Attributes can provide additional information about a user requesting access to a Service Provider resource. An attribute statement passes user attributes, DN attributes, or static data from the Identity Provider to the Service Provider in a SAML assertion. Any configured attributes are included in the assertion in one <AttributeStatement> element or the <EncryptedAttribute> element in the assertion.
Note: Attribute statements are not required in an assertion.
Servlets, web applications, or other custom applications use attributes to display customized content or enable other custom features. When used with web applications, attributes can limit the actions of a user at the Service Provider. For example, you can send an attribute variable named Authorized Amount set to a maximum dollar amount. The amount is the limit that the user can spend at the Service Provider.
Note: If CA SiteMinder® acts as a SAML 2.0 Attribute Authority as part of the assertion query/request profile, attributes are part of the authorization process. The topic Use an Attribute Authority to Authorize Users describes this implementation.
Attributes take the form of name/value pairs. When the Service Provider receives the assertion, it makes the attribute values available to applications.
Attributes can be made available as HTTP Headers or HTTP Cookies.
The HTTP headers and HTTP cookies have size restrictions that assertion attributes cannot exceed. The size restrictions are as follows:
Attributes can provide information about a user requesting access to a Service Provider resource. An attribute statement passes user attributes, DN attributes, or static data from the Identity Provider to the Service Provider in a SAML assertion.
To configure an attribute
The Add Attributes page opens.
Note: Click Help for a description of fields, controls, and their respective requirements.
The options are:
Determines how the name interpretation is left to your implementation.
Indicates that the name format must use acceptable values. The acceptable values are from the values belonging to the primitive type xs:Name.
Indicates that the name format must follow the standards for a URI reference. How the URI is interpreted is specific to the application using the attribute value.
The Attribute Kind selection determines the available fields in the Attribute Fields section.
Note: Click Help for a description of fields, controls, and their respective requirements.
The Advanced section of the Attribute dialog contains the Script field. This field displays the script that CA SiteMinder® generates based on your entries in the Attribute Setup section. You can copy the contents of this field and paste them into the Script field for another response attribute.
Note: If you copy and paste the contents of the Script field for another attribute, select the appropriate option in the Attribute Kind section.
The maximum length for user assertion attributes is configurable. To modify the maximum length of assertion attributes, change the settings in the EntitlementGenerator.properties file.
Note: The property name in the file is specific to the protocol you are configuring.
Follow these steps:
WS-Federation
Property Name: com.netegrity.assertiongenerator.wsfed.MaxUserAttributeLength
Property Type: Positive Integer value
Default Value: 1024
Description: Indicates the maximum attribute length for WS-FED assertion attributes.
SAML 1.x
Property Name: com.netegrity.assertiongenerator.saml1.MaxUserAttributeLength
Property Type: Positive Integer value
Default Value: 1024
Description: Indicates the maximum attribute length for SAML1.1 assertion attributes.
SAML 2.0
Property Name: com.netegrity.assertiongenerator.saml2.MaxUserAttributeLength
Property Type: Positive Integer value
Default Value: 1024
Description: Indicates the maximum attribute length for SAML2.0 assertion attributes
Indicate whether an attribute that you configure is for a single sign-on request, or for an attribute query request. The retrieval method that you configure determines the function of the attribute.
To use the same attribute for both services, create two attribute statements that use the same attribute name and variable. However, one attribute uses SSO as the retrieval method and one uses Attribute Service as the retrieval method.
Copyright © 2013 CA.
All rights reserved.
|
|