The protection level assignments must reflect the protection levels of the configured Policy Server authentication schemes. For example, the Policy Server can have an X.509 authentication scheme at a protection level of 20. The protection level range that the template specifies must include 20. Finally, the Policy Server generates a URI strength level that is based on the protection level.

Example

Authentication Schemes set at the Policy Server

Protection
Level

urn:oasis:names:tc:SAML:2.0:ac:classes:X509

20

urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorContract

15

urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocol

10

urn:oasis:names:tc:SAML:2.0:ac:classes:Password

5

For each URI, the Policy Server automatically maps the protection level to a URI strength level. The ranges cover the protection level of the authentication scheme. For example:

URI

Protection Level Max

URI Strength

urn:oasis:names:tc:SAML:2.0:ac:classes:X509

1000

4

urn:oasis:names:tc:SAML:2.0:ac:classes:
MobileTwoFactorContract

15

3

urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocol

10

2

urn:oasis:names:tc:SAML:2.0:ac:classes:Password

5

1

If you group several of the URIs, the grouping enables URIs with different protection levels to have the same URI strength. This strength means that the URIs are considered equivalent.

The following modified table shows the grouping of the X.509 URI and the MobileTwoFactorContract URI.

URI

Protection Level Max

URI Strength

urn:oasis:names:tc:SAML:2.0:ac:classes:X509

1000

3

urn:oasis:names:tc:SAML:2.0:ac:classes:
MobileTwoFactorContract

800

3

urn:oasis:names:tc:SAML:2.0:ac:classes:InternetProtocol

700

2

urn:oasis:names:tc:SAML:2.0:ac:classes:Password

200

1

The range of strength levels reflects the total number of groups in the list. For example, if there are three groups, the strength level ranges from 1 to the total number groups, which are 3.

Enable Authentication Context Processing at the Local IdP Partnership

The Policy Server acting as the IdP can obtain the authentication context for an assertion in these two ways:

Follow these steps:

  1. Navigate to the SSO and SLO step in the IdP->SP partnership wizard.
  2. In the Authentication section, specify how to obtain the authentication context. Use a predefined authentication class or an automatically detected class with an authentication context template.
  3. Follow the steps for the method chosen in the previous step:
  4. (Optional). Depending on how you obtain the authentication context you can also select the Ignore RequestedAuthnContext check box.

The following table shows how the Configure AuthnContext and the Ignore RequestedAuthnContext settings work together:

Configure AuthnContext

Ignore RequestedAuthnContext

SP requests AuthnContext

Result

Predefined Class

Selected

Yes

IdP ignores the <RequestedAuthnContext> and uses the defined value in the assertion.

Predefined Class

Selected

No

IdP returns the defined value in the assertion by default.

Predefined Class

Not selected

Yes

Transaction fails because the IdP is not configured to handle the authentication context request. The IdP returns an error message to the SP.

Predefined Class

Not selected

No

IdP returns the defined class value in the assertion by default.

Automatically Detect Class

Selected

Yes

IdP compares the protection level for the authentication scheme against the authentication context template and returns the matching authentication URI in the assertion. The IdP ignores the values in the SP request.

Automatically Detect Class

Selected

No

IdP compares the protection level for the authentication scheme against the authentication context template and returns the matching authentication URI in the assertion. The IdP ignores the values in the SP request.

Automatically Detect Class

Not selected

Yes

IdP compares the protection level against the authentication context class that the SP sends. The IdP uses the authentication context template to determine the authentication URI it places in the assertion.

Automatically Detect Class

Not selected

No

IdP compares the protection level for the authentication scheme against the authentication context template and returns the matching authentication URI in the assertion.