This section contains the following topics:
Relying Party Interaction with Applications
Redirect a User to the Target Application
Using HTTP Headers to Pass Assertion Data (SAML only)
Mapping Assertion Attributes to Application Attributes (SAML Only)
Dynamic Provisioning of a User Identity at the Relying Party
Failed Authentication Handling Using Redirect URLs (Relying Party)
The Application Integration step of the partnership wizard is applicable only at the relying party. This step lets you define various aspects of federated operation for resolving user identities and directing users to the target application.
The features that you can configure in the Application Integration step are:
The Target Application group box in the Application Integration step lets you define how a user gets redirected from CA SiteMinder® Federation Standalone to the target application. There are several methods from which to choose. The redirection method you select depends on the type of data you want to pass along with the user to the target application.
Follow these steps:
If the relying party receives an assertion with multiple attribute values, the federation system passes all values to the target application in the cookie.
Note: Click Help for a description of fields, controls, and their respective requirements.
If CA SiteMinder® Federation Standalone is operating in proxy mode, enter the URL for the proxy host because the proxy handles all federation requests locally. The proxy host can be any system that sits in front of CA SiteMinder® Federation Standalone. The proxy host can also be CA SiteMinder® Federation Standalone itself, provided CA SiteMinder® Federation Standalone is being accessed directly from the Internet. Ultimately, when operating in proxy mode, the URL you specify as the target must go through CA SiteMinder® Federation Standalone. For example, if the base URL for CA SiteMinder® Federation Standalone is fed.demo.com:5555 and the backend server resource is mytarget/target.jsp, the value for the Target field is http://fed.demo.com:5555/mytarget/target.jsp.
Note: You specify the backend server that sits behind the proxy host when you run the CA SiteMinder® Federation Standalone Configuration wizard. You can modify the backend server entry by rerunning the Configuration wizard.
For SAML 2.0, you can leave this field blank if you override it with the value of the Relay State query parameter, which can be included in a URL to trigger single sign-on. To enable this override, select the Relay state overrides target check box.
Setting up redirection to the target is complete.
For a SAML entity, the Policy Server can use HTTP headers to pass identity attributes from an assertion to a back-end application. A backend application can be a target application for single sign-on or a user provisioning application. The system passes these headers in an encrypted cookie.
The headers have the same name as the assertion attributes. For example, if the assertion attribute is "address", the application looks for the HTTP header "ADDRESS".
Assertion attributes are case-sensitive, but HTTP headers are not. The Policy Server cannot pass the same attributes that differ only by case sensitivity and then map them to HTTP headers. For example, the system cannot pass "address" and "Address" as headers at the same time. In general, do not use the attributes with the same names that are only different because of case sensitivity or format.
The following additional values are passed as headers:
Protecting HTTP Headers
If an unauthorized user knows the name of an assertion attribute, that user can set this name as a header in a browser. With the header set, the malicious user can gain access to the target application. The target application sees an expected header value and grants access to the resource without CA SiteMinder® consuming an assertion.
Setting a value for the FedHeaderPrefix protects against the following scenario:
CA SiteMinder® can pass assertion data using the HTTP headers.
Follow these steps:
CA SiteMinder® adds the prefix to all the HTTP headers. Setting a prefix protects HTTP headers against manipulation by an unauthorized user before CA SiteMinder® consumes an assertion. As a result, only legitimate headers get passed to the target application. Read more about protecting HTTP headers.
To add a prefix to the HTTP header, do the following:
Note: This option is available only for the proxy deployment mode.
HTTP headers are now configured to pass attribute data.
|
Copyright © 2014 CA.
All rights reserved.
|
|