Previous Topic: Federated User Identification for a PartnershipNext Topic: How To Add Session Attributes to an Assertion


Assertion Configuration at the Asserting Party

This section contains the following topics:

Assertion Configuration

Configure Assertion Options

Assertion Attribute Configuration Examples

How To Add Session Attributes to an Assertion

How to Configure Claims Transformation at the Asserting Party

Customize Assertion Content

Assertion Configuration

The Assertion Configuration step of the partnership wizard defines the configuration of the following settings:

Name ID

The Name ID attribute, a required assertion attribute, identifies a user in a unique way. The Name ID format indicates the identifier type that the federated partners support. The Name ID type specifies the user profile attribute that is associated with the name ID format. The user profile attributes come from a user store or the session store.

Assertion Attributes

Servlets, web applications, or other custom applications can use attributes to display customized content or enable other custom features. When used with web applications, attributes can limit the activities of a user at the relying party. For example, an attribute variable named Authorized Amount is set it to a maximum dollar amount that the user can spend at the relying party.

Attributes are designated in an <AttributeStatement> element or an <EncryptedAttribute> element. Attributes take the form of name/value pairs. Attributes can also be made available as HTTP headers or HTTP cookies.

Note: Attributes statements are not required in an assertion.

You can configure different types of attributes for an attribute statement. The types of attributes include:

You can also configure an expression to transform assertion attributes. This capability is called claims transformation.

When the relying party receives the assertion, it makes the attribute values available to applications.

Assertion Generator Plug-in

Typically, attributes come from user directory records, but an assertion can contain attributes from other sources, such as an external database or application content. You can write an assertion generator plug-in that pulls in attributes from various sources. The assertion generator plug-in is a piece of custom code that you write according to the Assertion Generator Plug-in interface.

For information about writing a plug-in, see the Programming Guide for the Federation Java SDK.

Configure Assertion Options

Configure assertion options at the asserting party.

Follow these steps:

  1. Navigate to the Assertion Configuration step of the partnership wizard.
  2. Configure the settings in the Name ID section.

    The relying party uses these values to interpret the Name ID value in the assertion.

    Depending on the selected NameID Type option, complete the entry with a proper value.

    Static attribute

    Enter any constant string in the Value field.

    User Attribute

    Enter a valid user store attribute in the Value field. For example, mail.

    Session attribute

    Enter a valid session store attribute in the Value field.

    DN Attribute (LDAP only)

    Enter a valid LDAP user directory attribute in the Value field. Also, enter a valid DN in the DN specification fields. For example, the DN attribute is cn=JaneDoe and the specification is ou=Engineering,o=ca.com.

    Note: Click Help for a description of fields, controls, and their respective requirements.

  3. (Optional - SAML 2.0 only) Select Allow Creation of User Identifier so the asserting party can create a value for the Name ID. For this feature to work, the AuthnRequest from the relying party must include an AllowCreate attribute.

    Note: If you select this option, the value of the Name ID Format value must be Persistent Identifier.

  4. (Optional) Click Add Row in the Assertion Attributes table to specify one or more attributes for the assertion. Optionally, you can encrypt the attribute.

    For help filling out the table, view some assertion attribute examples. Click Help for detailed information about each column in the attribute table.

    Note: For the LDAP user store attributes, you can add multivalued user attributes to an assertion. The Help describes how to specify multivalued user attributes.

  5. (Optional) If you have written an assertion generator plug-in using the CA SiteMinder® Federation Java SDK, complete the fields in the Assertion Generator Plug-in section.

    To write a plug-in, see the Programming Guide for the Federation Java SDK.

  6. Click Next to continue with the partnership configuration.

Assertion Attribute Configuration Examples

The following graphic shows some examples of assertion attribute entries. This screen is for a SAML 2.0 partnership. The SAML 1.1 screen is similar, but the Retrieval Method and Format columns are missing. A Namespace column exists instead.

Note: The DN Attribute example includes a DN Specification column, with the entry ou=Engineering,o=ca.com. This column is not visible in this graphic.

Graphic of Assertion Attributes table