Before you deploy STS on CA SiteMinder® SPS, complete the following requirements:
Note: Two or more secure proxy server systems behind a load balancer are recommended, but it is not required.
To enable encryption, configure the JVM that is running the CA SiteMinder® SPS so it uses the JSafeJCE Security Provider.
Follow these steps:
Windows
JVM_HOME\lib\security
UNIX
JVM_HOME/lib/security
Defines the location where Java Runtime Environment (JRE) is installed in JDK of your installation.
security.provider.2=com.rsa.jsafe.provider.JsafeJCE
com.rsa.cryptoj.fips140initialmode=NON_FIPS140_MODE
The following example shows the List of Providers section of the java.security file after you configure the JVM:
security.provider.1=sun.security.provider.Sun security.provider.2=com.rsa.jsafe.provider.JsafeJCE security.provider.3=sun.security.rsa.SunRsaSign security.provider.4=com.sun.net.ssl.internal.ssl.Provider security.provider.5=com.sun.crypto.provider.SunJCE security.provider.6=sun.security.jgss.SunProvider security.provider.7=com.sun.security.sasl.Provider security.provider.8=org.jcp.xml.dsig.internal.dom.XMLDSigRI security.provider.9=sun.security.smartcardio.SunPCSC security.provider.10=sun.security.mscapi.SunMSCAPI com.rsa.cryptoj.fips140initialmode=NON_FIPS140_MODE
To support the WS-Federation Active Requester Profile, deploy STS on CA SiteMinder® SPS.
Follow these steps:
Defines the name of the STS web service. Enter the partnership name that is defined in the Administrative UI.
Defines the STS context path. Specify the name of the WS-Federation partnership that is defined in the Administrative UI. Enter the value using the syntax /partnership_name.
Example: /Office365Cloud
Test SSO
Verify the WS-Federation configuration and the STS deployment by signing in to Lync or Outlook.
Follow these steps:
Troubleshooting SSO Issues
For WS-Federation partnerships and connectivity issues, use the following methods of investigation:
From a web browser, go to http://portal.microsoftonline.com or Microsoft exchange online. Try logging in with enterprise credentials. If you can successfully log in from the browser but not from the enterprise client, check the setup of the on-premise STS.
Shows the information Microsoft has about your domain, that is, your enterprise. Review the settings and confirm whether they are accurate. Incorrect information can be a cause of federated communications problems.
Shows the information Microsoft has about a particular user. Review the user settings and confirm whether they are accurate. Incorrect information can be a cause of federated communications problems.
For any problems with the STS component, use the following logs and files:
Look for a message that says the STS initialization is complete. This message indicates that STS is running.
secure-proxy_install_dir/proxy-engine/conf/sts-config/partnership_name/config/
Also, set the Checkpoint logger setting, <category name="com.ca.CheckPointLogger," to a priority value of "INFO." This setting writes checkpoint log messages for authentication activities and assertion generation. Checkpoint log messages are descriptive messages with codes that reflect the operation of the STS component.
The section Federation Trace Logging describes checkpoint messages.
Copyright © 2013 CA.
All rights reserved.
|
|