This section contains the following topics:
Single Sign-on Configuration (Asserting Party)
Single Sign-on Configuration (Relying Party)
Assertion Validity for Single Sign-on
Session Validity at a Service Provider
Status Redirects for HTTP Errors (SAML 2.0 IdP)
SAML 2.0 Entities Allowed to Initiate Single Sign-on
Back Channel Authentication for Artifact SSO
How to Enable SAML 2.0 Attribute Query Support
How to Retrieve User Attribute Values from a Third-Party Source
How to Get User Consent to Send an Assertion
Enhanced Client or Proxy Profile Overview (SAML 2.0)
IDP Discovery Profile (SAML 2.0)
SAML 2.0 HTTP-POST Binding Configuration
When you configure single sign-on at the asserting party, you specify how the asserting party delivers an assertion to a relying party.
Only one single sign-on session is persisted in a browser. The session information is stored in the FEDSESSION cookie. If you access another partnership in the same browser, the FEDSESSION cookie is not valid, unless the underlying user directory is the same as the previously accessed partnership during the same browser session.
The FEDSESSION cookie uses the following timeout settings:
You cannot change these timeout settings in UI.
Follow these steps:
Single Sign-On
SSO and SLO
Note: Click Help for a description of fields, controls, and their respective requirements.
Select Local or Delegated
Select Basic or Form based
If you are using CA SiteMinder® Federation Standalone that is localized for Japanese or French users, select Forms based authentication scheme. Basic authentication is not supported for localized users.
For forms authentication, sample log-in forms are available for Japanese and French. The forms are in the directory federation_install_dir/secure-proxy/proxy-engine/examples in the folders formsja (Japanese) and formsfr (French).
To use the localized forms
Select Legacy Cookie, Query String, Open-format Cookie
Note: The open format cookie is the only FIPS-compatible option for delegated authentication.
If user identity information is being passed from the third-party WAM in a cookie, configure the Delegated Authentication URL. This URL redirects the request to the WAM system if the user comes to CA SiteMinder® Federation Standalone first. The URL does not apply when the user visits the WAM first.
If user identity information is being passed from the third-party WAM in a query string, configure the following settings:
This URL redirects the request to the WAM system when the user comes to CA SiteMinder® Federation Standalone first. The URL does not apply when user goes to the WAM first.
Open-format Cookie
If user identity information is being passed from the third-party WAM in a FIPS-encrypted cookie, configure the Delegated Authentication URL. The open format cookie is the only FIPS-compatible option for delegated authentication. This URL redirects the request to the WAM system if the user comes to CA SiteMinder® Federation Standalone first. The URL does not apply when user goes to the WAM first.
Note: If you select Legacy Cookie or Open-format Cookie as the Delegated Authentication Type, configure the required global cookie settings. Locate the deployment settings by navigating to Infrastructure, Deployment Settings.
Guidelines:
Be aware of the following guidelines:
Note: For artifact binding, the assertion is sent over a secure back channel. Therefore, configure the settings in the Back Channel group box.
Any values defined during the creation or import of the remote relying party are already filled in.
This procedure completes SSO configuration for the asserting party.
You can customize the auto-POST form sent to the relying party in a SAML response to improve the user experience.
To use a customized form, enter the name of the form in the Custom Post Form field of the SSO section of the SSO and SLO step of the wizard. The system uses the form you specify in the response. The product includes a form named defaultpostform.html.
Note: Enter only the name of the form, not the path to the form.
The physical page must reside in the directory federation_install_dir\customization, where federation_install_dir is the installed location of the product.
Standalone partnership federation lets you select the authentication mode for federated single sign-on. You select the mode as part of the single sign-on configuration at the asserting party.
Local authentication happens at the local federation system. For local authentication, you can select Basic or Forms as the authentication schemes. These options are the only two methods available locally.
Delegated authentication forwards the authentication task to a third-part web access management (WAM) system. The method by which the third party authenticates a user depends on the authentication schemes the third party supports. After the third-party WAM authenticates the user, it returns the federated user identity to the entity originally asked to authenticate the user.
|
Copyright © 2014 CA.
All rights reserved.
|
|