Digitally signing assertions is required in a SAML 2.0 POST single sign-on. For signing and verification tasks, a private key/certificate pair is used.
Before any transaction or runtime actions, an administrator at IdP1 sends a file with certificate data to SP1. This file contains a certificate (public key) associated with the private key that the IdP1 uses to sign assertions. An administrator at SP1 adds the certificate to its certificate data store.
When the single sign-on transaction occurs, IdP1 signs the assertion with its private key. SP1 receives the assertion and verifies the assertion signature using the certificate in the certificate data store.
The following procedures explain how to set up signing at each site.
For POST single sign-on, Idp1 is required to sign assertions. It uses the private key in the certificate data store to sign assertions.
Note: The example assumes that you have a file from which you to import keys and certificates, or that you already have private keys and certificates for signing and verification tasks.
Follow these steps:
The View Federation Partnerships window displays.
Deactivate a partnership before editing it.
The dialog for the first step of the Partnership wizard opens.
The Import Certificate/Private Key window opens.
You return to the View Federation Partnerships window.
You return to the View Federation Partnerships window.
Use the stop and start shortcuts as follows. If you logged in as a network user and not a local administrator, right-click the shortcut and select Run as administrator.
a. Open a command window.
b. Run the following scripts:
federation_install_dir/fedmanager.sh stop
federation_install_dir/fedmanager.sh start
Note: Do not stop and start the services as the root user.
Restarting the federation services makes the system aware of the changes to signing.
Signature processing is now configured at the IdP.
SP1 is required to verify the signature of an assertion. Before a transaction, SP1 has to have the certificate (public key) from IdP1. This is the certificate that is associated with the private key that IdP1 uses to sign the assertion.
This certificate must be imported into SP1 certificate data store.
Follow these steps:
The View Federation Partnerships window displays.
Deactivate a partnership before editing it.
The dialog for the first step of the Partnership wizard opens.
The Import Certificate/Private Key window opens.
You return to the View Federation Partnerships window.
You return to the View Federation Partnerships window.
Use the stop and start shortcuts as follows. If you logged in as a network user and not a local administrator, right-click the shortcut and select Run as administrator.
a. Open a command window.
b. Run the following scripts:
federation_install_dir/fedmanager.sh stop
federation_install_dir/fedmanager.sh start
Note: Do not stop and start the services as the root user.
Restarting federation services makes the system aware of the changes to signing.
Signature verification is now configured at the SP.
|
Copyright © 2014 CA.
All rights reserved.
|
|