Previous Topic: Single Sign-on to Office 365Next Topic: How to Configure SAML 2.0 HTTP POST Binding


Verify the STS Setup Requirements

Before you deploy STS on CA SiteMinder® SPS, complete the following requirements:

Configure the JVM to Use the JSafeJCE Security Provider

To enable encryption, configure the JVM that is running the CA SiteMinder® SPS so it uses the JSafeJCE Security Provider.

Follow these steps:

  1. Download the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files package for the Java version you are using from the Oracle website.
  2. Navigate to the following location:

    Windows

    JVM_HOME\lib\security
    

    UNIX

    JVM_HOME/lib/security
    
    JVM_HOME

    Defines the location where Java Runtime Environment (JRE) is installed in JDK of your installation.

  3. Patch the following files with the files from the JCE Unlimited Strength Jurisdiction Policy Files package:
  4. Open the java.security file.
  5. Add the following line in the List of Providers section JSafeJCE is added as the second security provider:
    security.provider.2=com.rsa.jsafe.provider.JsafeJCE
    
  6. Increment the order of preference of the other security providers by 1.
  7. Add the following line at the end of the existing security providers list. This line sets the initial FIPS mode of JSafeJCE:
    com.rsa.cryptoj.fips140initialmode=NON_FIPS140_MODE
    
  8. Save the changes.

The following example shows the List of Providers section of the java.security file after you configure the JVM:

security.provider.1=sun.security.provider.Sun
security.provider.2=com.rsa.jsafe.provider.JsafeJCE
security.provider.3=sun.security.rsa.SunRsaSign
security.provider.4=com.sun.net.ssl.internal.ssl.Provider
security.provider.5=com.sun.crypto.provider.SunJCE
security.provider.6=sun.security.jgss.SunProvider
security.provider.7=com.sun.security.sasl.Provider
security.provider.8=org.jcp.xml.dsig.internal.dom.XMLDSigRI
security.provider.9=sun.security.smartcardio.SunPCSC
security.provider.10=sun.security.mscapi.SunMSCAPI
com.rsa.cryptoj.fips140initialmode=NON_FIPS140_MODE
Deploy STS

To support the WS-Federation Active Requester Profile, deploy STS on CA SiteMinder® SPS.

Follow these steps:

  1. Open the SPS Administrative UI.
  2. Navigate to Web Services, Security Token Service.
  3. Click Add.
  4. Complete the following fields:
    STS Name

    Defines the name of the STS web service. Enter the partnership name that is defined in the Administrative UI.

    STS Context

    Defines the STS context path. Specify the name of the WS-Federation partnership that is defined in the Administrative UI. Enter the value using the syntax /partnership_name.

    Example: /Office365Cloud

  5. Click OK and click Save.
  6. Restart the system.
  7. Test single sign-on to Office 365.
Test and Troubleshoot SSO to Office 365 (Active Requestor Profile)

Test SSO

Verify the WS-Federation configuration and the STS deployment by signing in to Lync or Outlook.

Follow these steps:

  1. Log in to Lync or Outlook on the system in your enterprise.
  2. Confirm that you get logged in and that you can use the application as if it were installed locally.

Troubleshooting SSO Issues

For WS-Federation partnerships and connectivity issues, use the following methods of investigation:

For any problems with the STS component, use the following logs and files: