Previous Topic: Configure a SAML 2.0 Response for Authentication FailureNext Topic: Assertion Processing Customization (Relying Party)


Configure Social Sign-on

You can configure CA SiteMinder® Federation (the federation system) to let users sign-on to a federated resource with their social networking credentials instead of the federation system credentials.

The social sign-on feature consists of the following features:

The features are independent of each other and you can configure the federation system to implement either or both the features.

Authenticate Users Using an OAuth Authorization Server

To authenticate users using an OAuth authorization server, configure single sign-on between the federation system and the OAuth authorization server.

The federation system provides default support for the following OAuth authorization servers:

OAuth 1.0a

OAuth 2.0

The following process describes how the federation system processes a user request to access a federated resource:

  1. The federation system redirects the user request to the OAuth authorization server specified in the user request.
  2. The OAuth authorization server authenticates the user and sends an authentication response with claims about the user to the federation system.
  3. The federation system verifies the authentication response, completes the authentication process, and authorizes the user to access the federated resource.

The following flowchart describes how you can authenticate users using an OAuth authorization server:

Configure the federation system to let users sign-on using their OAuth authorization server credentials.

Follow these steps:

  1. Verify the prerequisites.
  2. Create a local OAuth client entity.
  3. (Optional) Create or modify the remote entity of the OAuth authorization server.
  4. Create an OAuth partnership for single sign-on.
Verify the Prerequisites

Perform the following steps before you configure a partnership to configure single sign-on between the federation system and an OAuth authorization server:

Create a Local OAuth Client Entity

Create a local OAuth client entity for the partnership between the federation system and an OAuth authorization server.

Follow these steps:

  1. Navigate to Federation, Entities, and click Create Entity.
  2. Choose Local in Entity Location.
  3. Select OAuth Client from New Entity Type.
  4. Select the OAuth version, and click Next.
  5. Enter the required values, and click Next.
  6. Confirm the entered values and click Finish.

    The Redirect URL is constructed. Use this URL for initiating an OAuth transaction.

Create or Modify the Remote Entity of an Authorization Server

The system provides remote entities for each of the following OAuth authorization servers that are supported by default:

OAuth 1.0a

OAuth 2.0

The values of each remote entity are pre-configured with known values of the entity. You can modify the values to suit your federation environment or create a remote entity for any OAuth authorization server.

Follow these steps:

  1. Perform one of the following tasks:

    Create a new remote entity:

    a. Navigate to Federation, Entities, Create Entity.

    b. Select Remote as Entity Location, and select OAuth Authz Server as the New Entity Type.

    c. Click Next.

    d. Enter the values and click Next.

    Modify the pre-populated values of a remote entity:

    a. Navigate to Federation, Entities, and search for the entity that you want to modify.

    b. Click the Actions option of the entity, and click Modify.

    c. Click Next to go to the Configure Entity tab.

    d. Modify the values and click Next.

  2. Confirm the changes and click Finish.
Create an OAuth Partnership for Single Sign-On

To let the federation system retrieve user information from the authorization server, create an OAuth partnership between the OAuth authorization server as the asserting party and the federation system as the relying party.

Follow these steps:

  1. Navigate to Federation, Partnerships and click Create Partnership.
  2. Select the OAuth Client - Authz Server partnership type.
  3. Configure the partnership information.
  4. Confirm the values and click Finish.

An OAuth partnership is configured to let users sign-on to a federated resource using the OAuth authorization server credentials.

When the federation system receives a user request in the following format, the request is processed per the partnership configuration:

https://baseURL_of_the_partnership/affwebservices/public/oauthtokenconsumer?AuthzServerID=authorization_server_id

Or

https://baseURL_of_the_partnership/affwebservices/public/ oauthtokenconsumer/disambiguation_id?AuthzServerID=<authorization_server_id>

The federation system is configured to implement the social sign-on feature.

Migrate an OAuth Authentication Scheme Set-up to OAuth Partnership

If you configured an OAuth authentication scheme in your environment to authenticate users using an OAuth provider, you can migrate your authentication scheme set-up to a federation partnership.

Follow these steps:

  1. Perform one of the following steps:
  2. Create a partnership between the OAuth client and the OAuth authorization server.
  3. Inform the application users that the following URL must be used to initiate the OAuth partnership:
    https://server:port/affwebservices/public/oauthtokenconsumer?AuthzServerID=AuthorizationServerID
    

Configure a Credential Selector Page

You can configure a partnership to let users select an identity provider such as Facebook or Twitter for authentication. The credential handling service that is installed on CA SiteMinder® SPS lets you configure a partnership to display a credential selector page with multiple identity providers as user authentication choices.

To configure a credential selector page, create the following partnerships:

  1. Partnership to configure single sign-on between the federation system and an identity provider. The identity provider acts as the asserting party and the federation system acts as the relying party.
  2. Partnership between the federation system and the enterprise where the federated resource exists. The federation system acts as the asserting party and the enterprise acts as the relying party.

The following process describes how the federation system processes a user request:

  1. The enterprise (relying party) redirects the user request to the federation system (asserting party).
  2. The federation system (asserting party) verifies if the partnership is configured to display a credential selector page. If yes, the system displays the credential selector page with multiple identity providers as user authentication choices.
  3. If the user is registered in the federation system, the following steps are performed. if the user is not registered, skip to the next step.
    1. The user selects an identity provider and signs-on with the identity provider.
    2. The identity provider generates an access token and redirects the user to the federation system (relying party).
    3. The federation system (relying party) verifies the access token and tries to disambiguate the user in the user store.
    4. The federation system (relying party) generates a session and redirects the user to the federation system (asserting party).
    5. The federation system (asserting party) generates an assertion and redirects the user to the enterprise (relying party).
    6. The enterprise (relying party) verifies the assertion and gives the user access to the federated resource.
  4. If the user is not registered in the federation system, the following steps are performed:
    1. The user clicks the Register link.
    2. The federation system displays the list of identity providers whose partnerships are configured with a provisioning server.
    3. The user selects an identity provider and signs-on with the identity provider.
    4. The identity provider generates an access token and redirects the user to the federation system (relying party).
    5. The federation system (relying party) verifies the access token and tries to disambiguate the user in the user store.
    6. The federation system (relying party) redirects the user to the provisioning server configured in the partnership.
    7. The provisioning server creates the user and redirects the user to the federation system (relying party).
    8. The federation system (relying party) generates a session and redirects the user to the federation system (asserting party).
    9. The federation system (asserting party) generates an assertion and redirects the user to the enterprise (relying party).
    10. The enterprise (relying party) verifies the assertion and gives the user access to the federated resource.

The user request is processed.

The following flowchart describes how to configure a credential selector page:

Configure the Credential Selector Page to lets users sign-on using an identity provider's credentials.

Follow these steps:

  1. Configure single sign-on between the federation system and an identity provider.
  2. Create an authentication method group.
  3. Configure a partnership between the federation system and the enterprise.
Configure Single Sign-On Between the Federation System and an Identity Provider

For each identity provider that you want to display on the credential selector page, create a partnership to configure single sign-on between the identity provider and the federation system. The identity provider acts as the asserting party and the federation system acts as the relying party.

The identity provider that acts as an authentication choice must be based on the following authentication protocols:

To let the federation system act as an identity provider, create a partnership with the system acting as both the asserting party and the relying party.

Follow these steps:

  1. Navigate to Federation, Partnership.
  2. Create a partnership for each identity provider that you want to display on the credential selector page.
Create an Authentication Method Group

An authentication method group defines the list of identity providers that must be displayed on the credential selector page. Each identity provider such as SAML or Facebook that you want to display on a credential selector page must be part of an authentication method group. When you create an authentication method group, you can select identity providers from a list of all the partnerships with identity providers acting as the asserting party.

Follow these steps:

  1. Navigate to Infrastructure, Authentication, Method Groups.
  2. Click Create Authn Method Group.
  3. Add the partnerships of the identity providers that you want to display as authentication choices, and enter the required values.
  4. Save the changes.
Configure a Partnership Between the Federation System and Enterprise

Configure a partnership between the federation system and your enterprise to display the credential selector page when a user tries to access a federated resource. The federation system acts as the asserting party and the enterprise acts as the relying party. You can create a partnership or modify an existing partnership.

The partnership must be based on one of the following authentication protocols:

Follow these steps:

  1. Navigate to Federation, Partnership.
  2. Enter the values in each step.
  3. Perform the following steps in the Single Sign-On, or SSO and SLO, or Single Sign-On and Sign-Out step:
    1. Select the Authentication Mode as Credential Selector.
    2. Define the Authentication Base URL.
    3. Select an Authentication Method Group.
  4. Select the following field in the Target Application Configuration step:
  5. Save the changes.

The partnership is configured to display the credential selector page when a user tries to access a federated resource.

The federation system is configured to implement the social sign-on feature.

Customize the Header and Footer on the Credential Selector Page

You can customize the header and footer that are displayed on the credential selector page to suit your enterprise requirements.

Follow these steps:

  1. Navigate to the following location on your federation system:
    <install_path>\CA\secure-proxy\Tomcat\webapps\chs\jsps
    
  2. Make a copy of the header.jsp file and name the new file as header-custom.jsp.
  3. Make a copy of the footer.jsp file and name the new file as footer-custom.jsp.

    Note: If the header-custom.jsp and footer-custom.jsp files exist, the federation system is configured to use the files for displaying the header and footer.

  4. Modify the files to customize the header and footer that must be displayed on the credential selector page.
  5. Save the changes.
  6. Restart CA SiteMinder® SPS.

    The customized header and footer are displayed on the credential selector page when the partnership is active.